Analysis

  • max time kernel
    135s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 07:09

General

  • Target

    a875f39b9d8485cbb82070e9b71919ab_JaffaCakes118.html

  • Size

    353KB

  • MD5

    a875f39b9d8485cbb82070e9b71919ab

  • SHA1

    ab4193f4d8bb5e93bdfa5e7a72fa24428a3d59ef

  • SHA256

    fcb65f9ae4e9cdb7f2deb418689e755533ffa154b50d3099bafbcf1f5c5cf131

  • SHA512

    c90e2d513721b937c91384ccbaebdc3052988a3965268a7c39caa27c01fea93f96e23ea0a5010a8d14e569d0a62b9078e5274ebda5872d23a27ce936bee95186

  • SSDEEP

    6144:SYtRSYTjSm9PT33ylWKEp2sMYod+X3oI+YRGDe1sMYod+X3oI+YRGDev:/XSYTjSm9PT33ylWKEpU5d+X3vGDG5d2

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:368
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:460
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:596
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                4⤵
                  PID:1956
                • C:\Windows\system32\wbem\wmiprvse.exe
                  C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                  4⤵
                    PID:2552
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k RPCSS
                  3⤵
                    PID:672
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                    3⤵
                      PID:748
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                      3⤵
                        PID:812
                        • C:\Windows\system32\Dwm.exe
                          "C:\Windows\system32\Dwm.exe"
                          4⤵
                            PID:1172
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs
                          3⤵
                            PID:852
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService
                            3⤵
                              PID:992
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k NetworkService
                              3⤵
                                PID:292
                              • C:\Windows\System32\spoolsv.exe
                                C:\Windows\System32\spoolsv.exe
                                3⤵
                                  PID:360
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                  3⤵
                                    PID:1068
                                  • C:\Windows\system32\taskhost.exe
                                    "taskhost.exe"
                                    3⤵
                                      PID:1104
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                      3⤵
                                        PID:2380
                                      • C:\Windows\system32\sppsvc.exe
                                        C:\Windows\system32\sppsvc.exe
                                        3⤵
                                          PID:1560
                                      • C:\Windows\system32\lsass.exe
                                        C:\Windows\system32\lsass.exe
                                        2⤵
                                          PID:476
                                        • C:\Windows\system32\lsm.exe
                                          C:\Windows\system32\lsm.exe
                                          2⤵
                                            PID:484
                                        • C:\Windows\system32\csrss.exe
                                          %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                          1⤵
                                            PID:380
                                          • C:\Windows\system32\winlogon.exe
                                            winlogon.exe
                                            1⤵
                                              PID:416
                                            • C:\Windows\Explorer.EXE
                                              C:\Windows\Explorer.EXE
                                              1⤵
                                                PID:1204
                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                  "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a875f39b9d8485cbb82070e9b71919ab_JaffaCakes118.html
                                                  2⤵
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2212
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:2
                                                    3⤵
                                                    • Loads dropped DLL
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SetWindowsHookEx
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2012
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Program Files directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious behavior: MapViewOfSection
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2176
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Program Files directory
                                                      PID:564

                                              Network

                                              MITRE ATT&CK Matrix ATT&CK v13

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                253843f8450e752568bc43f9d5e97e80

                                                SHA1

                                                94b03d7b6c5cd08d2fd9e27af3bfe65f07519e6d

                                                SHA256

                                                fa1f1f79c3d396005f34d39fff1a5f0291eeb2fdc00c656b3b3b220659a1b313

                                                SHA512

                                                d58a30bd48392535727c94f40cd1a4f9c4286cac85c74f8dacafd0ff79899b5f07a1b70054a0b38faefe7dad85de9ce04dbf47bd85aba8bc5cb523ed7ca65a8c

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                8267b8eff80824b7b745911a01e5a7c8

                                                SHA1

                                                dd1c460b0f249b9714dbb9560016c4a27f88de52

                                                SHA256

                                                fa5a41a28c98f1cb3a6d14ccefcf1eb2691c255a7b69f91fa289998fca82ce31

                                                SHA512

                                                0a9eb94b0a947c32099161e6abfea500a0f0a59712f3258979c652d9ca70ee813986b1c763f07c6870d3dec8a9fa1d5ab15425794be89a5fb20ab095ff3664b4

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                9cd590f6251dc0e6d196f22a42548c78

                                                SHA1

                                                456d4dcfa86038ecd5d41f95924bd275b01e5232

                                                SHA256

                                                10385112a4a307da634bc47324b1355392f823add77406c987fd40881272b739

                                                SHA512

                                                1a9b43a5c00a2ba2045c3087aea8ba8485aae8cb8674f5d3dbf285b0b047839e9034100347849ac11e57efb57ea947f6d72f0171fd3c6fdf0b446848f53572a1

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                83c5a497335707bb26dbe97927177844

                                                SHA1

                                                53c9444efc1be1f5e37435c04e0a05cc33278c2b

                                                SHA256

                                                e59f6552057bdbfb1847abc85c11877de1ae2278199fc37c0404a4d12aff17c5

                                                SHA512

                                                07a2dcadb577462a0294ab85960cac93540bdb2abb0f740f4e1293f99b9833cc6b940452a760811b83d4f38460135624fab591616fef4b1dc194532893d97333

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                2250cd9ecd3bd5c0080bf5fa223afd5c

                                                SHA1

                                                26a3282a034f58a1faa92a414c4fc9490d895480

                                                SHA256

                                                c263123c1f96b4b20a58fa258a592b1665478e4769e5a0c3045c532099aabef5

                                                SHA512

                                                72a18bf27fcdd577a561b93001c0d70480eb10521c44c36910bd5d4ed6c68e16f606b88fb3379ad9ca44775d64a99c69f29dbcedc8e55f2cbbc4ca826ee4567e

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                45fe0a8c9125785e8ea78a8f9e2f8e13

                                                SHA1

                                                00cd11bfea81a60373bb4c267602161e754e4758

                                                SHA256

                                                db21978f5d72f1810684ae3ae8f6cecc7a3c757a728e393af059a50e651835b4

                                                SHA512

                                                aa4589d9cccd5c047bb5ad7443fb5928ec2eba867cfc0458a8a1284853e27a7b916591b0eb365021b3d7971e201d71f2065e81033de6ee8f1d2f7cbe75c70537

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                42c9e52ff745a05cb43e64811dcb946c

                                                SHA1

                                                6932b780dcb9ea778c51aad105afdb66eab6cbb7

                                                SHA256

                                                25759aa7e85c5cdd18a1053fd6e4dbbc54537f452339678da34e3cb5d8d4b0c9

                                                SHA512

                                                bfb9c44f8d8b4046e7db7df717a602ca5fbccb5afa2766d5eb74e4af0f4112af9ef2dad7b68c45c925e4faf1cc86926a5883bcc18b028caee1fae55e8b98f9d4

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                a0d00efb580a066ed338d253f40b9768

                                                SHA1

                                                d1ff1209376fd2a91a29cf75b07089f1c83e2e0c

                                                SHA256

                                                5c8a33dddb4bec6de3a098e7b92872fe39e69d8d6c4938425659e95a74e49dda

                                                SHA512

                                                551259071cf755aef1a087f6ec50dc9689183eff8e61e9b8ca6e618f5486aff02e2dbd844fc6eff0b95f1bb0210558af0e3c3164d71b3825a3786154f64cac15

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                de481d741e8fbee4f10b087f3508a27a

                                                SHA1

                                                5ecebface907fa1150b06f7c1255c9b059f78280

                                                SHA256

                                                2e4c0b4a9c49fd06426f26d8ccb50653fc1f815f99c340c8fda1f58477f5ff9b

                                                SHA512

                                                52ccf8fbfcd470a910e7c8a9dfdb2896929735d8bba7428613b217f5603ba5724ada7bc8efacb8a63f28595bc3eeb80c72d011bffd4a8a152efcd8d5b0921a7f

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                8367471124f7495c26b9c7966277fae3

                                                SHA1

                                                a6e20630207c2b5b883a2c8810a8f721a31596be

                                                SHA256

                                                ad1f690268777a6f3976cf9f8cc52e7ce125975c326e83b46863e003a57027b4

                                                SHA512

                                                908b502bf86960c752ab09d788dfb2ece1113228b98b956793186588c99352db1b0d486ffabcca7a56ba6fc80efa8383c5a01059c3e9572cf21ad2e7aeea1087

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                bdfd977c9a655abc21ab09386cdcf9a7

                                                SHA1

                                                c3c859f88bdb16c8f57e41c64c9489be1cd6ae37

                                                SHA256

                                                80290041ea04a1af475a11c1362a176964e09203b475c2339075190a1254b69a

                                                SHA512

                                                a7694cf11f0cb3309b82da4cb32337626719f2dddb603e3cf7c8416315b4c93b81979536fd13f263afac169df98c4e7b8ddd79efa254f3e13a3e7b1a1c64e2f8

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                1388f0f0042dd8e40ec3d32a97f8445e

                                                SHA1

                                                2d5d56a255773ccad2b124656368045a1f80f057

                                                SHA256

                                                ce799c298dd29c5d5a0502f7a6886cfbeff6376708157b08df99263820f92527

                                                SHA512

                                                836169762d0b90e8456f111581b074f35149551a1d2860023761e0d4c952ae3bef43e4ae27f10943e9306b1c178ca804f02d9ee31d150da3bd59e5c451883f29

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                284c48e7162a064aab8dc4c5b39b850d

                                                SHA1

                                                e42a74d43d3f761713b0d357ff67904728d8f8aa

                                                SHA256

                                                9988e052d834117d0bdcc4f1854cb9c1672dd4d39b9506e1c125c7088ab12a3c

                                                SHA512

                                                b9640e48b6c63b03cf41d05c2f8a813db6852f6fb4bb8948170300dcadf6fc7201b18bb52183877862db5ce127caf9a1c9377970c51fb8c0841bd94c10901dad

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                0f59291dbaded5a50cdd5d21d56049a8

                                                SHA1

                                                b92b692c2e1348692510020b663294489099f637

                                                SHA256

                                                1fe40f0d7510a4b146b11b6756c64c1dbecaf4740dca08705de7e108144e6fcb

                                                SHA512

                                                4a792e650674b86dca26e6e29e83e4b024369fd7a3e224c2fb62b301a6e53cbc05550c7cec41070c40d0fe479b03af3fd725929a29eba29000c251f4c5bbffb3

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                7f77d5311eeff43ee3a008cd94be9534

                                                SHA1

                                                c1d37a61a3a1c52bd07a0cd9187a07488f38ecc0

                                                SHA256

                                                0ce25ffd1adeddf8d88e9efdd41aee41f26ae892027dcc6a4caf896661d41112

                                                SHA512

                                                c62aa9f1318adee47185809c5a9565e5d32f11f531762779feb12165cefc28c385ef89763347816e982e7d3276157a6867b958e1bfeb574965b58ed57ecdbe0e

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                d8327f0f29b70fc230c2a43baea37c86

                                                SHA1

                                                bf4ead3edca7662af937be2da3b59d07dd583f82

                                                SHA256

                                                b5e3fb0da9dad59a8a3c653e77ebc7ba3971882fe21b752425dc50a327e455a8

                                                SHA512

                                                08b8a26b7114f0d5fdc912e33f716c96745c9cf689a268b8bfe89fac11c994f496b7be27c7b4372452fa53e6a0fd7177cfb229987d7891d040d802793fed56d4

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                b9c29efeae33aabfed3041eca7465eec

                                                SHA1

                                                60c9d9f58e112d5bc5cf772cc0d871c36036bcdd

                                                SHA256

                                                f34cad06e47b8a1de726b3607ca057f6c82bf81ccf4b45148485f74d8ce8a8f3

                                                SHA512

                                                20e516e1ba2034b643db823d825c01595a22e04817501e59e31cd86fb4021f470d0d3d1f6a2f6bfe622e6e2ebcb6ae1dc77e80554bdbede745b481061f6036af

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                c67fc8e468f10afc2c4b41c95435113d

                                                SHA1

                                                91b6175ea3a8e6a719f61a3502d6a79b0caae763

                                                SHA256

                                                c3dffc5d6d5f34b7b4bc5cf12fc017b59a7f30a5e644a2809f984bb131a82598

                                                SHA512

                                                b7e36d3b5d28cc022a5dd2050165a2bc8988ef5204695dd6e37d52f13f89d4428e82d5aa47be06887913705ada2833b0167b57ad5f2407c751d3fadf4a204004

                                              • C:\Users\Admin\AppData\Local\Temp\Cab2E72.tmp
                                                Filesize

                                                70KB

                                                MD5

                                                49aebf8cbd62d92ac215b2923fb1b9f5

                                                SHA1

                                                1723be06719828dda65ad804298d0431f6aff976

                                                SHA256

                                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                SHA512

                                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                              • C:\Users\Admin\AppData\Local\Temp\Tar2F02.tmp
                                                Filesize

                                                181KB

                                                MD5

                                                4ea6026cf93ec6338144661bf1202cd1

                                                SHA1

                                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                                SHA256

                                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                SHA512

                                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                              • \Users\Admin\AppData\Local\Temp\svchost.exe
                                                Filesize

                                                84KB

                                                MD5

                                                03451dfbff127a5643a1ed613796621d

                                                SHA1

                                                b385005e32bae7c53277783681b3b3e1ac908ec7

                                                SHA256

                                                60c6c49b3a025dbf26a1f4540921908a7ea88367ffc3258caab780b74a09d4fb

                                                SHA512

                                                db7d026781943404b59a3d766cd4c63e0fa3b2abd417c0b283c7bcd9909a8dad75501bd5a5ff8d0f8e5aa803931fc19c66dcaf7f1a5450966511bdaa75df8a89

                                              • memory/564-15-0x0000000000400000-0x0000000000436000-memory.dmp
                                                Filesize

                                                216KB

                                              • memory/564-14-0x00000000001C0000-0x00000000001CF000-memory.dmp
                                                Filesize

                                                60KB

                                              • memory/564-12-0x0000000000400000-0x0000000000436000-memory.dmp
                                                Filesize

                                                216KB

                                              • memory/2176-16-0x0000000000400000-0x0000000000436000-memory.dmp
                                                Filesize

                                                216KB

                                              • memory/2176-6-0x0000000000400000-0x0000000000436000-memory.dmp
                                                Filesize

                                                216KB