Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 03:57

General

  • Target

    a7eea4f295ea0de39d0f65cff118e3ed_JaffaCakes118.html

  • Size

    159KB

  • MD5

    a7eea4f295ea0de39d0f65cff118e3ed

  • SHA1

    ac61c51813c29502cf1f5133ba754e06844b2b28

  • SHA256

    452d7bb5b0f857b0cfd3ca0c2a72044eeba491de96d159295340786e7b6f2036

  • SHA512

    de5aef933f37f52bde39a8c656ee4eabd432f38337c2ac805bccc453efe6432365d5ef2db037452037a24ea17fee9bb66a712becfc2ef12cb9bc3e2ef17643f5

  • SSDEEP

    1536:i6RTJSjB7kKJdRykXglyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:i4aLJFqyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7eea4f295ea0de39d0f65cff118e3ed_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2792
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2936
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:209937 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1560

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      252B

      MD5

      920978826851c1c266492f7707738a8f

      SHA1

      74af35b8d6b55a193193de280854e419684214f8

      SHA256

      a1ccd7a4407dc5ad65d0c8bf2c73df8f1747fadebe5f3ad70c31ef537c0eda17

      SHA512

      9963cdaa03fe7f9dfaee5feb31ac5f32804119d07c19db6335941cf1d0685ae9f230ce8d533fd6faeb0e85979135a8f725f111e73aeeb00ac503499370d1976b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      37d65853efda06dc3fb94da52f244c82

      SHA1

      937939165e61c3b686e9e39f568cf930b6807817

      SHA256

      a94a519c1461554eef0ecbedb35cf592b925f86839988bbcfb9ac470ed1b154c

      SHA512

      42974e694cf95a4e29da7c939f972ea924b65baf6b73b2041ef40fdf46c34f8673d72995316fc102ec6bbd18b1ef11fe7430624822efc7d23a62a70c95409214

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c1a7510e18475fb392a5c6ccc278d2f7

      SHA1

      1f46374b59c30f070ab4f173d57a79f7b589372d

      SHA256

      77f4da64036b75ca02bb8294e98cdcbb398695e059b59df9b0a5a12c2d2ff267

      SHA512

      ceb916de2d02f0dab8d2220c4ef7805f7b1c899cf43093c065bea53c8b99e7c299dd81237c268f61a441bad9e6d8a1fbe32b2d73b083243971d89e65d48fd1e9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      81d53b2705e7a8b76fbc6165489d42b3

      SHA1

      4e3d26057dc09a2d2b274be8b47cbe72be158c2a

      SHA256

      527a0422e802cef2e33df96e8f0fba69e8bfd828fdb2dc4511e91263996175cb

      SHA512

      bdb0dda7180da01795e6e5eb15fb194feb513829edea9bc3af6138ea98745b0819a082a5783de2b79049257cc6054fce8cae3c9bbdfd58c76f07b34fb213c892

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fedfd297a47e14e9d92b129a426bebd5

      SHA1

      aaded474ca844022955bb4b3a7ca9a19df8c70b4

      SHA256

      93ce13b5ac2b96064adc4da73238933004c4ff6053bd003b55dfa6f72dd26178

      SHA512

      c48879d70c9f2f32e688894c6681d0e19215acb0047b17b540200333aa6415bd90ddc3a7e042c93e8e99df8c3a9fe3a11afb84230424e7578a7d75f278f125fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d9266433b0015e91780144e4cdf944c8

      SHA1

      c1ba752c3f78661f668655cca1a68beb15d2b7e6

      SHA256

      83ccbfd927b6338840eba55d3744a245a2d3492dfe096f17c70c011b2c2d1f59

      SHA512

      406388339d90eafccd2fdc5f3b6c372d3c76b7a000346861280bf7c49d7a054339dedd53649f96ed88ae0f59feb4a0706bcd0b36cac1563018e8e67ae484b034

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      26ea740a99bde50121ba16ee1916603c

      SHA1

      342ba9010d4d987cbb435ef8e31804a74b3cc587

      SHA256

      895ef203b671ee99344038ee4517cbaf0ee9bf225c591af4377c13776b86947f

      SHA512

      82ac950bc723cc6424ae6165836872fcd7bc85b81a70ec3afa1110ebf63606706e67ccaf8b38893d4de8867053d97630e9b98f07d9dc5907454091d798357203

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a198e7d3bab688b0364d7e2230360196

      SHA1

      e28cf328e7bd5055724e1b9427791af47ce6a61f

      SHA256

      2716688be51d68557349724bd9f26b744c30517702eceae6449a057e24a6a11a

      SHA512

      830d119e2687ef3dddecfae11242082627952c84cbff7547375d2313c314287d4ddacb40bdd634c0592d94618fcb2232775c983a965abe988e530831a30ad992

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0c74b3208a629dee1b32a1da288d93d4

      SHA1

      86bb1fdf3b5b311092b826a1e8fdfc2dd2d3c12b

      SHA256

      1eedb1171167f7e975444f1355dab124f78f82a3e2838002e6defd19a0a39a73

      SHA512

      af60e79a74d03aad653ca19294f6f22c53f17075d2156cd06d26fba7a8409f7a013c1289166066462136c320066079a99bb4c547a49ee4a22a501b25f8caf535

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a43317cb8e4d6aaa6b27bfb3857b69ae

      SHA1

      112e58146314df4c325ebdb67126a2a890088766

      SHA256

      8eb388d30e6912be5fb418addf9adf887bf7fc43a8fd26beee89c6d0ddf36bed

      SHA512

      0c653a08694b7e43f2bf20de800a8438aa6e6b351021b57dafe9af0e713f9a3c1bf4722a9a8bd753627292d8c8b46c73fce8488a0d25e17e67716143ea249a64

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a75ae1cbf83f34f1c1e2029105814998

      SHA1

      73577519b37eaefac86028c06c75907820752ef2

      SHA256

      1167aa97bb1fc617339a154d207fed4497207ef631c117dcd4f19ea6f696597c

      SHA512

      05191357a75db5838315ede32cdd320c12de4f5a4f6c082b12adaa0def3d5b7ee4ba8f5d848076ee5fd7f85743976128c987f732f7d40866ccb3e143e3683af3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      328df7c1c80ca7339eb57cbb735692fe

      SHA1

      e6d52e15dc9f7e1629ee4985efb2265fe20d7d98

      SHA256

      51a4cf0b198726117a7be59162f42b7c2221cf3c282ff5b8e45ab5ac8eba778f

      SHA512

      0a84d9783d65ef1342b839361c76c97d62091d0a264515f87dbb26554e0e5b021347a03ed28c5331376cfee86cbb44c9f6373889facad4845e7ccfcc75a56dc3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0d5d137e0036dbadd0954c27383f50da

      SHA1

      a98d360a0a69a924b7feb5b5e4befe7849b80132

      SHA256

      6c996ce2180b3181bf32d1cd0b559fa9830dad6a041930cd330a40af62fb8a0d

      SHA512

      2f17238aa952c91bd8f59b462bfc3e4960955aa1f19ea3147419e5f2e754ec13b69e725ba4496f2b575d9c5dd508e5f5da8d6bbf38a3965b3b6d623ff9d3b8b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0be8da0058c1fd9786c104ab71586dc1

      SHA1

      94391ba3c5719d9f08f23d548205dc47f7c05626

      SHA256

      ae7efec3831e7fca04dfd9c26fb70644639cfc57bd5a411736b0dcd5baba8ba5

      SHA512

      ed1e580a65ade48240ceab0866bf022a247b3360ae860b25079a9387ef1887ce32d9722b3a35010de154ac3c23cd3a49ef6ed689dab4036d27c14014dda9298d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c9e409bef0b4a1991ddc33e12910a083

      SHA1

      734b371e33101c0cd3bf0bde0d490ff7cc9cfd4e

      SHA256

      76cb414a44739489f1ce500089b3ee5cfc64c2b43d65ff59a049b87ff0c199da

      SHA512

      9e3be3f474f2bbcad6cd1bb046572c9f1c676adf37b828f8b0497bd77132c71bfd4d868e84f351d9dea88a60a631750767c9958164a246e4442f3507827ba976

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      59587727a790d3866f2520f62a28d0bb

      SHA1

      6ca5d6a163df4e1fe1082f1f4d5533ab4b4d761b

      SHA256

      413262d146fd0d384bc25acdd8bf42949a0cf063b920c32ada8fbfc8822c5469

      SHA512

      8e1b8173a1853c6eecf23467691c51eb85a2bb07ede4ba0c5a9da791b6de29566b23f2e79a486cf91006382ce4e6be1872030ca9dd544752c6d860179890d8b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      81edf878c6d272d8fd284deb39fbfa02

      SHA1

      f7184591ac6bee49487b43ecc3bbe52ed123ebbe

      SHA256

      17c8bc8f2cd92e7c3c59089bee281dee84f25e60219c45ad358f35fbb0e582b0

      SHA512

      1f072cca9b5e1dad3bda344dcf484e4507f8363cd9891f0b662175ff8368ae2dc00d8c8b32d9fa87f1655dc8fe99f3ddb200687611927ac519350eabf0d435f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c26c6876add83dec03d82c0f2407031f

      SHA1

      802397d6007d23fe03f61941cc1d8eaaf9cdf903

      SHA256

      edbfe2452ad90ee179763459d929c1fe5cea2d562ebdbeb6b3993591dd186d77

      SHA512

      af2d71017995e5b508ddfd5105273b2b9ebedfb73d1dc4929e2dcf46dc5a76cdbafd1066ce269b6e3fec9d854c50e03d2908995148d4ad7c6f42c07a9b7e20ce

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      094913cc6f41de293d083dd27bfa1e7b

      SHA1

      9c5689c77a9ff8228699fa9d392e6cee26601b14

      SHA256

      dcd464ae57afa463ca7715c7140ff3a9326dc6e7cb0d3a2413eb25b9b151fdfd

      SHA512

      b4935a8994c3e5530d4e911ab6f58b9bc1dcbbcfddcb1fee52a31e36fd8b5d1a5b1947d61bf7c3cfd54e79f3354f9396a25e62b86454a4ee8b5c34e59ee2e2de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c55942b525b68a8d3804eca171100016

      SHA1

      712d0131a48cd718873f8a787970e1a6ef40b592

      SHA256

      ac91210ad6ab67c721dac5c25efa2ec5be17bc41a671121395ee04c4ae7e615a

      SHA512

      8f43c90c979c91c50aa961a597d5e29ee88460f12eb3c6d671f6e939d232cfb1df066580637abcd2c20e92214feff8003546810774365a145e4cb239c480f3eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      b8088e86ce72f5f8d5993d6a5f7fef70

      SHA1

      9b9f3c1b1eee583ca989ab7bf9aec13619da2422

      SHA256

      e17808466d02ee5065c0bd76c776a3d705b3dd0339d387e5b1020ec6050d4668

      SHA512

      a53072d1dd3e13901d7f841cd5c063fcfed2b69f4adb0df04ada7d0202dfb95d3115f7ac194461a8a9987382a3086c5dffe08a209580ced5a8055598a45a181a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A7G77GCI\favicon[2].ico
      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\Cab879.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar9E5.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1404-577-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/1404-578-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1404-574-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2792-584-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2792-588-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2792-586-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB