Analysis

  • max time kernel
    130s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 06:27

General

  • Target

    a854514e9165e49dffa2b5cfb5b05d0a_JaffaCakes118.html

  • Size

    158KB

  • MD5

    a854514e9165e49dffa2b5cfb5b05d0a

  • SHA1

    09ce1f4295dec45df2b081e2930d0b2b605fffd0

  • SHA256

    433c6828ea1ace79678303dbc0205a79c789e1a9bf9c0a25b5d42e265c1943bf

  • SHA512

    404a78f2d44ba08973efd1bd1b7011137474a7dc88f8a57366a31c1ff5a29fe96529291eb4d3d8f1c224b09a7a2be8c794fbb2cd5783b8fc3b951a32c367e2c2

  • SSDEEP

    1536:iXRTdk9koQIlh+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:i5jLIf+yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a854514e9165e49dffa2b5cfb5b05d0a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1752
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:472080 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2352

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9771dd6ec9dc4e01248f6f68f16eaa82

      SHA1

      a49a8c5a40f7f70d857933fec369182e5290b6ab

      SHA256

      a1484fe88abc706e8b27f44d2f96338c1d813c450042f3ec3b745949d95d7a39

      SHA512

      aa9ff71dbdc3fc2b1ae209c330c359b85ab917491a81c10e16048839e5de1fa4f076044eafa39d588769ad97fc008a5e0a43c5c1727e7ca6913ca337f5c8b193

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9e4015506e642b1271c56bae232589da

      SHA1

      0c524a6417f47a9f0e9d1d16b2f46cfc4293eb7a

      SHA256

      4d95901c607ba886986acf4a5216e1e72fc88660196c0b7ffee33b990f27f45e

      SHA512

      da1b3ed96c391707fd10a74a8964da360bab2f5f0b49d208ff7676f29449b6409432536554701110134b965c37d120aa372172dde24284e41f6731ed51cb7809

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      29c5d90fd886d8b5acdbd694ff862ced

      SHA1

      de6e8f00dd467429b214aa4ed53f7ee1eef8c703

      SHA256

      b934ccf0f87dbe7466dfb19e192f4e0968ba61431a47fc7031d7e63aca589778

      SHA512

      fd03752ef9020ff758e75cfd8829491f3858ec9c699eb5fad217c4d5d62a376e94001c3eaa82beb9ca63bb1bc488a2561523b1e37c13b9b8bb5fea3f9bd779f9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a04a4eb089dfc3526a62805a19c49017

      SHA1

      896ec1ff5932a4653d06169f74516941f14f85cc

      SHA256

      50336aa93c0e9e8895a4db0d5abc9dc2d281fe3b33697262f2c31972a059b987

      SHA512

      281eef3f3ec66f43572a1c165f26914c70d2cadd7b01897dc6b0077ab2d703471cec3787c6b99c18a8571ad9ea99ae325c3dd2ac5703e57b573e830152e0c9af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e35edf0821d654f53c9756f34d5a5e25

      SHA1

      a5914c939092cd40512ae2674a65011fdd2ea6a3

      SHA256

      5d40bace0911b038b7bc50752d4d98a21f5f9f0501d22ec6999a12c56ecfa213

      SHA512

      bbe6641d52776f06f947d4ee2f53aaaf45b3a48e0fd30462c7f6749ee3f74c8d896bbc6979c2b4c07df2eb037ee830da3890cbe52fbf944cd8bb59bb8086deda

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3bc79983fdbfdfa75ca452a430a4bb1d

      SHA1

      bfa333c4f93e80380082e9d73934df20b3114220

      SHA256

      3fb1ec785ebf82cd6014ae2199d718c11c86cc16b0b99d1ee70ba3852dee89d9

      SHA512

      50e912a7a446a219c2a81697f872fd2d676eb31b7f24bf05d516cda4153db699da403ef1c981330c32166980e8aca09ce9cc7245e3db5cda58bb24f930db93f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fc4f1ec2fbfb007fb51190b4a427d5cc

      SHA1

      aa43abbe04613f894ede17dcc1a21032b3c88ad8

      SHA256

      ef5f923b9b4cfbd88b2dda80f017dfeea7db3159a03eebcdd7dee8fb887a9a61

      SHA512

      2efb9f4fb6f20d44b85c53e237a1dc9b233545be1a254d9653ee2c3f69ad957cd1360fa823e5ce45806939d137a511076d570eb7407b87c468575e1d680b9a41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      29ed5d6d5a125cd8ede107e57d52a7c6

      SHA1

      2fe599caf5f0de2f9adc3b9f77409e244c142eb7

      SHA256

      c8114a49ee1d75942859cd82291f77dd4c6c4e034e20d6c4fb6c39443b373d62

      SHA512

      984108dd42fe00dff384556240a52d6b040ba5d8567fea7fc550c4e0de2049ffd54d39944271358645fd881ff499a29463a6d3d5dbe05aa00974323c82c0d6a3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8ce41bddec15a51ee466a14bbe392729

      SHA1

      6fb205ca19b0573366721aad218a3fc43ad6ef61

      SHA256

      21d99ae96e951566d462b11a37c2f43071f7589451740794ebeec3c1965b9863

      SHA512

      45dc00da2d7ea72208314bd79e1e09ba5a9c3eed870872f1b620a51512d8855a6f6e2bd94f7de2949f23b460aa8fd8dfe8edc87aedbcb90261678fceee8f6ca4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7b31fbaa3a593bd36a780027738babb2

      SHA1

      735f60696a48a943e275529344b21284801da9ec

      SHA256

      13bf87b1c21ae5ce28d91d62b6de0c345f634948f5528e6442c98a1c40d931da

      SHA512

      c8a79a0e57585e9ee140f3b91d711bc014efb6c15bf6347bd5902183ba2757d64e52ff44105acaeb8ac56b1fad154d04f5c5154dc0169e5e899cb4d523f76861

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f585db4df9fa5afc3c372958d5330b66

      SHA1

      98a068b318df89eecabe28f932c31793f6835f62

      SHA256

      8c6577c47df983d7ecd45c6ff40b25a86a04afb75237cbe6e9ec02f9991cf2d1

      SHA512

      73d0419b73755a3e65e5851b8f9d841759ad2376fcbc4700728f41d1d335808e782a1703c94f6edcc8f8eb7f0b1657a084648894a5e7e57e9d1b26329643c0c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ede24f588e33e31b6845bcd6d04630a3

      SHA1

      293c79e0df17bf436fea9f5c7605d478cef06882

      SHA256

      ae87586c1851b2d90c439400b6f57168dabf96bf2c637966bdea9303b3886cf9

      SHA512

      a72cc51b6577ddb9362797808a9e864995f940c366b48dbf6bd421a347c8f312bb6af0d244d299eb70df56d92ee19151791b31bfa3ce9cb45708cb19f0943f4d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a68398de89890d81e444c686f2b99273

      SHA1

      f9269d820dfeb40a5f713fa93b2b0c1b2c22b036

      SHA256

      61ed889d663d055647d9c083a4998be3c177c41c5a5bcc781496ca7e55d3c2ce

      SHA512

      8dffc60cfa702ada2d94d156a41f70dfce26bb6b9844bc94743d1d8ce14c3c888a0472375fca7255f5be6b0805836d39428ea3ad519e15943e87ceacf60e4bd4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bd214ccde862f7b3951a752fc33047c3

      SHA1

      9c90f3e40d88d2fb4255c2a0e506d6f1a30a1ab7

      SHA256

      d970d4c264491de3fc00ae7cef35ee203328cebcf81d37c713940c426898a355

      SHA512

      4ca5f823447d085831fc8f2b1fb3f81539e3769b56b952d08d94c917638f9cef3dfbf4b74c429e4a651b980585c75877255d3504dcbc30404fa94e95a57b9996

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d45a91fa31d79571c88190724311a929

      SHA1

      d016e84fa75939079e534b657d9dab2ea217a113

      SHA256

      51b197e66ff03e5440a76a88fba25cf74824f2f248df945dd714c10e79f15670

      SHA512

      b5dbf1f875c10cccbe17599efcdbe44c4ebbc519b686d699aea84bdfd5aa91227ed8699a97c516b4c146bea2b9979f4b946654304a88d250707311b6c65e8ec1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      834f565de052fbdc463665cbc53106c8

      SHA1

      f664f725ca3312041cec29b0d25515af5302053d

      SHA256

      eecddf6685ec6e877ef03cf284c21283ff3558615feaf68bc30777453b30a166

      SHA512

      b4241408484d9720304390a87a491452d0b0d170113fc84a33bb75e881c5e31ea27914a680f0d05c2e1cdb2ebe0ebd8d7e09c9bbe1956de7ef3e3402eef542b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      18ed187af50e5f6adcf91ebc1a933f9e

      SHA1

      a3167f306a96a72cecd974dd57b1938c71c50a0e

      SHA256

      7e130d9b2da634fafe597a32e3692b164268c34cd72043dc8ba628d9685f0e30

      SHA512

      98883849931f739a7da5e42a4dfdebe0dd28b15d94151995f16d7955d6970cca11a5d117215236d3fbceb4699fbf69a5c56a3b7e21284c7cff6146be9f07fb58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4f139731ed653a4416854d8698ffcee6

      SHA1

      6c2e517aef434df32859549f3d5c84a4483418bd

      SHA256

      911bb457edb8f042476d350ceea1045bed6e8bfe54271b8bd8b2a0b819a668c6

      SHA512

      c7acb228c4459097287bf1d73a42bd192e9c524b9849bb76937d64d99580584db6bd12c01850e8bd8335ba4a580a7f48a989986f8ed16921092bf290db91aed7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0ed5a48d6f2a5d9268d13c2b50616a7f

      SHA1

      f0516dd7925a983e0878c6b7dede58012ae4c0e4

      SHA256

      cc6f1c17a35faf763c2df92bf7eab94db976cfb4360b37963ec2b7bacc0e8a77

      SHA512

      75f7bcb42e41667792ada6c1739e98a2b66b0565d2197c803031ca2a15bde5a7b3b8b6bbe848c5290b9faa0f103e9547d5014eda1812b1bbd0c9821da758342e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      92fa8d4317628b7512f658966a3611c2

      SHA1

      7df07e2260afb827e0b64b241637e9e2a5e6f7fd

      SHA256

      9a80fabd777e21b007b16997f26b1fcf90139eec8060c9820289fbc4381526ed

      SHA512

      f9e818ce663010ccdc8604d8cb987393faedefb7449c02c1d9ac56493feddd3624eeb44117f5a88daed990f9ea5ba4f64887a4efcb35cee61302a41f0412b4b0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      afdf679a7760e53580f4fa8e20847a50

      SHA1

      f0c7bf067441f79d143eda9265dabd4d4763ebce

      SHA256

      a61ac7335e70303502ef480f41b8aea08ba3f38bed230097250f291da3719bad

      SHA512

      46eb170ef4fe4668ea2cd2458241872538e178c48bac807f4bfdff51273a4dd132f7f2c9d1b7ed1441bbc225c5e9972546aab13049eb8f055569c19f6abe1f02

    • C:\Users\Admin\AppData\Local\Temp\Cab208D.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab216A.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar218E.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2224-494-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2224-492-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2224-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2224-490-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2392-480-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2392-483-0x00000000001C0000-0x00000000001CF000-memory.dmp
      Filesize

      60KB

    • memory/2392-484-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB