Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 06:03

General

  • Target

    a83f83bf4d24dd282db12485bf987e63_JaffaCakes118.html

  • Size

    348KB

  • MD5

    a83f83bf4d24dd282db12485bf987e63

  • SHA1

    41590ce1e95194af89e960cd474e3156e6090590

  • SHA256

    005f963683480cd698f60d5f24108e6b4d4030d72cc08bf086429c9580ca1eae

  • SHA512

    04b9aa8fd484bdaee480c86085366f64cf0b1a4306471520ed9746a305e667654d79111c7f355a3137867b8759e86be142d7b9cdd41247d67dbc57454818f9f1

  • SSDEEP

    6144:xOsMYod+X3oI+YP6FccsMYod+X3oI+Y5sMYod+X3oI+YQ:e5d+X3k5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a83f83bf4d24dd282db12485bf987e63_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2420
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2512
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2112
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2576
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:209931 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2556
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:6697986 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2204
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:5977092 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:820

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          c6bddcd0d59673d7beeb9020583b3bac

          SHA1

          d48fae6305690b30510ef7abee7ce01fb2e37671

          SHA256

          0c72219a3ff906e66efa5eccafbdc892897db6de92bdb0ee56f3bf14f61b4616

          SHA512

          7abc1220ea3406088ff29cb5f550ca978168940a9ac99255d13273db7ac7be760259194f798873a3dbc24c1c8649f6d4cc55de00fb22811e413ab84ece0fed41

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          649c38d135cd7f7a43bc04ae059b64b9

          SHA1

          028a9ad3038a5f8d35419a7bc746d111bf9179b5

          SHA256

          cf6f3d11869bf429ac83bf4a99a72dcf3186606616d801b77043626f1186a55f

          SHA512

          71080ad4326daa00e1842da6dce2c426debfd95e0c86f37dd0128c8fb648df4f5870525114f4d8785cc66bcfcca491433c0539d5cb0ea5a2a8f360ee304df6c2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          db815535b2437a8e24bc12450951770d

          SHA1

          5178e3ad672f9522a30f64e99387652c6f7ca8b5

          SHA256

          50a4026b70434beb39dcfb22300b119bc75924f8d72a8225248fdd40dc4e4ded

          SHA512

          3231b7cdbb30e5eb502378fc0545295eb457dd29371780a255f47fbe90ff0415c172b439186b5b867d60acd5da5b7a7f95ba40c8d51a6d76a329538224c82ed5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          f47c1575e9b4797a4bdaf6c4516499c2

          SHA1

          5c2de534edab5db3a99beb7259b2f6ae28448b93

          SHA256

          c312db1ffe65695cfe7638b00c2184f9b2582b252288afa97961b12d1dfa5c50

          SHA512

          067c5d12deb7ac8dfa129721de4130f6311c56fb8d33a1bd1a8508c92e6ccf23920d0f05ca417e5760ad51df9e73e6fbe96abe1fdd4cb9c0282050d017e85947

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          ecf18608603ecb60a9a91a99d00f6e02

          SHA1

          3b033e8efa192c4b1ae45c9e4d339b77cb549756

          SHA256

          d0646435836b8a9c703b4dd22354216f5ef58ed5c7dc0fa2a1ddac797e4a9062

          SHA512

          df69c5f9969e2c2160fb3facda374455d837dc1875cd8d47b6623f187b351bf3e5c8372c261f333d6b39b1dd2679093e02045ec9e1c5d8e48d22b535e075e83e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          33081edd545e6227d5aadab87b9cb604

          SHA1

          a977e1bb1d1180f90c0a4f7501e2394f91dd9263

          SHA256

          9c1ff97cd23a0e51626fc5744b91fe09354476e0b4de8e665e4463ad605ed036

          SHA512

          244de52d855d89c5cf370d076f63bc4628c33728a8c9418aba66f3d4024d61428952fa6d766634a13d604d3a780a601093acb037b1adc60f457e68d5d1f63e9c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          d5743e91d7648f8231fe50d274458cd3

          SHA1

          26b4e7c563cef59a46503196cc9fceebb4fa3dde

          SHA256

          e81ba61e7bb950c4ffea2f1c760ec742462a224bd10264665eb703cd8365ee74

          SHA512

          8cb153de00e3aced9fbb4d003d92fdd85fb4c9e706eff9c8b6a17c4190702ea1234f4e6941f30ebb26da1e8bdda886de732df09ff07bb0372ee68ec08a946e5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          dd4d43cd2cf1a5a3d606d9a39bec0879

          SHA1

          ca67ed96a301ec64462258969e439a84f0aa8ee8

          SHA256

          a5d161080c0ebdf8176fd8f63642217299bd717df9966c9622254ac30fcd31f3

          SHA512

          0ee7c375ec45c6473d6b089c67c05e34656f75919305d3ec868928902a6b22b4bcf5f64290873b48c68e24c879a67664d8fc329142200d4fc9ea49f20b48bb16

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          5b58044f045a5b8f9e0330242e5b554d

          SHA1

          9b0df2dfb5eb25b27790402eac89b2c3331ee939

          SHA256

          20b9844ee6054fe88205b04c7c6b7caaaf0498257583eccc56a34acd3e482bd6

          SHA512

          f6c9a51107a4b07ee44eb64011bdbb218be358312aeb899d3e43a11976780870a70024e97a52def7da411ee7e2332e499380ed24c946feafb54ad18e7b1623b1

        • C:\Users\Admin\AppData\Local\Temp\Cab1738.tmp
          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar182B.tmp
          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/2512-24-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2512-22-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB

        • memory/2512-21-0x0000000000230000-0x000000000023F000-memory.dmp
          Filesize

          60KB

        • memory/2512-20-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2620-29-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2620-27-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2692-12-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2768-17-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2768-15-0x00000000001D0000-0x00000000001D1000-memory.dmp
          Filesize

          4KB