Analysis

  • max time kernel
    137s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 05:42

General

  • Target

    a83148f06bbfb0b4528577c982ca0398_JaffaCakes118.html

  • Size

    156KB

  • MD5

    a83148f06bbfb0b4528577c982ca0398

  • SHA1

    8c59bd45aeda80731bf4804d2e5b03ab28bbaa67

  • SHA256

    d7a4256d181982ec680ea0f1e384196c089c9feaed4fb09413a3088957ad517e

  • SHA512

    5550fa8b2a13929c709e770bd129166db06110f48a02643ba075c07c714d940a4ed992f861ddf673950a8a9a3318eee45cd7d0b20552d28b191895218f987c96

  • SSDEEP

    1536:iERTmTIaYizz7gRO4RscyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:i2e9gocyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a83148f06bbfb0b4528577c982ca0398_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:328
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2944
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:616
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:406539 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2900

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      30dbd56a2ce80948e352c891e2a0fba5

      SHA1

      42909b9ecb2371feb95759cdb53c0fcb982cdd5c

      SHA256

      57f9b944aa8077d1157e237f802b3e70c9b770c962873ece1a337e25a56f4a59

      SHA512

      e114eab6e00e807b5013b1f8dcc7d4166fc92bf4e478a5c89b3a9625e87b08a0ead8b994d2d31340fd473e00360bbe1513f73a10a1673e4800c4d7c068e27645

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ac431a477c62b23e7a7fcf0c7d9930b4

      SHA1

      3ebbe698ad3aff7a9558b9d88b41786ca2dc5117

      SHA256

      6de902be6aeba3fafc474644fa109f072db3f137ae1c0048f6390f85246a65f4

      SHA512

      45d24c6e1e1213fc415b9db6c9c6b2f62384103f2553b992e3d77723d667a920680dd0e29e698a73c1a9d4ec2bed8263d6002745539a3e552d2fca68cf44086b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f57f14a806e5f58649aa224ccc92c271

      SHA1

      fea64af984c35c6256d17552b4c57aeaf0cdbc04

      SHA256

      23e514356e5f125817f05d64dded6c9f1f7056abd8fa34ca67a5a3a12d4b0198

      SHA512

      b27f465d3c5b2cbef1edb8cabf4430f7b79eaccfd46924ef95fda2d35c1aca434a59ce71cc3a2f7b45e542b5a3b370e0d4c6dc26336080d273c7342a12b6a156

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      72f890ce7456a03eab66d11cde731acb

      SHA1

      703d0f1a0e60d872e24be42168230227900cb1a2

      SHA256

      cf145844b9cbfeb6bfa512b894077f1dff4a7d763fd18dca4e25a4202ee872dd

      SHA512

      414aaf8738c0a8f7e296479d30464d8253347b2057efba50ef46dec42f83038d05091986ebb4cfc98b4974a2e59afa4ca9deb91a11b9492a158633064bedeaba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      02d6b1258c4fa8b13a549023b2755c21

      SHA1

      be35d8dd5f6abe7ef4cb91e8f093baab3804287a

      SHA256

      363f7acc046c046e45f0dd9c9461456ef61c683f1370975840e149e42a28fade

      SHA512

      115ad7884dc2ed8bf79e21f8f5b22726fb1f457e81b09ab2dd40557741cbd23b46d7f0e3a06e7d64e7af9213c8a46e261591df31b4097d94b6550747661a0c3c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2de825a4329e8b6abc291b4fb1b7ce0e

      SHA1

      0e8f2c70d36415ca185c5e220cb51b7e4747f973

      SHA256

      53df188c70b76ed8c48a67315aa3cbd607d448bd6cf5e997bfc0cf7494ad49fb

      SHA512

      438b9f357fd976202ceb78d7a82c10c7879426e88f693c0ce72a6d6517e6c004a4c6b1dc17c29edac06fcb3972ebafd2b5f35f1ed37774f0d45c1f7e5b4b06b0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1d40880ddc22f66f13b9fb5132e9fe2f

      SHA1

      6fcc35093e5d7b96bf12ecfc057270af4b65de9d

      SHA256

      2b85edfbea938feac049dfdf1d8e34af69cdbe4a957bd9fc51467821e596f6c1

      SHA512

      dee0ad1fa936ceed2e2925ab59a6c5dbcab102e5c4ce6081864f8f17e7eb95370d52102b4857f476bfbc533c9b47d257be9656ce10384cd44cb34b9940629f50

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b6481ab66e3ec06b15be2a2434eced48

      SHA1

      7dfb274510e20b583914bc1f64de0abe4d7f63f7

      SHA256

      6ef3fa5f42ade342bf742a66ddf477c5b8c20c002670f171273b304d962080db

      SHA512

      d340fee051a06cf750dcb1663054bb92cccd7e572922e0e0b4fe478ffe29934fe5fcfec6d89c581eaccea684d9e0b9f5220af47b2215c574b1dd0f1ec5718034

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0658657e082d90cb41ebd91fadf73216

      SHA1

      876b3e229443f707543eded3b4f58169356eae8e

      SHA256

      f2ac4444634943ff1305eec3a97fd0c79266dde83d7c83644c322855783d81f6

      SHA512

      f0aaf86e82d1779180555c94a88b0ecb575623435b46cadfabf6a017e1363ed190ae8450cb3024a1c8d2826fe6750400821c9a2cd892b4c2ec6dd3e2081f542f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      110c946b67909c3ac67775fea747cc1c

      SHA1

      53528e3ba2c56c0c724ec7b7ea05e3bdf880184e

      SHA256

      84551e8594015209749a2f862c7283ac32f160555303466e597e2797b9415b6b

      SHA512

      a7129f4436ef30d2ac20e28a192558239dfd1374212d1511e45e2211a7735247342382f5590140f7d8e79ce61602e79e4997180f956d49d3515b9df5afa63f20

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      80a3d7bae9c02678ca47353b12b98f7b

      SHA1

      36af40779689f8671497899a294f0cdcb52d9169

      SHA256

      885f2b7444a1fac678c53a09c5ae3f99e63d5e8b32104ee44f6107a8d7cf0069

      SHA512

      1714c3063daa8eced197238fed36f08a457d40922eebf8333d0c7ddc462c29bbc834d9cbceea71bbf3dccf5c234e87672af5f8e92d2cb1779472d131c90d7a13

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bd42abd4eef2b6950175a77cab1accd6

      SHA1

      d82b3cbd78bf14d0dbd9d9d89107ddadcf2ab62a

      SHA256

      a0707c3e524f24e8cbba86750f0cc537aa2397bfdcb583520fff9203e055b458

      SHA512

      4b30ec377099780692620ba99568b9a8c008c9d4beab57925bb2d549e362ae51bd1c13cbff0b313d0809d3f9b4aecc6f98ec674579c361f6c56b3ee1ed7b7417

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      cc916e0d8a4452860acd8bbf81cc7df5

      SHA1

      b79c08be200ccf8470af2d8425370faad656669e

      SHA256

      d7d5ee75827c6b2cc6d682024ea7675ccc7cae2111434365ed6fe9f710872803

      SHA512

      9660afdc39f77172b402804d4c3fc8f07192c41e8b632e51a52870a8989149201338d4870881495c9e9c996e788bb43edf8b471f3473f4938716aec517b4d9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f2446ca45b310612565d84ca1e727fc5

      SHA1

      e5254ad8f0b8e95c4f1c7d786d18d9ebc14869ad

      SHA256

      4f7aef7486adf094339dc9792427d84ad775e853c771a675908f0524abff0adb

      SHA512

      13d38300b9e86dfaae7d9d8fc8cab52020e854867148dc05837fcc137caf666f84bcbf9298f73e0f108a4f716d1c935b86ae05a97fed442a80836018981897fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5561869c3223d63c620f7d274f7b8e78

      SHA1

      b6ee7ba61c73295c169238b71dea7b754e7dc1e5

      SHA256

      37ead9029bfad3c4dc514a0e00f65aa0766d24737d266d4a90ff88a33c6550ab

      SHA512

      889a221d93cab9be5b401b201f3227079c73c1afbb2c1cdb1def6215919354ac6aa276d18ea59b65f7738ba9db115c0f646a3ea2504509c02abb311e6d862eb0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a994d344f6119c6baf5ed0b1613bf4c6

      SHA1

      2fa58eef054d54c7336246739b4706b2eb62e370

      SHA256

      ec851056199860f073b37136ec41252de3676566c565a49997be12b8d5f8e0eb

      SHA512

      7b46f7c52fc7e035c5a20734f3d3c8aefbf3454429b53d66ac8d60264c194d82d5382cfce3d26bcb57f861859ebd67b88d0c7d36a6ca0902263d3c3b876a4189

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c6d1182d6555ddc7a6647f38977f46a5

      SHA1

      3db5acd348270635ad144932feb79f9ba43aa2c4

      SHA256

      fe2e052e4cabb6e152eee91edb67b2d5ac139c31b3e12dab70ecd356873a099d

      SHA512

      dbbdc4faa191bc5a461ee898cc01f7c177c2c2067b25d3ba76b698740ce17c551e8266336b1037414ccfd0957ed1e212efbebd04b8a713c32b4596a9e0558948

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      94043159e08ec7c8e93496700da56ebe

      SHA1

      c559a3a6ff27d99b3ec55bfe7d14f30c6863bd2c

      SHA256

      236e3c33bebfff7454158b4d5bc2f92da8ced0e426e111edc0ef9ed6c71c51a0

      SHA512

      78a9dcf72ee617723dd5958df6792c2732aa12e0348df70bc89cbb13c9f90b6d58fee7351a8b1f87795a9ec449cc9c21dad09b6759cce9959d778db97c6d54e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7e6015e4337595fc61e6f678d35b87e5

      SHA1

      3cd3e1d442c4d70f2522d437647ca05d684971b2

      SHA256

      c35963d7c6f4d093c1b5f6e9d80a4e589acad605369aaea5d3929f90707f7f88

      SHA512

      c8415333189e9f9a55f9165e3cd2583ba15b670660197d017dd53de290d5af8bfc7fcc1c735bcf1f46337bd1e1ac7d269bc1ce765d8308482f297393f0121b8e

    • C:\Users\Admin\AppData\Local\Temp\Cab22A0.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar23A0.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/768-480-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/768-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/768-484-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2944-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2944-491-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB