Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 05:21

General

  • Target

    a82383e869f772be0fdf293b24e4f37f_JaffaCakes118.html

  • Size

    121KB

  • MD5

    a82383e869f772be0fdf293b24e4f37f

  • SHA1

    2eb934b655d48cab6b8603855845a8dcc8d52734

  • SHA256

    888a1fb1d8ca265a790d031487c837ef77e7fd19754f82e97576ed1224fd8fe7

  • SHA512

    ebdeb34d87febc1cad86fc5f3dacb44292548d82b12dc8cd4fcc0bbe5706ebe3009c1074b65ee55e3f3bca3c9a89c85b98fb04a6e0e46b5fd671d18a496ab345

  • SSDEEP

    1536:ykb9KlyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:ykb9KlyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a82383e869f772be0fdf293b24e4f37f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2736
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:406535 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2368

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      63c4890099dcab02349c8021e209b161

      SHA1

      d75197223f6560ebb0efd877da236f7ff2fe2a0e

      SHA256

      1077c4cc45f8637edc1187edf5f5cdfb7ea2a03153ae3de0754930b4a1dc1879

      SHA512

      9a07b433bf41f9191eacad435ff618296d00dbf97058ccc01014b72fd94dfe14ebb7efb61fff6e275a5f2d6581c62ff257793a8c0d2f2d86a6a3fc4f93692dfb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      766b0cc7667913831887632dbffcd809

      SHA1

      8640640f322e61cd78b1099b47b511b44da8a07e

      SHA256

      f70be6f5bc449322885b1fbcfd9692d8eb1a85557a97695f6d6db224c117cb56

      SHA512

      19116eaa6cce3104c902ccf140a0d062153c2186b0dcdf8a644f8a23acee70e2ed178a1786948e052316110c3b17775cd2a42e653ced1523814dac313a5553a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c7f8c90e537d6f2f86a4f0d971eaf154

      SHA1

      d3f2e8ea3c5893a3c7d5f550fb186f31dd6181fd

      SHA256

      51e09923e74c6c51866ac57ca9157ba29bc5efd7f16b6c4cf56812fbf29a5d5f

      SHA512

      a474bad0106a3caf2fdb43bfafcf8106944f92fbab35c6d1e2b91770195c5d447653a5b35b7efaa0cf427a8d8cb7db97457b24a8ad53c09cf71c4c2645752528

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ad124c1b30835410959acfb5c08852a1

      SHA1

      6f68c6e46bcf04620f5ef51cc1b7b261fc218955

      SHA256

      23e34e0fb2a37606f0e409192ebb5d95790cfb313aadee7d8c7f42332038fee2

      SHA512

      6a7faa4d00d14195294c10165d719d0ff2875f823d6f9e25a6cadc2d16e80604f3dddaf12e892d5da5d111014117e96d9aff323567ebb5775b3daa1554b11108

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2ac45c2e290be4e3a5d1765c9cf5bb73

      SHA1

      6280875a5bb654e86fad5e681ab2147954e5bbef

      SHA256

      14f4d662250a2b7705dae8ac9a0d3730f0aed2ff8aa26dec35995c7890aaad17

      SHA512

      82ff7894dc256d3ad1e4fed19014853299baa533eed273e635a0b8cc14e4eb338e62c5febac014716fc07edecf5b3bec536c3547366f103351e67f74d1a9a7ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      694b40ea35c2bb7fb012a8660b34aa2b

      SHA1

      b613e4ec75f7273d0a8f7a08f4e7cac079987a0a

      SHA256

      38de8ebbd7c69873fc84363839fb3aeb94c324e5dc55e89531f387da6987315a

      SHA512

      1f33ed667834f45bf9c8fbb998b646146d2922d8d08d92acdc73a2509b9b18bfd86a1212b2bbacd853fe8323cf603f9db606e749e89161799b527fdd5a7ca689

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c9465eeaa6a2052efc730bc06b4e6364

      SHA1

      42ba7754788de6747f613831baef6285bcd75c68

      SHA256

      fdcd1a088f710b0617bd529d09adce5ecd7d671eb9a29d08cfe337a9d8d6e727

      SHA512

      65d8af4ab40e9a83d2b50e1d82eb1150194d365c55d0702c8887322560ea984df1e2d6e419f9656ce45969ab32bb306c8379c487618bf78164374490cd313f6c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c9cbfa2f40c54ec74a17456702001920

      SHA1

      0f84da65942386468f95324e8baa146b49f69413

      SHA256

      820af41a71507baabb9953255ff7084896166460ee0efc75a7c5a6242077abe6

      SHA512

      fb3021f1a04cc2cb534864039367f70f3f75b9c078355a206060ab4f5878889e4553ca3b2b95e1fcadec025306710b76780c8d8661079efaa2458d7a0018333a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7da2cd766a645552f0b1e0b50d38bc8e

      SHA1

      271003ed37e624c34f5429d9c1d47e82470be164

      SHA256

      75d59345fe43df62da83d6841d7fbcf872aaa49d08fe2b44467df9df2cc8b256

      SHA512

      be885b41c5665d53f1e19dd0264492f150aab968ba2164c22dd6c65f8b799efa500cfa192686dd59cdc75ff4ccb39f732da96823ff2aae7415ae0f2c350f0e20

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      091a5670911709fbfe3dd2616494909a

      SHA1

      85b3163e7f3556a04cd39243c1ba18c8dff914c2

      SHA256

      03141a09971cb2940bbab34f9b01b2152ff955cabc18f380e29f24b70407ec7f

      SHA512

      959540014959f834cbc28769241ce432f2f672d6e25dda771e3ee7c5fc1d5697c6027c649245cf307206bb8887d6ee380afeb62e6580606415b33a6559a370d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e6e15d35ea2babe8364cc45a5e3e69cf

      SHA1

      a7358e9af40e0fc8f7b6b16ac2e211e3d3d35d95

      SHA256

      771f121b5cd21049eec709fe1bd5602ef81db56ee71d2036089f58aa18c1ade9

      SHA512

      bb2681a70de3c3b339f20b7c9208fba693f087acbfb57ffdc78a448432ea82c030d476ea850061ec9ea9ee6259e5d06faf62ed21e45bf96bc3f6e563c8ccc6a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      91a056566c625a0691da1dc5e651da3a

      SHA1

      c24d46993133d3807523cac4c24ca217df07c486

      SHA256

      65b56cb135521ee722e89a8fca74048f4a1a79e19daf00e474048b7eb89c8783

      SHA512

      1e3bbca7183a0836fd856e18c22ffac33863e0032fdde1f8ae445846b1adeb3e23e4ee2949917c99ce1c22e78b0d19d430a358b4c5125279a959ff56a8160c9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      64396241c749c0dc690c2ced5474179c

      SHA1

      e30470131ad8e35eb006ac0816d6acf3321e666e

      SHA256

      f96edc6d5f85885a198d3d372f9089b26a41be4b59a999628a4a34930d4f5840

      SHA512

      51c30c61d6f9ae664fcb9da1450f9d000aac3f16d0e30e6e01e7d4ac8f6a6949b595b53940f30017d64d32c33865da2294b931a41aaaddaf43a9ff01003aa409

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a8f0998a2eaa1b62aec5b9bf909a1c57

      SHA1

      80875f54df55b694ab367d2db5c166cf1c864577

      SHA256

      8a593243841d41cd948c9e10a65264226974900cfc95c93f359c0f30ece96861

      SHA512

      6d1a1b45da4016a9c705c22a1a8fa84d51b5ddc3e26227f2fa2532f567f8f582b64065ce86f134360a48ec316f9ab2873b988e5e77dd278540a63d85f8e4dadb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2339c54957f8865206029a5008576156

      SHA1

      00e921bd93119af2e360de273e871e1f930143a4

      SHA256

      e884731408d183611e27a3dc56645c69e256f04b31e0847d317933339d0b9492

      SHA512

      94c7b88b6bea6b826187bea274b7507e9ebb5f80c0afff5da8907c9e97259023394636078cea6f50b3508aab27f964851915a8682a01e4c3bb5ea55d9d1bd4cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ad399c3f525e764ee836f9f24ade540c

      SHA1

      7d7d78c95277eb64e8446f85de5ad212af800a21

      SHA256

      98ed763985b37b0b4684977d948d0b14eda7a8511c8570ecc314ce48f9421dca

      SHA512

      daf1c351d165f524e9b8c2a2a53e9f61722b19a9a645f7d6b802358809fcdd241b899df5b74800f04602ea0a266a6bc6a54e26eff1c78306d7d394502f4b755b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      13c68556091909a0f68193a622837753

      SHA1

      cf91ddd71ad8afb1f2d1cdd70d69666d9d05f39a

      SHA256

      1c2382c04b7f83cd17ba35efe9d746a6fdc088a4aaa7b3ed07fb2bd8815f01f4

      SHA512

      5810a561a2cbae03cc9206cfac44fa0b2b68725dabaa01631b4b51d9c38102c5579e86d37efcc51c9aabd235db36ff25f831519a61dde052f2a40f5d090576dd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3a9fe06feeccc29e0fbf8cf2c68c3222

      SHA1

      3a9dc8e2bc3fa1ece2bb42ec28ecbe3ec5abf665

      SHA256

      7403168d8b65a3c57de881fa2724ae5f7781da501f6b1a6578780a2fb13e4a50

      SHA512

      ea2d4e015049838c11faa8926d52238f3c84de40647dc64cda2d3dd744bab3f4fed9690d4e0d9f6303e597ed0bc9da9c7eed1f29bed3bf8c139cd108a408ac34

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bc0e34018097a2ad41dbac4c8c86a653

      SHA1

      2f3ee572be63eb3bc8728ecaaf56e876b4c9572e

      SHA256

      1fc5f3d7eb74f14ec8208ad74dbfdb2e485acb2c5a908c415524d41f4c100f7a

      SHA512

      0e4795e68cb47e9c7abc198551b9f459b42cb7a49f6674f40c16165c7d80cc8a197401201d5df471b31017dbc5f26e64e4a47e80650f1cb2a4a654adfa7c1689

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      575d074d041ab377999fa28c955f12e4

      SHA1

      a0ebb969bad6cf1df8df0395d76a39a81eaa15a8

      SHA256

      36ac18244e4931c31703b1dd622652386148209999e61e120b7b5028581ef368

      SHA512

      44d903f9845d28ca59973debe590e39e09e2db4f2bb263c3ac3d2498d4a41069b06c184c733f3c82ff5fcfb774d95d70b9084dd96959e6f5c30e827297769635

    • C:\Users\Admin\AppData\Local\Temp\Cab27CE.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar28EE.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2564-6-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2564-9-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2564-10-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2728-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2728-17-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB