Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 07:33

General

  • Target

    a88ad8935b82436f70bd67eebee5ae95_JaffaCakes118.html

  • Size

    567KB

  • MD5

    a88ad8935b82436f70bd67eebee5ae95

  • SHA1

    2fd2083d78c7610cb8244c2c179e44ed6244bef4

  • SHA256

    49fa03aab1599f342e9b03bad2ca35fcd338283efff3ad606d9ff4b17988db33

  • SHA512

    68a473d39d12ccbebf67dbaab40edceee23ac4480a72e052620943ad5554fc9b672a96aa7e4f2e47e1a0fbac6ed6668e08307c4ee9cc7413870df964f6506b7a

  • SSDEEP

    12288:Cc5d+X3jn5d+X3Z5d+X3B5d+X3O5d+X3+:Ce+D+V+9+M+e

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 11 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a88ad8935b82436f70bd67eebee5ae95_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2636
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2676
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2936
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2004
            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2972
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                4⤵
                  PID:800
              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                3⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1772
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  4⤵
                    PID:2232
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275464 /prefetch:2
                2⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2372
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:603139 /prefetch:2
                2⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2556
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:6566913 /prefetch:2
                2⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1744
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:6763522 /prefetch:2
                2⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1832

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              b3c82f671623113098dfb1935e8fbf5f

              SHA1

              975368c852e56f62dfb88a6160e8428cdfcd5a69

              SHA256

              25629736bf70d0ff8acace96970c5a8353daadfc43ba5c4889f150ed218f5a9e

              SHA512

              27569e26aef8de067c41c8738a7b62750ac4e1367bbf6dab790e083793477bfab3d6713a6339009c434269ce99d693262552a6039509f10d2696643bb3162d7b

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              e786c7c3f19e926072adaa1e125c21a1

              SHA1

              54f28ea2cc4c543e90f9371812c68f2940222666

              SHA256

              da8c6abb4047546e8f811c44501802f2121120ae2849ca125013599fddc7f99c

              SHA512

              b1f3399229d3a8bb0b5f1f3cd24e000641400685befb4879ed0db85df573bc86443c0983fd7539d6d7a2ef345eaf261aef0332a41ccc100960917605143bb650

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              135c98278bdb62e24fb0a79f4e40b038

              SHA1

              6da9a3d6d0f644d58ad5a5f8da02de06792c4d67

              SHA256

              70ca5cbb1e509e216bad9c8c6135da4e2727216b02cc48a9e8df8224b761cf70

              SHA512

              78e7b06c7e88710cde27c90bdfd89bc920be3ceccc359c8ae5474e42bfd5e4cc5281839120a7d55430fbb52292068bfee72b01dfb9da31a927f7c154b890be66

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              534790bd374622c2c85963a58d35250b

              SHA1

              20d70bb158055343a80f0603c5d2c6203755bf7d

              SHA256

              65648f5bb298642fc56ac7b07a49285969862efc2aa4951ffb899d8361e7b7db

              SHA512

              f06b9ab4f12d225d08a8102a5cdabe3e90b1338236ef70060762dd682d8e6108d05f4ae7468f4dcf9a124b669e1f6ffd7f5f79ec2ed5664d1afcd10cb11ccb91

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              1b632ad255fb9fc9e45ec0ec590cb252

              SHA1

              3e98ab596beebcd4c9e1251bbf8dbba4ed192287

              SHA256

              1208ba7ce9c6bd70a779aa82966fb981823df0d22698a4262c7d9afb5b7653f1

              SHA512

              d416c7e3b7b4453d9a13b6dbd92ce2b65fbaf5d6410af0bcd906b7a4b7083fe0e901f780fa1b57866fe62d17c59198bd59ded55ad44603e4dac8bf9aa3655d28

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              cee966e05245345fa7ec1d2fe29560f3

              SHA1

              9119c0aeac4910bd69e9401ddf00a943ffbf4828

              SHA256

              43a432413f77972944041d13a16e3e1d059778016e272c46ed6d1b1e507a282a

              SHA512

              8d5b972e7bdf9e194f92c5bea40b946c0d0b46dd9b72e3f9766276b96a383e0da50e741609a9fbccba0a8f5d442cf4259db425b0bdb8c4fa34cdc6843af991f1

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              57bbc099d21cd3643aa3cc9086dc804a

              SHA1

              ea91a7d1c8119e081b5a1a2be2a7e3735338ac93

              SHA256

              15dfc6bc6767824ae472802384bbd95a81edf3a5a9ae104bfe2835453d9e204a

              SHA512

              a40172aacff924df2340d2a1a3347da1d30829b7ded0557a75944919d045704842c2e394801308f1fb36002b67e1e854971ccd258786de40a8983dbd2cee679b

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              2b541c0066345d1b2970ff6d43c785d2

              SHA1

              ff6f23022c40381a4e82d69341ee7688d3918053

              SHA256

              ed8734642432eaa5dc844d3547405bb155636e7071a686b146c5d441e5e63b80

              SHA512

              e36aaca606decbd95963c9cfe39d02d1aab6b87c6bf66218844e769ce26cf27e517b218ccf885ecb2faed443242fccb6faad232ae233d337d2a7eddb2e158c61

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              520a5e50c5250128887b7c275ddbb336

              SHA1

              6a40fdba16cb738df46bf98d4308cedd62851fe2

              SHA256

              c3671776fbda16014c0be7af802e6970d2fa1896512f0c43c43c0404323ae7f4

              SHA512

              4f35738397e598407f66073ce9df8293f10e826d629582aabbc3831f4cb64e0f9405c87272692e798b41d82a4844814f4b877b28120f2ea341a7a2bf150f7611

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              803de707be5078e81d02333733e2c863

              SHA1

              ba27de479af67f2a522b14bb1593bfd7f8a329aa

              SHA256

              d7373ff20b92358c487504862b3ea4d59ca68de1ad7101ae5264eb4d252d86fa

              SHA512

              9e52a710062249246c65bc0b09712025d2df2c608e3f86b733118b7c64724705c1627199599edda9e18b44b1147312b8d9017f2d946b0803d090df4a41ba9297

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              681f1bf74930398e2a232fb3f58845af

              SHA1

              90f021f2974e3ac2f9eb5f2851bd3043a9aeb795

              SHA256

              35b53c8e518b2608aa835b93baf8b5fcc3b6f7280d415c6cd08f96aac4cf14f3

              SHA512

              e105b2ff499e9381ea044c9ae3364d059b822ee5c20fa544402c6a888604ad4c8832771892b4023771da87fe508d0c1266b4b6775e0646234eb7f5b354e5b8d3

            • C:\Users\Admin\AppData\Local\Temp\Cab3B20.tmp
              Filesize

              70KB

              MD5

              49aebf8cbd62d92ac215b2923fb1b9f5

              SHA1

              1723be06719828dda65ad804298d0431f6aff976

              SHA256

              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

              SHA512

              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

            • C:\Users\Admin\AppData\Local\Temp\Tar3D45.tmp
              Filesize

              181KB

              MD5

              4ea6026cf93ec6338144661bf1202cd1

              SHA1

              a1dec9044f750ad887935a01430bf49322fbdcb7

              SHA256

              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

              SHA512

              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

            • \Users\Admin\AppData\Local\Temp\svchost.exe
              Filesize

              55KB

              MD5

              ff5e1f27193ce51eec318714ef038bef

              SHA1

              b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

              SHA256

              fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

              SHA512

              c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

            • memory/1772-38-0x0000000000400000-0x000000000042E000-memory.dmp
              Filesize

              184KB

            • memory/2360-9-0x0000000000400000-0x000000000042E000-memory.dmp
              Filesize

              184KB

            • memory/2360-8-0x0000000000230000-0x000000000023F000-memory.dmp
              Filesize

              60KB

            • memory/2360-6-0x0000000000400000-0x000000000042E000-memory.dmp
              Filesize

              184KB

            • memory/2540-26-0x0000000000400000-0x000000000042E000-memory.dmp
              Filesize

              184KB

            • memory/2540-23-0x0000000000240000-0x0000000000241000-memory.dmp
              Filesize

              4KB

            • memory/2540-24-0x0000000000400000-0x000000000042E000-memory.dmp
              Filesize

              184KB

            • memory/2540-22-0x0000000000400000-0x000000000042E000-memory.dmp
              Filesize

              184KB

            • memory/2744-19-0x0000000000400000-0x000000000042E000-memory.dmp
              Filesize

              184KB

            • memory/2744-17-0x00000000001D0000-0x00000000001D1000-memory.dmp
              Filesize

              4KB

            • memory/2936-30-0x00000000002C0000-0x00000000002C1000-memory.dmp
              Filesize

              4KB

            • memory/2936-31-0x0000000000400000-0x000000000042E000-memory.dmp
              Filesize

              184KB