Analysis

  • max time kernel
    127s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 05:47

General

  • Target

    a834d6f3deef8f12f769e69511bfaa58_JaffaCakes118.html

  • Size

    158KB

  • MD5

    a834d6f3deef8f12f769e69511bfaa58

  • SHA1

    dc34ed18027763cdb05438533c63a6b7b9a7de8b

  • SHA256

    d006d302de43e316bad7304d776bb56097c265f209f3142ed5d24adc7948e0dc

  • SHA512

    c4d267bdfea839258357591fbec3a8c2697c1c7c25ee702f19f8280a77a801797cb0630efc4787e9bc62ed5cd770238b0ae1921e7b308d08c8d522625566bd6e

  • SSDEEP

    1536:ilRTyllaq0grjedb5dDZcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:iTy5W1ZcyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a834d6f3deef8f12f769e69511bfaa58_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1604
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:3032
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:472080 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2288

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8da59a977a02b1e5416fc0ab916ddb36

      SHA1

      475e647523ae98fa6c3ab2e9735624b144b8c9da

      SHA256

      cf7d03b58988e8a8fa7c17b6c30eb97dcd6d6c8e8f979f6c8d694079a5ff5ffd

      SHA512

      42ef7e297d06e35f19c0349f295495f67f5f128e49edc3f04ec9a5af3fd89f5024b34c9d1050d8e501a90ea98c7548a2923b67a55dd2fccc7ceb4f224b9f9f2d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ea19b4240d4e2625b7a81729bbbdbfd5

      SHA1

      2222b9ce3fc30512b453c769690aa29d76c7a6c0

      SHA256

      ae40a7bd495bb086e8c9ef2a2be30f98c7763107afec085b3ade2a0b30852947

      SHA512

      f5d86b25e3755764cc0102c32224a7378653125f1633e3645a2a16a746adddf8847a3cc9ac353c4f3eb8b942625bc35e30eff87c0bcf4326bdc244ddaa0e2968

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a92d588d21aeab854cee777bfcfe9b4a

      SHA1

      d85c4062d233094f432bb4834b07458ca18e9b14

      SHA256

      ca038c7ac917f687a35b4b11db058ff753e6c2bfedc35edee70d858bc60e9518

      SHA512

      340ab503b0aeef716d6d657afd7f3af358aa2bdaf39d285acc2ed0e31f46996662de829c72641cca99893a4ed3e934cf31f42b4a126f164b2176e74d303e27a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      09c4b4b0c6d049ef963ac841d4fe1248

      SHA1

      5e128c3842c894da6cf50cb0b3fd4f27f7321947

      SHA256

      1cef4ebc43fea3792a9852d8d3bc4808a901380772996443c981c425a6ac673e

      SHA512

      e7935672971f15a828dbeee7a0c296bc23093d325a89ead0c6dfebb8f0d43512d8f1c16c8b3b66ddf9bf0e1dbdc4cb17fe2afd6355a7d4fd87f069ef24c3711a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c0f519ca0e314c6cf4a6955dba58195d

      SHA1

      88444f651e700a8d7c5ed3057ba8be280ca0f425

      SHA256

      5e5f576914553fbe543820841f9def1f259585a0370468b014f73c6880bb456a

      SHA512

      9adacf220e3b654b82c69a9ba2fc0c3eda4b69c818d1319da01f6cd6d1068c6798ae41e9f02959530a215151244a71c10c43e675728cac97254f8c5d200d4080

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6f3f0bd6b9f3337ba2de60ee9fd43b49

      SHA1

      d0e747975cff2fb8dd4ff05282b36337911ccdac

      SHA256

      d22be81bd4a000c03e0494c47e4ba7b0e4896f6b11a614b406ccbccc6b1701b1

      SHA512

      bdd81df07ea5a42a451e0f0ba0ae736d8501fd8729e61975a02d7e42e8093b48475a60fde29b978fd2b77ff16db7a4fde3100c9c90330c9e4f1e1449069aa9f9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      42fc26682e7c15220f64c419f24bb49c

      SHA1

      817b9bd682c0cb0edfa394219fa65e2d504ebeb5

      SHA256

      52b688ca1b210d02f5f80049e4a192687538367f8d969c9ed31fd470ed4bfd48

      SHA512

      883316c75cdbe90a68d4b289080c1e00f3db3bfc76b4a3312c043dc2294a7358a437d65a56fda7a9ed10ba714ccb1e04eda1b07320d189a37971e2b033de89b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      561dfe0d89d02c46628d57e3f2a477ea

      SHA1

      13588ae5ec9b32553eb3150e27f98b41dde79b16

      SHA256

      019f670fe9e65b7d31e61441825b3feaa97e691f66c18a483b40ca7a8c824be7

      SHA512

      e668e3a8ac8b38279690924fd039b37eac6938da67da1dfe6d31bfe168996d22aef460f97059e962cd5e5b82584c84385dbd6123fc28befa93fd53244eb449d0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c1a6aba89d19f49b5451c11d6c7a0a9c

      SHA1

      4e7874f61ec7d29f7064e43519dbacf14cad3abe

      SHA256

      3901e649df313065b1d190795f259d82ddb5c1ece17d8a937fbbb0f1400eac51

      SHA512

      c252683b4fbc8825feafe49b79be80c87a6b0286ec5f8e5af56b8e9543660a2d03de001c307be6ab1c4cff14f7758eac10ad2a67dabf9e91527d343056da6829

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2a99b6a2a4523143fc3aee70e085c677

      SHA1

      c8ca7fa89e5c935e90426b0c157bbb55020ab1e6

      SHA256

      7299814ffa769ec0131e3eb653180600279f59205a99b602f762956cfb22f2ac

      SHA512

      ca697783330f3c08ac5efcb4b48ffced935324446f8bee0a0df94f61d0bb3e98d9613927d682b14904506c3f66288ddcf94e6222e18ab0f669577dc42e464460

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e610863f609fe3b6bb89cb1c9535623f

      SHA1

      dc8031ae8bae534f0a9bd4cff6366d52539bc253

      SHA256

      d08f42cb1c73a6d97ea351ce7a5e2da2b140050954d3fa8937efb86227e0582d

      SHA512

      84d43871da1ef7a003b6b1f3322d4f488a3386ba75a6a2f74d26a076d758a969e7a12a0d846a85f0b5bea557806151506266f1f7934e789d92a0afdaa89b7302

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      33a9c762bc52a9b6295ac77cdbe2795f

      SHA1

      d594c23cf8b94f09f7b562191c9baae4e5edd44d

      SHA256

      e3a9c87b4d6677bcdf4e9b01a18619f2f10027a2c7a0c3fe5f159e2a1b2c5f59

      SHA512

      c5a63e80eb611015f7bf52f73a1f9c338679ef8efeefb8e2e0e907a1db3c19d3c06522f1e9b5c6c14b05845c6c891c9ba8bc9b3b2d7013b2bb7a4753b8c7d695

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      acab28ad88d84de8362e08b2852e0b11

      SHA1

      df244ff282803565bb9ee7f939cfdb3b899be164

      SHA256

      269c927bf490140a7c272b13f7c46f7742bcc3859db25bc58aeeeb24ffa870f2

      SHA512

      5a9c4b771d696d021fd2bb5dbd6876d7635c0bc07589239aa7fb4c720b47e1b11fd9673c6a1695085f54dbf1a7de9c1d94ca2bb2eafe2e6e8e4ccb890a5fe039

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c0148f0183c2a91575fc3c91af1c3a4e

      SHA1

      86960453ed52c7214de1434dfa778261f3eef332

      SHA256

      6deb41cb18fb3b3594af5c161d01df0d1da378114be862a8c060f2472d2ae42e

      SHA512

      3b47f86dfa0346b3aeef1e207927b3208ecc79071f3990a1388f2f0ff0a2ad20249a215e3e2159de99c70fc217e626aba0cb3d856876f77da1fb3ee527c75742

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2c4c86de57620980d63206d3a42c0438

      SHA1

      7cd0b555c7a55886cb4aa46ba345cee1047de008

      SHA256

      fabdcdf675fcd9e1f12fde6bca592e1573ead188c1e8328924c70bb199f056db

      SHA512

      cc9d682c71e65377010409db8b44e17f149ca5e78f8889d3a49819db7c3cd0f98a597c69acd6a0c21347bb8703ee271fe6c7753ea93bbe0afed7c5218b2de3b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b7b87315b074b83f054b927328f31deb

      SHA1

      c4be1e12766584175a6bb7eb8c3ff15b6a313f4d

      SHA256

      9bab9c0b7b04b8b9c5991888b6b25e2da7474eda0948d3340ccd37576eb2e637

      SHA512

      9ef6ad231812a6323cc3b609087555566b940bcb3578a0eea252a22d472873e469ff75fd0239c50241bddde6d115686e318d0da134eb800dfd681f3db6d52842

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0d32474662a81a41e47be7f9600cc05d

      SHA1

      751b0f2abc55b5955ca9138d186cbdf27d72858d

      SHA256

      c854921295e90ed96d71b206cf749569e58d77c0a11fb868d79c87123decc606

      SHA512

      ce75d8ea9719d895e42617beae269530f168c28af5bf2789308bc25324f8ee886c3eca8c1c6a198b640f06d5fac44f0e9d3b3641a767cc38962458dc3d99ffd7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5b3b5da6234a0f7598307a704fb669bc

      SHA1

      5fa763699f9226b3baf8bb230e89fe4d47bdd3a9

      SHA256

      5b2c9240c30dee50edfff030fef27de760ede0a6be858bb97ba624292980dfd9

      SHA512

      553abe8eea0eb8cb41b63f298556ce543bac449313a1625885a98197a3bd9d9360405c0521c8516550b1b26fb3e8b9f308e5472a34e3916f027caa5b721dcd13

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9b2b306be8b352ae97f95c9b0f7be9ac

      SHA1

      c2b74b82c5a92bb6eed4f6c6e9e7f89a570b2882

      SHA256

      06a2a14bd619ffa4572daedccc63287727b9fb3ee619813e347b7e114cd316b0

      SHA512

      27209375541f16f5a3121faba29f25d020480d0a8fd84e9d3f42b99ab53383753d937948f22f25dff2c0acb6f3f84dfe8c6f0c01379f1fd3be106c0c6b58761f

    • C:\Users\Admin\AppData\Local\Temp\CabBE5.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarCF5.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1604-490-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1604-495-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1604-493-0x00000000003C0000-0x00000000003C1000-memory.dmp
      Filesize

      4KB

    • memory/1604-492-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2920-489-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/2920-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2920-481-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB