Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 03:45

General

  • Target

    a7e6679dd33c3e6e0731f7e1c31784f5_JaffaCakes118.html

  • Size

    159KB

  • MD5

    a7e6679dd33c3e6e0731f7e1c31784f5

  • SHA1

    7dd030accbb27f269b561953deb5278b326f107b

  • SHA256

    c5f2f53b64aaf5e907070169793f306fb334e965fca114ee8c24d22e0f9ab181

  • SHA512

    caec9256075b6b5c66cef333a24b5784e960c3f896c1d84006320a881d1f9123f5990fe7cf6f88d76a7a25d81541b44e198fcfb45514c87bcfbc578a7e6c4c7d

  • SSDEEP

    1536:ibRTBeOiyaIhSWWkUIyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:i1NQ3JIyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7e6679dd33c3e6e0731f7e1c31784f5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2900
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2872
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:406545 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1372

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      252B

      MD5

      6876b5481a246804c7cb52bee6b8de7e

      SHA1

      d7d73923421bf1fc880233a4764203d4641a15a1

      SHA256

      34fa81f4f6b2cc3975483c067eb369e7a4b34d3373169f492f280c2b1aa178f0

      SHA512

      84d084d98a8680d122f5cc48aef26dc23e3685f3709df02be9ae107e4e490a488ab986d917ce79c9e49fcc9c58b7193b47baf609de702152bcc9f8c0ad3527c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fbe3e708408408e3a3292b7530aeedbd

      SHA1

      71506137cdc4531e2df292c019509f432577c41f

      SHA256

      2461bd925f58595c1d9595f00eee91aba4e165745848dd54c4b5c6ae57ba7829

      SHA512

      b9b900eb7737bceb328af11b1fcec79613ea3985c71b11bb7513158d2a0dbbab6744b041488dccf1ec43a8ae35fe1a9c6b7c325d877b3c584ae6eab30aeb8977

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6554afd1de9c2d86c44c5e71a3c1670f

      SHA1

      60e91dffc99265c42768377c291ab56c72e849d7

      SHA256

      adf0f220acd51ea32a79c63f911a1ef14f5f426dd5c93208ca0f2b1aed556775

      SHA512

      bf35e83a7c120941bb495689d036f61193a8db0783b1956b364ba49bd666364d0c932fa291fa6f8453dd83dd56d67330c84231fab689bc3a31034e622c01b474

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8bc1b83451ec250540874a361b77c2fb

      SHA1

      58e9cfc8e91a183f0619c88cfea7155d5ab00943

      SHA256

      e48ef56489058934c76a5624c9670ffbb7730abaafe3ab273b863fb9f95fe4c2

      SHA512

      044e09c31d7bb6771c3a2dd748ab14724ca845d79343a72cdbd4f6d3753bf933e5772386230ff839c57d7ea8dbc88dbc9d3bd480cafa299e12887953fde60256

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0fd45dd0295094f690a76140e3e20f0f

      SHA1

      cd9dd4047e4af98f29875f4890940086723c2ade

      SHA256

      bfc4a7226df0cadfa6b4ca04572893d6bd9d3d3f0688a3de5179ef4a4b4e3707

      SHA512

      e16527db2a6c17df74bcda81bf4fd711f3739a34f06be9596ca85e5231262be789c4a7044d9fe9d64cf1f432cbe17a2f06a46339ed3a56fd05be78af4b2a101b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ff1444d067bd3a7ccd4b269c7a19c9d1

      SHA1

      9d37010a17f14a9f568ddae75a922981871a6d4a

      SHA256

      2294080974c8c302daf0fb00ed6bd5e94072a5a874545a736eb0f2a7a37206b9

      SHA512

      659a0fe403f8502fe70110cbf8d88e482ef823d405175a13702d693ce4a69ce373ce6901a560e8491b775c76fcaa042bcb156fb9aca23b5526110378c9ccb7d0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      edd8aaffa383e76e8e338a07f60c96cf

      SHA1

      828256ae256fde12fa6f8c4abcba8134976949fb

      SHA256

      3830c57cd7717675ce2ab925ce8aa47402c5e0bfc9979076d0e527ab4d457db7

      SHA512

      e79576bb40f85301a05a31db3ccaeb0a79fe4fe22a294414f668064813cad7206f7eb354a2d067037897d79b14286053c97668db0fc655a506ba8575de039fe6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5746d56df74a1c0d8fe2842804a622f8

      SHA1

      1039f1965cb0506b72351b56606d9ca1de7df047

      SHA256

      5245efbea2f9082d54b3bb55794e944cd6ba815024c2558d0ec456a1c594dd94

      SHA512

      831d68f99631bbb86ce67bae1f3964c50617e5179c7c1a7f39456031734d73eb49d72e29d1912a3ab1a4de02ae2db536dd9709e507f8148504df803bb56f179d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ce4c4712b5a2cd6bb1a8b29d0a1bcb59

      SHA1

      23b138ed207801c50cd106fe52f1a517fbd437ce

      SHA256

      48cccba4cd8f569ad879988edb415883c234a8f568e30dbbef33d2d25a20ffc2

      SHA512

      4a652985c1af225a57a092d8797d2f880816dc94ca73b52b476083ef7ac727c90820d98080e5d1cea55dd6d70be197517150514157f0f1664adebf38e97086db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bc998bda7457d9c5e2353376f0a9ff5f

      SHA1

      c18b84e149376f78865abc85d5d12b7606de6315

      SHA256

      07e54d86a9e829d4e89007f69939ce4c494d1731a30119b71e63cf85854bc823

      SHA512

      75fd87fa01c9fa8aa192cdf42d41cfcabbb39f5b4e210a0c53a30c86efa37f5153bd3563ab24381504d1fb32675b9c43dedcb29c67f6a5ad4f2e2e5140584de3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      86b1870c58004152cfec1bc0eb503c60

      SHA1

      60b1c4aa87b0b78396d87f745e91446da3d20ae3

      SHA256

      e4302412fb7b3b5eee863d1040d19980f9bddabcfbbb9986095953d2e502bb20

      SHA512

      9c2b8e5e491250c24d31da1bf5dafd1e07c7b4c8868a61287bad5096d87c6989b128686ef369b608e693eeef9414c30bf39daf0af882324cb53ec433cdc6a33c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a6a3f9cb239c5304bf8f9a5eea160d70

      SHA1

      2af34a79cad0494748e2756f7b9ffc06007cadb2

      SHA256

      e2d7d94d8f1177b8322d21c9b2f24cbb1649301b001a9f1a5a162be19a612b4a

      SHA512

      bc5621cc86d7210fe314fbeba2c87c3706ba5e643f3e24175de263976aeb9c27b94bee3a11e99227631340a2ff00da39e73850eced758c08bc23019d5d84b588

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fd46ad36552fb486127ac2b12b6047f6

      SHA1

      9bc423689c60dfe79f68b8246634a08306777fbf

      SHA256

      cbe822a62f54d03cb08ea4fe7d3776fb9282290afb462d482f8126465de6b886

      SHA512

      c8bc3205e9b78ce580b6e52475ac769925f785e04dcdd6d3d48053b2ab26ecbe3d6caef8acfa16229ad757828fc2bfdccbe8a4ab344b40e0b4d8ec4a44079169

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2a1a568885ff0ce5222baa2c11503ede

      SHA1

      835c711b5896c3d654abbba483035a6138fc3d39

      SHA256

      38feefe06c18fe1533ed57fbf05496cce7a6fb8f7c1127c079b2ba5093013c78

      SHA512

      df72f34f693d987c6b59bf6944f237e068d05b34a2bac70d20ca32a6ce6c92a7ceb38e7aabdd900621be5229a33746f563e48f8dc16d082fb9bba95471d72b84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      43c392ab9e595c66131f24a7c749f312

      SHA1

      aee8d59adde08b1f57e8062175e0bc3b4838c2ee

      SHA256

      6d8194df6445af5a25edb616e5f6cd76c51e23e14336b515b0f19beaf45bf300

      SHA512

      79edf6a71a893025a9850c9c74b434eed496670cc5fd884ed53e63db2f9820a61d36fd20f9abf0f042511e37e9ba6bd1ae57d898ad2018a9d7c8386fe49206b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      dc04f8b411df39b78b7d558398cbd50f

      SHA1

      878879c8dd1670d0ea58f09b7b667b829ec176e1

      SHA256

      209f254c955065ab3d4abb2df1cc227a056b31f7394e2b35bcb9a179b618ff37

      SHA512

      44b9a832f97481956a1d367d7427f48eddcc15c89f8a8a3d8b9710a92221e9985f5e29b68ecf68cb9e42cb0269df52b7efc653462d782b3ecc2dad1d7905d69c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b985ee48cd97c6e486f4ede11a562a5c

      SHA1

      5ec1352a0f084ca15ae41ecde1719fda242ddf49

      SHA256

      da72d7f31fcd2bf320617f0d16ab1afe300205ad25eb6af1c65a00d3590c344e

      SHA512

      0bc93c3d0708b7a2ad938be67d182b716c331ab0cf0b76335897c1f2107b4a2f93998f2339bf7b1e2710a824b05756d40248304dc092535309fabb5154ea709e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      cd8fa53c41c83535f9d414afd3f7482c

      SHA1

      85a7c4402a8cee829878f08b7080755cb1286620

      SHA256

      9297ad9004f63c0cdd1b69f2cab719363f504735cedc7f3fdecab45232ed5080

      SHA512

      f25fef71e9b02f9aba39df5c854a6a8336bde022c9fcb7a57ccf377298f77462bda4a8134fa45e05a227e07e38a0f92dbc7c5ab963877795e603768420a7b1c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      080f56151f64cb35698f2d1e953ffe3e

      SHA1

      88c18499e747c689845cc74fd353814e34996e81

      SHA256

      717351c298e331f00317725cbbb7f169f97fb39ec58d7bb50d023d3ff0201057

      SHA512

      5f3cd6a204b4ab65d63305d226f405a198cce4c55efd03f9793a688279fe59904d76925722dd0c1311107e1afb6677cb93863e0e90ed949a9fe7abb39df4c0a7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      649c55637ee45cc43b6e94c2b061089a

      SHA1

      6586018a3a00cc08555320fc7f06e2bea762324e

      SHA256

      cd2177073d432766aaac71c34ff8d49476281f11bb7e0daac20da5eaebe36a38

      SHA512

      fb988f8a6d5f88c12e57fd1d9e8399ac3be0977dd6d331450da81e6385eb17d87c9a536fdc75c3486d3fcbf1d18efd4c514726fcc6c5714754d188e6a3b33ef5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      eb0c40c9832d769ca19dc567b56376bc

      SHA1

      364531c09c4cf8dd1fcc5918dd6b5b34c3cf8b97

      SHA256

      9b3b25178a0cc1b01ac7f026d4a89b135737a7a188b1636450a29f73c483d201

      SHA512

      f255c0bf7e5e0f7941f3bfe811d44efd875661af3e1369711189c5cc3d8ba30d083db5487d53ea55015f53b7671c5418c76a723d296e197a15f2e74ce4118d33

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\66MR6QQ5\favicon[2].ico
      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\TarFCBB.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2848-576-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2848-577-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2900-584-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2900-586-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2900-585-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB