Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 05:18

General

  • Target

    a82114f2af65953458194bd6d26d6ae9_JaffaCakes118.html

  • Size

    156KB

  • MD5

    a82114f2af65953458194bd6d26d6ae9

  • SHA1

    949ded0157a4274bd9e9b5446300f5aef5c0ed29

  • SHA256

    7c9521cbaceaf496f64a405c3bc016d614cbd50969d94729d1da2448d2b375ae

  • SHA512

    b2dc729da2986129df5d3335659d7f6f618319e4eb6004fc6c3488eee43c39ddebbf57bd1887831d17ec631e1a7e485fe94b855ceb27b8b18597975aefe25d33

  • SSDEEP

    1536:imRTvkp85m/lLw0yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iMT4m0yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a82114f2af65953458194bd6d26d6ae9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1964
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:668677 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1656

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      aa6f6bacb4f2274602f1f62bc5cd0c6f

      SHA1

      d076da762433e9521dd4927884ff290e7f344c4a

      SHA256

      846ee2eb00f1bb11d34b04dfbefb29aafaed039206ff0863072a079f4eae020b

      SHA512

      fb94aa40626d3a1f2fe821ce50b18245cc62873797515eb18df7f202757d19113c8dfa35d4dea8f98af14471813d581e5b8f991e9e7506b31e316253a0c33b3d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6f49c436dc64e173ad6829eabb76580e

      SHA1

      6e2a386025503510f3bdb5a4222dbb6755207552

      SHA256

      b619d039b91552650fed7108bf0ba47bbb91daaf9b1a1c6375c329fb16c5a531

      SHA512

      d5d55a44602e5fe33955c6b343398af0831cd79f3f52acc9cd302903977271c712e788945dbfe79dd5c7143fbb614f744a2d46d9ce5de456874f116f95e9cd13

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2af09b0f02c27ee11b3476531f55d6e1

      SHA1

      425dd1807d0eb9db9507a1e3d27a789d646a91bb

      SHA256

      a2de806987eb0728318904c7dacb4c2f057ddb60c773c7cfc0658cdc4f6dad51

      SHA512

      c9c21ca876f9ae849f3a3b1bfc23941b5143f1d7df21ded41215c7e06d1eaae4137a5d2e1ba9362ba4086bb78fc085c86dee12089e32281e7432c1a62bcbb7b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      93914a9923b41894a72fd6d54434f10b

      SHA1

      39cb3ad0b2168d832f9a04bfc1b9b99f985ee2b7

      SHA256

      a9e4d6c37be581797c4d37e58d22f7a6d3ec49afe7302137483d119fe3664e56

      SHA512

      3173d36c70e4157d1fa3082c7cad7e360086ca3d2fcee50eab1673ac2c70a5cf01f812274ec15031d3ef25dc18063f19f81d99926f8925beb79871a85c18f1db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b72685215a6429a5c6e7e2bd07b22fa6

      SHA1

      b56b23145d02a451e447a17afbf43c064def8234

      SHA256

      b7cf5e30bc7cdf4a8a9a968706c7e93dfbd485c0b14eb467e73f66137e0574b9

      SHA512

      25ee234bd7b015ad53dc6670fec1cfd0d1aa88dbc1cbc867c5708d28d63dc9f6b1b7d95f37cf5930008da3e735bc7398da0d965d61b378a11f50b3733ca83ad1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      45672c7ba547e20086d8d9eb13ff7606

      SHA1

      6cef685d00a8115cba97421b2ed951f5685d75f2

      SHA256

      bdd206caddb18f50b75668596eeb8c97ee4aaf108121e06a83fc10953b7b04a6

      SHA512

      1abaf83a45c42a126ba6672d2709d300f369f2518cccb3432aec48987e33f3f0958411ca8015df6aa6df56252674c7c7f6178b3dd7b063e8d9591ed43ba4be2e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b56b99f620ca16911bd9bd5c6284bb38

      SHA1

      aaa1db0a88b308f15a32c6b3ec5fb18ad17998f7

      SHA256

      ae0bfb49babda89315e73e73eae63f248f46ddf9664df9ceca81f5b2f11080ac

      SHA512

      5afadddc6f9fbc80c140f13f4373c7515159a4c29b9d8df5168bb64b30abdb3e436f1fc17fb6e72cb7e8e1ec91316148a328e20af4deb8e3f9e43280c8b2a8de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c0e42c59f54293120248a5c19aea3d48

      SHA1

      3b62668df26a42eadbce89747e7894ad7309b9f9

      SHA256

      6297bb138b3f2538824439d95017e214ecd6e0e9566ea5b4c8e9d1d77b8b3d35

      SHA512

      ccf272a8e9886bdf813292710537798a59bfd688aaefeb65dcb97a77fcdc303d099c4ab7c8f2331d0c499c795da371510ee9ea83ef5a98d7ca09c9f14aebf466

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5188804bd85de72a54c7a8e23a6d9e49

      SHA1

      0f042d0e91e3a0faa89dd1534267be2c2a6597e5

      SHA256

      e539f40a3406292453d8b735d13a080af4bd8201fff530f2f9d0b018988dc6aa

      SHA512

      352986da4eace2fd0fe14ae0fa3c044a992964e8ee167b12fdba6f18a45cab51448ac9a8c92d37ec661f006449c23d80e66752048acc6259542a09fcf6519336

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      17b9ec706ef7ce159021ab64abfd5bf2

      SHA1

      bfc894519b39a7d5fdaaec568eecff0015a465ed

      SHA256

      9da065d85f74a549ae4b4a2cd654284eee3af0442a23ffe241e3ab063cc434ba

      SHA512

      6f54326231cc4daecd01928a8d19cd31d572933e66982ae731b9ab2c0be7620f678c131b90eb66ca9fdf2efde2ca55db43af4d779073894b8ba0e7f63e50da62

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8345277e5db4ddb53e3a45eed80c6078

      SHA1

      e3463219383143503ca14e2ebefb0b33f6c5ed8f

      SHA256

      7197f446c8d2622ca9311fb5fc29bf0aa39f1281822a9e535d24de594a527545

      SHA512

      85f38dc332fee147cdc9b2c6822ea29659d6e431c83b8ad086501d3e53bf9913cfbefb7e9a46da67a9abd5d92fa8a945c8d864251ed91514c7baeb8638e191e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1880876cfba7ee683d51464a8d8ea140

      SHA1

      3f533849b39cfb7f6d0cfc49f421bc361e1c79ee

      SHA256

      9126227cf1b29bbdcbc3a9915d7e57857898ee7daa4c38c51d4dd294af131592

      SHA512

      016f58a9e073470ed9d5df4e4c2a9a4efccfba71c21a6260b944f20fb161f88979d4e4ab8743f37190bffafae7b13e7612f8fa25edbf05d7c27a2c6504d85c06

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7b8bcaca453df7c6c617434f37ab9f6f

      SHA1

      e8ed53fa29533f8a412dfbaa8b338f7e11b59ff5

      SHA256

      233c406a548b0812a2b603b744cc6b68a1f87c1378310314fcafce6bc919ebfa

      SHA512

      60ba33081223aa24c4d87d526c297319bdddff127e1503daa6aa6ebeecca42c34b5117987ca1daa6995e0c8302c753674795921437b5933d6126eac4402f9ee7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      afc3bd21d0f41fd334fdb5adeb842c77

      SHA1

      ca3ec85efef9fd2a190467c5addb496cc2910d6f

      SHA256

      c34b9130796f7ec0080fe547900e8d51772dc13f57a5753119000333017ef162

      SHA512

      9e375021023637da114e2ff0962aab4030a2a87df1729e84935800ee5b00fdf1132b7db1a4e436da93e55acf1073772f644b49191df83c9000c986b7380797af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ecbcffa5d5d06983c170e5261c3cf8f3

      SHA1

      952bb97ab776e9609f07a373f1d6945a53c625a0

      SHA256

      5cacff036c09b8720e82068b35cd7c9523f257edc62ca068bee1f3657a3b1c4f

      SHA512

      c50d58b104ce96e1f87fe3b6e02400e277bcf54618b302bfca3e8e61fb04f18e4321b4de100a69931a429d6bbb45ba815a32f6acc1c95c97ffa61ab95795059f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      38a2aee2f6976c76d3a66936fce5b4d0

      SHA1

      bfaed221bd4523a224567e301e1f8dfc2411f6ad

      SHA256

      184a9dbff966233f81ff8e242c82aed8de9b5cb321c1f0a20fd2f4b90c5fb32f

      SHA512

      e9280cf2b52ee49af4f2d1f5bc18ff015e25f83df114ad74520dc4ed5a2eb91a8d73b17075d018391993d53b948a512b6d74b9c33fa304e4cd5920ebe51a79cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      57a385a70b091ff30e8035071220a7a3

      SHA1

      f3f2fc00043f7714f41b54b90b2f5df30c8567af

      SHA256

      27d6f0e4ff9837ee912e299569cac6af42ba8adc52c57b7a8ce446ebcc4cae12

      SHA512

      134c669dc004f63be560ee41515cb8b12a94e852d7485073ff7b852798c3cd1d43aa214879f294c7398a9e60d60bd10f549e0ab8fe04bd35afc337b8d5a489ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b570103676023decd2b4491640691854

      SHA1

      70adc2d42b4d62f2d1c0ff2ea49b28414f59a4fa

      SHA256

      658ef6887793c6c267ab76e759e6cdf388e08d7f8f215f6cc882e103485dee2f

      SHA512

      edf99984ec9dc560c7938bb310dc94e34a5faa2b5b8d8eb7e68dc8852af1fc64f6c7c921b62531da7d32a13a81b32e91ec1387178b0905c48c9c5766b48f37a1

    • C:\Users\Admin\AppData\Local\Temp\Cab27AD.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar28BF.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2492-486-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/2492-481-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2492-482-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2920-490-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2920-492-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/2920-494-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB