Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 06:03

General

  • Target

    a83f270bf8ab29c7fcb5f140000b97c6_JaffaCakes118.html

  • Size

    348KB

  • MD5

    a83f270bf8ab29c7fcb5f140000b97c6

  • SHA1

    9e345ed1678d8e0fa476c20b85fe534d4639fabc

  • SHA256

    0f6f8a6743396f2bd1c8eae14d17a241b403fdfcd3d38bfecfe90d769d784cb8

  • SHA512

    7a23bf209f316b003bbc19fce2d88ef5f8d21a62e3c628671f0c309639748a61e1c377d36ad7911d050c0fdc3d69ddca8fd163ec2438951a91a09490a771b723

  • SSDEEP

    6144:ssMYod+X3oI+YesMYod+X3oI+Y5sMYod+X3oI+YQ:a5d+X3+5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a83f270bf8ab29c7fcb5f140000b97c6_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2432
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2420
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2500
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2816
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2276
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:406533 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2392
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:5977093 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2444
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:6632451 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1512

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          d01b3c36568ad0e921a6ab6d348ecc00

          SHA1

          f68198948f34883daa2c81a2bc09c1e49c29edda

          SHA256

          37a8268115b048a25c2880500475bf78108bab48e30dd7044bb59dd8ea532435

          SHA512

          b3a69782e3e1ac9cbffc47a06de37ce29bce69d29cd662848142ecc7889482fe31506ea5302b1648cf3c75ac82043f0ced0a10f5a1a52113852b48f66a117b81

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          06630ede3bf5863575f26d268e48690a

          SHA1

          9dd4b0b23f54592b55b56ee28796041f1db9e1dd

          SHA256

          0c18be4a0967186a14256136228728875cf718e5b91e80828adfc4eaf4a6b9e2

          SHA512

          055a22f6aea36b0587484585daee41e952123615bf7e0bb601b788cf3fcac82653c65a6faaec3df491f62b1fcca343c78f590d99e2d87519b487fe6861b025e8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          9f43ebaf8e272c09956d76d0d5be7fe4

          SHA1

          6fb2e19f3637983bcedc3bf9704fa7e9d701579d

          SHA256

          9a985db326aa703d04bc2b9849cba3a9106133fef9466fc6a30881560a5a5bf8

          SHA512

          9f5e784ef91a00ff643a24ad8a677abd81bd3b78d80d4ae78e2b874bfca6e389e5f3c83233a9f64f17888c2d3a900df6e473bf68bc2dcb6bf0deeab43f6544a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          01c852356d8a2e2d0c46ba10ba004a54

          SHA1

          58dfe72c451d5f64b6adb8fc2b200d58d499bb7b

          SHA256

          d465acb2eeb7d1536d49eb5a784c830970977ef81b5b3be92cdec3774e282bdb

          SHA512

          4b33ebfefa09df8c4d06e3816012721d96eaa036181b4c04009cac6a6a6ef404e5486e0fdfdfd76209ff3b472acce5dd555808412839b391100a7ea40b80f483

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          9643129ecfcd745bfbd5cdb06144c318

          SHA1

          d650bc53df782c5393aaaeecfb63863a5c12580f

          SHA256

          13e465e48ea2d90aeba45e134ce823a3e29f58d86206a28947d6d030b754498b

          SHA512

          4c2208f384c06231fdab832c18ec8ec526a0df17888078634e2d5319fecba39216928a4e856d481eb16bb71ecbf5aabd9410f33535ab999883960b70a5bd9dcc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          8f5055e6cbf3bedaa498b925b24742ba

          SHA1

          db0f29c3cd5344b0c5a9e30e7fbf69a5df798e86

          SHA256

          45c828a53faf1acc07860d0d2f2fa72e25460fce2bb845976484f44be6dc6049

          SHA512

          d6e4e52629dac5b8122562bad77a89f17bea90c6d3e885f8119e68dc9c6fd4343990b3afba2647bbc88a8033c99cbb5beab9f78740086a00a13338cdb24e5e42

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          9b483e9af115835c333a8f3c431a860b

          SHA1

          b3ba42b216008fe926315ba74fd44f4e49ef8fde

          SHA256

          0c4c8cbd76d9089f179ee32ccaff82c1c2a0eb077a778b5ed212439b26d10c8e

          SHA512

          71c885f7d170f7809e4afd8678b265f5b3181bbc19a7f343368a4ee9c7c3b66f1dfe9d2e991d39531e228bf40d36062eccdc41742055c0c03f20ec8f41a7ae9b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          1733a6ae8efc2f466cb3c6dd9685159e

          SHA1

          b4df3544917f0d9b083e55e7289101a4e824ce6f

          SHA256

          005e2449d6fe54f123e0847b9997ecf450187bb4f9bf32d6c3f673b8ccc2a0c3

          SHA512

          01ef1b698e393ba924f987b05e1d2954cc37cd4682181369ccba9c1362b6ec3a3b326cc9130d05c2055d2d909390e4a1679bba60e3f808d41fc4f144e1f54b32

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          a71d876ab82ff45f5b8b54b80e667513

          SHA1

          2d1f49227c22a7410cbf5ad78e1f2dcb518a9c1f

          SHA256

          374f694e64eaed2eb37895563d63f9584dbe017b96c4830c752c6c7457d7ed13

          SHA512

          096144a9aa73f3c6745f7f748842a3623132b2451c4eac5f62cb61c37f0fc9fec9a609a39868ddf694aa1a38a15fd7df48d0a8f21a34c1d73478851785324aff

        • C:\Users\Admin\AppData\Local\Temp\Cab1F46.tmp
          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar2027.tmp
          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\svchost.exe
          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/2384-14-0x0000000000240000-0x000000000026E000-memory.dmp
          Filesize

          184KB

        • memory/2384-8-0x0000000000230000-0x000000000023F000-memory.dmp
          Filesize

          60KB

        • memory/2384-7-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2412-17-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2412-18-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2412-19-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB

        • memory/2412-20-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2420-24-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2420-27-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2816-32-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2816-30-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB