Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 07:47

General

  • Target

    a897384925dce000e6194e917c38c780_JaffaCakes118.html

  • Size

    161KB

  • MD5

    a897384925dce000e6194e917c38c780

  • SHA1

    1b6edd55dc1fcc04d1254344c3b5c3ef587f8dc2

  • SHA256

    6d63580dc4f83e4611b7069df60151d2798f4bfe80361dc720b3dea02d51c54b

  • SHA512

    b8b326fdd0c8e8a76671f30115488696afcfe83f7d024bcc9ef9dfd779aa2d5c39fd14a9205db1f7c73f55238408177fb4129d191338b3c0f8196e7b081e32e4

  • SSDEEP

    3072:iXolheMcCvaNyfkMY+BES09JXAnyrZalI+YQ:igwGSYsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a897384925dce000e6194e917c38c780_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1196
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:920
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:472080 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2076

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2fc21dcfe04e95ed08b5043074b1899d

      SHA1

      e97e26051ce3d3c311e42feca1d435e3ba0ad0b3

      SHA256

      78e9c8e53bf8dfabdd817f2c0630f73cf0bf5eef3c1c2ba4c2348ad3a1240da3

      SHA512

      86bc03326fcf0f50c2726ba424c5e67c4505a45471a45dcf1c911f558078f6e7ece62134a01c978b4c777250572dc18850f8af5201601e7242dbb87d320fae74

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      899338e3d43c30ee011b3a7ff564ca7b

      SHA1

      389c4822a7af26c49a352d31ffe8de279c42dfe4

      SHA256

      dcaee3a7dfd60a7e8b8eb72816759ae8488921cb7d18242eb608ec19ac397ed9

      SHA512

      277dfdcf01a98e2c07447c13663b99e18e583a8c6405d1fbf87b327f5f24f7e07d33c001326d50464f74c9a5d9cce0381f8c7df1ca0cb9055f90dbebd7b98216

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fa041e8ba36b8b326fe9688b57db70ab

      SHA1

      c62ec702050f3938c7df7f68708a375316051d95

      SHA256

      421a010daf2c3916e9dac673874260baa291f8e7a2cd67120de5127f81359d05

      SHA512

      246495922cf6a9bd4adfe02c887260484ed5226baae2254487a95e8a998aac71a635070ee555cb237816a917adc0cac3e8e775c9c488849699f2936c75dcccbe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9b95d7d70f1b36644983b2d65676be0b

      SHA1

      914c6612d03effecdfe7dd7a08053dbd34547ec1

      SHA256

      d34d506f5422b70632ff13de017a7cc95bc482c4e0a815b8dac3ba164e8767c7

      SHA512

      53e7b95fb51bc51bde8d58f1450868e8fd1e312c4973a5340192ac89bc4f42df93fbe5551ce2864402066555cc5ba272348f652eb4f0412f62e7828509996fe7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      91be9d72193f7ebe7a5189df89a3276c

      SHA1

      973fb874b63fc8ded5b694b3dcc447b73a49282e

      SHA256

      494af8ec0e383b711ee9f654b2edbcbdab02ed44142246c307a31b59c62c19f8

      SHA512

      a03d9457d8fd73a5ad870cf94491fedac36762ee0ae6f080a0001318083aecae0af7f196e9b5e2436493384624d17a9efb296cbbc331869182fb6d6a3e2c3e8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      34d75290a8b5d90e50c38daef36b1901

      SHA1

      1fef41aa38e688bcc22417728f4e16bdb57b1234

      SHA256

      3a546caafe9ba3bd65f6e1a140fa6a5832d1f03d4c0060a2f499cad9d14e7a28

      SHA512

      11215bff11fd5c1152202c6a7fc92dc3769c04fd2ab0ead8b8768339daa0245aef665d72a22475414514cd63721cc3a22bdaa21a396bcead4c6c99441e7a93f3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c104fa3cd93e1f4518b810bbf2fd9222

      SHA1

      265ed0ccad49499309251ca1bc5fb096f46be629

      SHA256

      d3080a7ff60f62cfb56c5f275d71bfc1238adf5fdc210898fec5b53f0d1a4401

      SHA512

      6ed1668d5c772bcd33aec15fab4e1df05cd193f6b10c7d0270b4e13e047c52aee9e8f02f44049b7efa32af0b065e4e54aa291b4a289be428f6e222791bd585c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f0d9cf76d1732fcb4f48bc3d63dcac8b

      SHA1

      88d85cc003b2cf671e45f5a2649914dc698e2e7b

      SHA256

      8cb084a5da40b745caa38d60df69b4eeaa4ca166a1b3a6c6449ea693722554b6

      SHA512

      a4e8f100ab0a3b9579a7f63667075022a9d8b03cb98a8869e39c608540f952f1c8a55fe634d81ecc63f63abae75c23de15927452ea295c80dbfd4df0297b7b15

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      38b1014c61a7d684ff3eb31888676df5

      SHA1

      90613efe7d4de8d93d3481604ebfb904842bdb37

      SHA256

      ada2555b6890f21cfa7ba2bd5ac70350eca806f6f062735c9cc00eb030c424ca

      SHA512

      1120b82a762e404eabb453604871f3f3a6f9cd4b47a9b35b6c7f7e7566a59c0310361e7c85afd07ac667bf9bbc44c9933099c8cb92584931c9124584fa87f650

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d86d6418b0c033b1ca96ada36fb360b7

      SHA1

      9b2c2be800c193ec5fdbee282e3e1a82476ab4ad

      SHA256

      cd8b9037e7f203f680316147abe8c1b4d9f6be12e3794cdd5a69fa6c0a5897d7

      SHA512

      734358b71d0fbe4b7f1379ef017c8911e0c7ee2b7aba83765fbc3a53150940d9ee73f912b385200a43d29f21f0d82845d25ff7aab246742acd2d2fb78cf8c3e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b767cab853944f0ec42eff7274060531

      SHA1

      6d2635cf596d0be5f1cdbeccec09329be932cf1a

      SHA256

      64175c6dd599a221f52fc2ee77b00995fa928ca2093e7f5ae5b308e0110dd1d7

      SHA512

      c01f2076c3c7cd578f33cd1d0d62321d0939dbf63a7122b5b3437e36eadcadb264158a6e20c572243a4130aeff40f80c3f71d8465cf7866f8fb226faab50d69c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      918a6171e800cf690fe6c1d9c60ce6ab

      SHA1

      980ff9bebbf7b1b3677041d0f629905b03fe085f

      SHA256

      8408c3d54a368ba2f6f46ddf01815f76b066e99c28bc6d2c66eae9fed114ba1e

      SHA512

      304b5d7b7f431d141813fb534d3f8726ca34869ae94ff85b8c1dd2c589c7582eb7cc6f19418e8e23d59dc54b631c1d076e3aff62dd78332f2c3e3b63c57a6395

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2e4413a10838b21eafb84d2ed080f30f

      SHA1

      e27d7ac4f84cb12e708c51ed7762e6118d8d0b08

      SHA256

      df353efcb96eaf2c3e5a071b15b79681aa8cb6d753682eb617754f3ddeb7b369

      SHA512

      f5fcb4f4552d35a7b1df6dd48ac6fb7f8a037afda3824ab7f3536112027567011346acd9569fc29729569d3a63696b1c948c0607dc849d9e80e2b5420131ea4e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9003b58fc15816ea25d0b4f2e595d177

      SHA1

      174ff5f87d2da1b73c4f47d96a2a326852713525

      SHA256

      b3c8d28b5ea79d151ea67cd2de8fefd25a647b7d5f5872642aed41f9631e38c1

      SHA512

      3ea54564c0dd6fd1d0f014fd8ca923fd74c9249efc8aaf01139bbbf212022c3f089ff450d5e01c1c7b474e81429618bcb59251fc92668ca38853a42dd790d053

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3306a69184e46a0549194ef968a530db

      SHA1

      b9d095c6dc76cb5fccd178e6cbd6609349485e50

      SHA256

      1afd291073edd78cd8b28bb0c5bf5e3d13ab0ce46a519c631da491417bfbf51a

      SHA512

      5b767074cae1832b7981611686b1d357835236762c42c35f98a636f8faaf933d0fe080571d13ec676ebbe0cb03bbb4e9627ac839c488e761bc43ea672562b1d0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      36420562e2adeadba0017eacb2b9d410

      SHA1

      c6d29196b33671bfa65cc8964f4e00a1b87aad00

      SHA256

      1db3616ee9f5d2d1407dd437bd98c5172ae76bd55cd85dafbbfb19a7fe0a75ae

      SHA512

      efe57cbf64c0c5cdcb2fc7ac23f3649df1422427ff2c422b0c037e70564dc2a6978254102f09a461986ec651c3e5389beef4b97c589facf680426f69b3ae4635

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7e6c5d0aa6468549794adc6445e6b78c

      SHA1

      c77b3d4baaa3e7882d4f499908e0e2bb8b8f6b2a

      SHA256

      e34a06afc327dbc1400d5082ed3351013d5a2de0113acae0937e7e78d4e5b9b3

      SHA512

      a9d75f00799b075156984bef5104d5930d86ce4ef7f515c986faf5727ba4c1a73d9c64908eda7c3e852ade3a21435191b73ea64a554935d49dd8f22a1de94a69

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      22c4ad766998c405ad4e412d064ffe7e

      SHA1

      3ccd34986063ca470a44660a3b84e16c15128c3a

      SHA256

      0015e303bb217996f4de088a9d567ebdb29373b1b2d3c9613f7f81744c59b40a

      SHA512

      225d9d95da6d4852712f81e0fbc2bc39632327d71d29a4cdf5fc80880ba911d52570e210220dfc34774aa47d503de5c4b32f76998f0aa26908ca0665414b327e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0028f7d44cbb5b4ad66a5723f8fe593a

      SHA1

      e8c9b37d66bf3ddbb509eb63f873c68b127b6dca

      SHA256

      2d04b52a73c7180f3cd365cc3cce8385bcb42b9eb9efcc8aa12f432f4d1fe2eb

      SHA512

      b9e9b1ac305a15a2d7a040896710bab305491460fb21316ae07e0e854a3587db587dbcc2331c43e6ab9858b00c575e6e59fb25b80a5f54d4bf4473fa4c0a42f0

    • C:\Users\Admin\AppData\Local\Temp\Cab1787.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar1827.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1196-447-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1196-445-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1196-443-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1616-436-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1616-437-0x00000000003D0000-0x00000000003DF000-memory.dmp
      Filesize

      60KB