Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 06:43

General

  • Target

    a86113d97e9ee27cc918caadd00e1190_JaffaCakes118.html

  • Size

    121KB

  • MD5

    a86113d97e9ee27cc918caadd00e1190

  • SHA1

    51fd972623b4995564b692c816475196a218ca2d

  • SHA256

    955ceebf746e10590d17d68e5521ce8370542eb8798b9ee9ac8cb6bd6bd3fa7e

  • SHA512

    43e47de8d7ddd36b3688016d51f19de847605c92e2fcfb12f88a646474d345e5ebdc52236a705ac1bec4015516e2f74f79d165c8a38279c7ee3432e8143c7c77

  • SSDEEP

    1536:SHc0VyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SHNVyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a86113d97e9ee27cc918caadd00e1190_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2976
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:406536 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1616

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      507cdec95fbe3503dc5eb5985fa928f8

      SHA1

      0d34fefed6f610af0676bc2e454b1d5e01e9d1cc

      SHA256

      04ee4b70d1d8a5e8df365c3fdfecaade84f1f320f6c1064ade04f9b251a397d4

      SHA512

      1a8b3748bb2987d40d4f532b31d0a49ade95326f5deffb1c29b7534fb126600a0b0813efbcb97341abe1ed08da8706770fa232a250192ef13329658defe29b29

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      eaea7447709e0356f2c6c5b84ec01b3f

      SHA1

      311fb9966409f533acf115e07e4ca03adb15bd65

      SHA256

      1bcba0a74a98437044afd825a6f14b0d30d467f07ca2c186d99a3669d2400f50

      SHA512

      5bca7bff6604ab0e4c2c9cca34b243d63792b758671cd3643545353b654fa3f861d5fee2e05e8a747f23c82513612a91bdcdb2eeea373f51c94f0e1bf454217a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      26d67197cd2719d847d2e0ba6d674fb4

      SHA1

      379146b3adcd02cd0152731fda22a5e50d31a281

      SHA256

      26daf82b680bb6c74e7a76d616856fe122e9b3627a4d84c10e5c4ba1c0ae9aa9

      SHA512

      02cec7f5cf7397f318217e13dad5d72d357521f06eb5ec89183155d329e887c383f7e10a1ac00207614b149b135d77e6bded6c5af6beea92e7a02c0c299d9393

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      24ed66054b62e6aebaf977496ff5ffb0

      SHA1

      67258f8f72e9f4772685811f9769640cd9ea6666

      SHA256

      9dc75663827fcea687e786d93316c9a6c2c32bf9fc6953b8d058e8c937589ec6

      SHA512

      ffbb29337015f0d96997cc76de33b3dfd92e9a064d2ebb3dfac80a2ade7788676a6c2dcf41c9eb0424dc9d46b5b41d835237c77bbf807128f2bfa0773fb78561

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e3fd09f707df062d576ffaaecfb4ca5d

      SHA1

      6a2c0539b85979bf3913ed082c2aa2be6b8a5035

      SHA256

      e1331d2e279ca8a5c1ce40464f43b12418f5a8654d52752254cda5291121fcc4

      SHA512

      ba9cbc81f7c4961b0e9790301777deb442504e3437842bfb3725827da4f604856d232031acea2e9d5e75742855adc86f2577aee242360b2a3aa0e0611dd882c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b54f6a56e6274bf30d1e5e6f2d20d0ae

      SHA1

      8b67c1b93c0dc8380213b5f043d9e8410555d658

      SHA256

      a53e168498baa1b146df070defd6f5798ccbb25d2d3b1b5ea4ebfadb7d1d6577

      SHA512

      c21da1e3d568bcc1bf140482a7f07bb988aa7e9e49e6e199c98a1520081eab135487a62d2528b8fac9ac3753397b84960240841164ebe1498a094463330a5ad5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      11d3327023977fa34aa544cfd35993af

      SHA1

      d9cca1e5955af7c70892113fb3d9b7aa2022dddb

      SHA256

      73cc8c747da1d184d2f1b14826f04bb77a0eb1ea9b2dda979876d945456f87dc

      SHA512

      23c38c177e9c140b613ee3ed2d6fa1da7973846abf46c6a9a8d59a01786a74b3bfd03fedbc203d9fbb4e9f372e4d05b3601d07c132515073400e219e47839287

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ddbc1f64021f61da536f2295ca7aa1ef

      SHA1

      51313a011f2594acbb0d4c169f9fff79687ea112

      SHA256

      05273fdad23a46e4dbb5e723976d0579cbe081a54edc75c51e2fbea2061476bb

      SHA512

      a3deb28f61cd9afeb29beb275820094a57bc7517fa88ae7a84c82502ee96a85dfeb9be8817acd9321e6c40bbbfb68369ee05f9e8eadfbf7d98dc8bb937ad2136

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      155a0544ac4625ffa0fff15f673f2ccf

      SHA1

      886ac4824f8b30bdf748e259d280cc22a06a302b

      SHA256

      9cfbd2b27d5aabfd2ad8a7703d1bc770a6ec7878fcd2cf4a3d35bfd9261f3863

      SHA512

      e7aa671800e88bfe2c9956d35be7eb6095fdb9f3fbebd37f143e0f1607055e40041b26c890e5a34634cfecdb15393f2cf206a2c30bd965591220009fdb749b08

    • C:\Users\Admin\AppData\Local\Temp\CabEC0.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarF80.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2580-16-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/2580-18-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2628-8-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2628-9-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB