Analysis

  • max time kernel
    136s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 07:49

General

  • Target

    a898fdb16155f73c385d7663c6818dc7_JaffaCakes118.html

  • Size

    129KB

  • MD5

    a898fdb16155f73c385d7663c6818dc7

  • SHA1

    7211a17e74e5ad14257034d8c030dc07c4d6bfc9

  • SHA256

    38768d60fc113267b5f1f1952e1930989c03606b57ef5a37704406017a5f63c9

  • SHA512

    3b6de0a5ab8ab079bcfb0ca793d6b379676b329be165fc9f7b4f43871a152e3dd5586e7f4bc037ff44723f4eb8e600ffd6c186177d0431347e1eaafac7aa990b

  • SSDEEP

    1536:STvb8cMyXgtqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SHMPgyfkMY+BES09JXAnyrZalI+YU

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a898fdb16155f73c385d7663c6818dc7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2836
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:209936 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2680

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      47421dd451f0f4ed912f7d3130c4d274

      SHA1

      3b22c9508b1b09df66d16bb25be5761ec3cf4919

      SHA256

      ff814b8982909eb2382a6669666a462faeb2c33fe74c04679dc5a8fc587eb472

      SHA512

      0dc803a36f83b7a2541861e5e85e031b5083d75b41f9266d9f9e1708fc8728d850c92d3f87fb39be9232e34b60083b75a5e5dda7cbda04d393ff637075a8e2f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      42c3b0e3bcc9a653f0a957613496d926

      SHA1

      d30ad9ba368a46ef372d55feb9e4661041e086f8

      SHA256

      4d7f582bb8cd9e4a951a3b93948bbea0890a0f7b52ce6c3f4d5057e1a0d42580

      SHA512

      85730d082cbadeec795c99a93b8c64c47476fcb3418f41521ff5c7e6f1d60bf52b10887b2267ae6b9fa5e4f8d85d70ce5d859c18b40d3a3add0ad5abf887e458

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bd502aa941c0e3a558ae8c9f712c1186

      SHA1

      cc672f560de8d5a10975c41c456002ea4b95d31f

      SHA256

      f000f28be0f3fb9b6e6858b952342482bd5c1967edba908b4f1a5766afb58af4

      SHA512

      219e7a8ae35991e4958e1f65f1a844f742ecbf199dfcce8e273020f8e5269eb63b33271eb1ee7825dbaac0545f1a51ce008333f1143b220201c6d0c2aa2e6044

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6e53e2361e8844908bb103630e35fec9

      SHA1

      844d9974bed2baf495f799eaa43014fd1f16b686

      SHA256

      44d6c0cdeeae1cd92cc3ebff4daf9728112a6ef74e27f9c166afe90219555905

      SHA512

      59e2b29742820ac6bfe6c00f0c8dd6045079803a7153fc25889b4b4137799e12b56ace77ab2c0f7f529e6a27d67e7852d14819f3109316e784375233f709a980

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3ecb6b36ca620312612aba10581e3654

      SHA1

      15f59d60117c3ef80a8ee60068137206fd421e17

      SHA256

      cb4d0a41bf7d16a58fc3ca3721af0882a88f7c7528cdb0439881b6a979f94026

      SHA512

      672dcc88d56911ae0b5e5a79577bccdf5d915918effdd23477ef32467c4c215d04f987b2dca0fea1868d2197f3949b3c4d89c2a724e31bcd6d813db85943c96d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7c962b3ab684bd041e87e8f2b150c9f5

      SHA1

      052d09853868b985938c754d96508500138707a6

      SHA256

      8b736e21fbb48a030e234c5400d61cd27427ee50be69a4001c19c749d1a305a0

      SHA512

      0b9da423e5609f3b3d89952d9ad34ba3b14b8838658e0ec31db92d548f851c33bbb15dcb78ee66bf067f77c5046ac127c70019fed499062896da9d856b637811

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      05ce268fadbb1c29780b533e76c1415a

      SHA1

      7431f1ce5a98add1c0ed4cbb3a53775c5951b237

      SHA256

      48818f7df70f30bbfd5b08b518acebaaabd0a64ee0ba38c270d2452dff3e8dc7

      SHA512

      7f8ecccdac16b602a3eafaf7bc2c2483040916ed01bcf0dd42ba2af30ee1625c8429c6b076bb1a9aa341811a12e720ebfc5b18430a45ec527ded6f3b60cd2cae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2012d91465b4419fc5ab31ff34cb740a

      SHA1

      be7b647985a7628751579dd3f02901fe03576135

      SHA256

      748693551590260da03efd2e512644478f8fc66c4638b5cfb656bccf5558e179

      SHA512

      585a0edce913d6baacbb84a90455a33484d224026d26f0c1f00590c08b1dcbbf935efc6ab22c15ccdaf8757dda8711b062b9662beaa2a648c346cd812302fb85

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1fc71030ca2496b94e64371d987f31c3

      SHA1

      6a5d3cb28371c32b6d350ef56ab4104d28c5530a

      SHA256

      1032630460136cbeaa848649273f64e68915befafc725902ee85284cbc46ac58

      SHA512

      f624f2e619f671f887f4f03ad56d2c2df2375f92f1dad3d530e1022eb94e980439e4cab84dcfa6728d9a5d35b123796a167952aba9df5414b22df4c3ea95f317

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b2f0d3c282812e24120b340f5ad49628

      SHA1

      9f09b65856965cbe866ddbe706d66bb24c927df1

      SHA256

      590a7eb4c23ccfa9de35b50262698a68be380bc15a85f4be9bc1245a5e6147a1

      SHA512

      611821ee11942996661165c6e73818b8bb1c6ebc7b131d3fb35b9e81c438c40e2be9193170bbfffd446d4848fe9aa86ce6093bbf96970e956579776073b626ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b26dd08541c330798369e36cea385cc2

      SHA1

      1fdb23d99d72d009a89014e0e505527b05d544ef

      SHA256

      9c266f97d1ad4ec4edf98b69e7fcc6de00c322256c2c821fe90acc9a7f3972cc

      SHA512

      5cf1e0616541b86a1a99f3244cba32a470c46ef02aea83a8edcc446c7a66d590379c1bacbfc082abd3482c29052598e88c31faf58741a36a02d9449e12ab4883

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      29aa4c0c0d2ccdc4c0dba338180e6e6e

      SHA1

      78cb5058e5fa48a62bfc83cf585713b4ff063a1e

      SHA256

      db5349cd1ca88beeb51668ae679dce08f90e23bc68637b8185d0b50a90392a1d

      SHA512

      a1738a0f40f0b5c2a10b25d72fc0087eb616dc68960da1b00cd2d5a4bbf037c52c2c59b9a7d8125c6af28b8ad063d7c6810c981ededd0fc6775f99962fa2cb43

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3ba7e1f04b1bc096d51103fcffb6327c

      SHA1

      ff4ea5841a40e59e51c5228ae7d9b8f086a8ef57

      SHA256

      86d4b9acaf2c97d465ae890134d3977017bd452796916cbbd38fa36705946376

      SHA512

      500fc3f50e873051ec36db2fbc00be669da1ea2e2a31a696f3f595c88c5b82f77f52a69c19909975e068bfa72e249a1056cc6b18ebeedc33fdab33079d7a27c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      dedd3b1a135138ecb44b8a93a00390ca

      SHA1

      db181afe6f82a5d7f86be068f761d8e9e0d3f731

      SHA256

      7a7e0ed8f6ca90cff37790a721aeb3433361aef133af37e6ddb487754b76be24

      SHA512

      981d914f849d4f603fc8ce0af7648b471d33add90e14d46cc188b099ecb2fc5a2801978691a1662a1ea5769e38ba4cec0f1fd1b630c1c9e2024372536feddbd7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      843a93f5c4bfa50a095a499547387154

      SHA1

      72057cdf44f845648847400b80ef4ac24547ebe0

      SHA256

      5a494c58314036dfdcd5af03a272d89cc243beacb2794f9b145d3344e15c7b63

      SHA512

      067cbcab9c236573ca5d58390437fb14d672a14826c35d58be58629fe353d65b9886dec79bc3fa3081da3fcb6d23d815cdd69ebd503cbc9215b9dc42a7bf1f7d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      76ad4b54d66533a914c5066df6b35742

      SHA1

      1f17a99f9f0116015933e664ae01bca3976a7971

      SHA256

      8c660a3b4a3bd4d6885c4b5d4800b395084c573e4d1a407a0544518029159202

      SHA512

      08b3ee17bdbb484ae12496a4965811283b18b90d5f3af4e3f40ef06939ab3e6e943a36bcf4e449efa439233f919a9af0f80666b59850d20956feecfd192c35af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6c6a9e622cd071019a6c591700319635

      SHA1

      336b7f3e6ebd9a2584ecc9d6fa8e2ff438b264f8

      SHA256

      2fd49f671618a99ed15fbef68d71a961f1e01d1333e64d6170e64cd064b1eb4a

      SHA512

      d8c65a72bf44ac15a7e7ce9da015649f3c1085ed4aa16b0e8f97e8eeb8219665e4aebea2c2462053375e81c52401b014eb19e368f414850fa44fd2254ac19be2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      978c615a6d7fc2f9282bcbd3a971452e

      SHA1

      1d439e39f60130cfadf9b37016bb6f51c70344fd

      SHA256

      fe9956e854c2f1de4f0013503ff508b40f17b42ccafef1b967d5f80b6d136a3e

      SHA512

      3a69f50de6394a4b6531c3dc0368e846e2bf76b27198c2b892c51ce22abc4fdafd76538ffb77e8fcbf5e503cfaa8c0cb23ba3152f7463736ca72e368c7fffc50

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      beb0bd998058d7c3a98deacd31b7bd8e

      SHA1

      0310b3cc7438d52606910707ffcd2fb67c95a16b

      SHA256

      8c36569d37e0bf9d46be66ffe7cf48e92f48553992086bb7faf0c5004aac70ae

      SHA512

      9daf09255c68d5463817ef4375d5286e592d46417f0912210c0ebc565ba891447a633972c8a0fc74979a2fd6447dbc97d08e9478f367ef3778d6a072119095d8

    • C:\Users\Admin\AppData\Local\Temp\Cab3B2E.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar3BCE.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1652-449-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/1652-6-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1652-9-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1652-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2812-17-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2812-18-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2812-20-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB