Analysis

  • max time kernel
    133s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 05:48

General

  • Target

    a835a5c2f6424b4a4f2cd5867b88db44_JaffaCakes118.html

  • Size

    155KB

  • MD5

    a835a5c2f6424b4a4f2cd5867b88db44

  • SHA1

    3aaea35c70c7f7c2194a4473ad2222125a385dd7

  • SHA256

    766135195704d1a0ad4efb5ab95b0f781d314352bd7f6b612ddec6e44122b562

  • SHA512

    a8e6e2f2271ca0a4eb93c792660fd0bcea8b894da1d4f2eb79ed9d06b60068b55582faedf967104a4432e0472c7f031fa88061077fcd67714f534ba86df4700a

  • SSDEEP

    1536:icRTtFcc0MtCA3TDz6FyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:iezuFyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a835a5c2f6424b4a4f2cd5867b88db44_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1768
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:836
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275469 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3032

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7983aa995eacc06e42c9b0d59da4fb70

      SHA1

      60ed542066c8d535842da5b844f88525baa10cb3

      SHA256

      056ce95ac635e5b5eb62cee7a93b3499fc24e877b6284cf60848af314d502687

      SHA512

      492bb49d22d8e11d751fb022eec1c9e31d15b22f59322a2c1346d018a7d23c873d528b5be7c527caae61a5fe670fe27de4a05fe1bf98f3d23e8f4065206d31ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2b0af4a848b9816d2cb348cc2ac65408

      SHA1

      d1e5033cd191c040a26b4991a54d68688397fd13

      SHA256

      31329461e452ec19ac80f94c42e5c0eb613b1a6566d05ece5e55501d3bea1ac8

      SHA512

      1a45802ff2cf724c79afd0fe8f52b7103575427fc304a1e473d7a543b74e7fa24e96ca702f7bc39d3671d8778ea34b6c553ed6bf8f2e77f2e63354645ce0607a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a56311c5bb56b2a1915265a76168c007

      SHA1

      0300e9584cfc8db648cf8b87ac02eefc6b42b069

      SHA256

      60017600aa22cb5f8b07f3d9e87810f59428796455c35b7e79a05dc73173d97d

      SHA512

      e379748213337baa8434c90f4436cd9cde1076a0ce3e062729e66a76fc0a0a74e65a71d8ed42fa1926a0023c442168ffe60cac17836ce934405a00ab193f43f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4053d1d1cd17ccea36824195236adc1e

      SHA1

      6510da4c73b739a6824bb6a18d8ec6cc8699f0d0

      SHA256

      184cde2f40426feaa4b3a50dc735be58bb54bce4b6c14bcb2db033a6fdc65bcc

      SHA512

      98226518797ab427e49f6cbcc7276395170c6c9751cbc54c2a1f612909cfda5c849ab27bacdc34e9c11446d1290ac59256fd3ebd4a49c0470492ff07973886b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      739e9522e05833dec09c2654ab9b38db

      SHA1

      6b3859003f5a530fedc5419ae819ba8907698850

      SHA256

      0da1643210bb500e4dfd45afc3e06bae6a12631ff5bc7c5dd3d3c779ff41253d

      SHA512

      a8a67e8995faf5665908772ddcdbf6149026f8bcf89b950654277ac66fd9bded39aa3d66f3743411ea8bc8727c80ba509b2efc050ff1ae01ab8f1c11c92f530c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c3c2be0713b59e1114dbb6929e46e6c2

      SHA1

      4692b6f1544b4cae93bd0869cce9f6c6293c9408

      SHA256

      401f038b45747647e6b47129ee43d6cd8a344c01c0b8852527fa5be42123f7dd

      SHA512

      ae77e81227a6c752346056d5b95ed366329bbd0f18fa55bdbabfb1b3323c775c2459d9c7c40e76317a20d005bd47f5e45c1a2ce21cc5e13d3a9a02938febb195

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ff99125323eb827fe79200950ee3b6b2

      SHA1

      4d369b4775d390f1a055daadf898dbe849ed5ab8

      SHA256

      ceb1f4498b6d8b074752b2972b19ad73352605dd3df6f9fcb82e93136b45bc3b

      SHA512

      56b1571e8c7f3aed12a6fcd0ee1c1a026cb722d581a481965c9ff9b13adda14787cb5cbf58b99616906f1eb5359da2c6c1017c23c37a19f29538e0322e56581a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ea982e83e68f7c333e72317e3db7698e

      SHA1

      3bdc31b38493403e7631eac44374d13cc1018eb8

      SHA256

      16522d14a78098476dc666f22c94962c15f8393ed630879249c3f4a3d7bdf152

      SHA512

      38d34105600bb86fdcf4a95531a3d9dad65f88ec665f16fb0826ae1ea40a0731a65c25d52d8fed627ce310709ef9dcf8e330f3ee78863e549fe9b7eee8926e39

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      80541a5b2706a0159cf1e7e398342e35

      SHA1

      3285060fb294e7b15a03d3b519ea9b4dae3e4882

      SHA256

      74728c07fb45270e6418eca751cd7eb4d1ee7e2d062d4e0cfc86c573915e51b3

      SHA512

      31ddedb30e5e20c0ba73a97d20ff4b303cff8c31c5c2a26fe25f70072284dd7b53a87068644c6b4c6bdaa85cc55ebe2f0a0bdda49e3dc0798c6c0c181c1ee221

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f5e75a8ceb8492ea8be3a3d330f64be2

      SHA1

      0402f041f29ac532ba156fbdc8d5d45cbc3069cb

      SHA256

      1a8bae74beab9e6a878fe8d04d2a0e9297175668864d8d4589e60ed53fc78e61

      SHA512

      54607159a1ccdddc90a2ac3a534b9e66ff114a200c3d91f63aaf980e5a27c946a514ca465f4be0ac56de460b0cd6afffa656faa21422904e3f0e254729695414

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c644a40eb6b0e2b46c8d4d08eb74c89a

      SHA1

      e18a00a9bdbbc130668dd2689842de5ab497241e

      SHA256

      fbb7d67ad9a67ad3effb9030e203602ec7db3dfa65a105c6d9f1239675a170b2

      SHA512

      348009bab9df20e24f5cd047877c5cac3baf643bf98a9324451f876fb7c936f41038159ad8770abd2b028d2c103a25932edb0be6b04a56605975d954bad78c44

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      589d98bdcfe4888f88d4455867a9fa30

      SHA1

      0d1484fa965a67d109dde889e5748f363b998225

      SHA256

      f163dbd3d2004a514b59b8ff42648d226e8e718e892072f5229ebfc29c9076db

      SHA512

      2c32dbc8d5df0d4b8db6e4ef276c3a0dd54f131729ba7078b3fdb9d27b880c283d7cacdc583ad493554fc5b12dc34bad2d2f5176bf518028f627c031e6f778eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      262f8d59cdffc02a87fba1030f9c79de

      SHA1

      ff9ebc27be53cfb084fcf416363426a5a40b2e25

      SHA256

      ca868b8fe49368cf074c4756fe6b1bf5e39ef3a96d36d5eb9ab80dc0a646a82d

      SHA512

      c2cbb25a47c3c5eb3db9a4f138750d72d4e616940b1b47909abb59a1bf6b2eb05a26beb71a42cce311a4876751fe97285bf4d194a4783dc6d8178ef1aff1f235

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6ec9f674a4859a95439d971516177cbf

      SHA1

      de41165fbca215afccf90ea74ae8b99d2253f236

      SHA256

      cf9f23d269ad6e40fcabe29f4ce86a04a2d26c1c97059b108f1ca8583aae2e97

      SHA512

      33a1a56e9eae67a5a75974ebf3aaaeef9b626c096939dba66e85d1c2639988e17b8d854eae7cf30d25908531e08c1d9f99906382faee72e1f7c9074d612b2d71

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      90526e13e2afea5217d6237c8705ae3a

      SHA1

      a9b1866ad804cc9346a42e18c4a188e1b68d52df

      SHA256

      0fd04d3554077ee814b299960dc86f30a08fdddaeacf2ea5ed4d6a1b4f61b24e

      SHA512

      cb0b309bbece337b0ed71dcdd58c7a5254526a2dcfd4233e919cc8ec221ba2b4ed8cabf02737f4814f30a1aedf1b2a27b98d8d7067d1c11e35f93735790a16f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3649cbf29937d7190b16d0ccdf19b4ed

      SHA1

      015b083e8d093330e09ae4d2c2b2a4ceca020485

      SHA256

      9fefedd2173f9a3cc8aa14f91abe0f1084d1b5c2becd861d6e91aae36ffa349c

      SHA512

      13de9a5e957186e9cf613e6db1e3b796689ea2177f9c3f0eeb4a3ece9b135ad1e7b8fba138d2b6485d430d81fa3ea324b0da79c802fa441f0e8cc26f4c450952

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      cfdb1a9905794eb56065d7f36fef6308

      SHA1

      0f5c2bd3437ebd8811c3129a646ae6f790701c87

      SHA256

      455db32bb78ce134ffda6f795a3a02fcdab61ca6454dc7fe3dc3194f9504a6e8

      SHA512

      01a7d2e5b45de4e090eb1f857127d516df838b29fddd8203a3c1d8b581f8c6c872e38e6d4a47fc38b90ef79ccaf88e8d0ba4e7cf460a82f6cc2022fe13fe8f22

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      07247507acc56cb75b186edadc5166a4

      SHA1

      f3b2c53f5412fa33b5284851f3509ab598276b3f

      SHA256

      358827096485a25eae8390a15d4142daed20ea61e0d274c511721bcf06997400

      SHA512

      a2a104478b9a6d391ae9a406250efd585eb463297609ff5a9fe85a1cf27765f0e89e6e49bdc12b388f75b2f796835f50447545dc56feda2e2195307e5def79f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      156dde9099b5b89fc34ebabc7fa8aedd

      SHA1

      afb202451935b8d20ce88715864736b811cd79cd

      SHA256

      4d9c27e158180231aa4aedf3ecd6df0b85a741bcdbd569a3b45274340111b91d

      SHA512

      ea57ccfe24e64e53a54f9140c066e3d3da9087406a1f29150959f328e5b8c1797d0cb13291d56e6c520eea702e62dfb043e46882e961bae3ebbbe79d04a7207a

    • C:\Users\Admin\AppData\Local\Temp\Cab5ACF.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar5BCC.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1612-436-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/1612-435-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1768-446-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1768-445-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1768-443-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB