Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 09:14

General

  • Target

    a8e9e2bde3abf61692b3b18f43742104_JaffaCakes118.html

  • Size

    131KB

  • MD5

    a8e9e2bde3abf61692b3b18f43742104

  • SHA1

    d06d4baaf85940854f370029923a31e18c4cb944

  • SHA256

    d9fd434c3993cfcb3fabb537b6b748195d06e4298f107b7e14b1c8b5daa96e1d

  • SHA512

    c7164c6ae42f02ca5b9a6131e423117c63f3cc65fac26d80b69d1c908a31c32508ae17f2732a12a3288cb28570c9b72ca9262bbf7428152d9db0eff5ff8670d8

  • SSDEEP

    1536:Sx35cMo1yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:Sx3uMo1yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8e9e2bde3abf61692b3b18f43742104_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:406537 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2428

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4610410dea674add026a3e7db1630de6

      SHA1

      3735ecaf9cb7dc353207c4507507eb65f2e75810

      SHA256

      312f993885d2a23dc997ced0d9a70d0a2700d55ad755890530432533b50c35d7

      SHA512

      70350a480310fe54c7c366274f22e0c6d3d1e45df02372a08e4460acd7953d9b17a55da109bd17d2c58afba509cd17772c2f103c3b7767e2a907fbb736826af9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b195fb977bbfc20ac91e2bd98045081b

      SHA1

      9993a89ce8051266b129b8a5360a44ff9864f6ef

      SHA256

      05323f5e8e48e0e603a609a348df60f5cac1714531335176cf545f299b86c961

      SHA512

      f20a05683bc2318f5681571b1cf0d01c1d5683f5ac5cab975755beeee60ee67bc0eaa816124471a92e8da820bf715270c4214d782139452aaa8e56c9f66718a1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8e011b8633ff2eb906d4ce0952c5c8ef

      SHA1

      f50b2fff4083d943debd72ec75b1cc9139f01542

      SHA256

      61455465ba00cfb077f8f12c556bb7a2473c5c884f28ea9f2db156c936a08767

      SHA512

      6045921d20f1b5ff1a85971f3d83999b64e4c9bea3784ec94a4f127a15db1031dd03e41e50af03607c7140113e37da8b6d7cee742e413c3dd4f5b4b7c5cc1fbc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4b2ac7e9227ad3e8645f653a1e78e4eb

      SHA1

      1b72a5defd6485f1924aad1d7ae350112161e210

      SHA256

      141f4c005643c86b51e987ea3c197b6a4cccba74bd34c3e4d82b3d236d6b255d

      SHA512

      4c225021a3c5d3bb8a04f693c6e5ce1395f303d2d4e61faa0031feff5685a01eb176cdc1cbdb9fdbc456410e808845ed460985202346716c41b70f6de5e1367d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5dd1df1f96409a8ecc8e15d056750834

      SHA1

      6692b5a9851a80645d75b3a7c5822c7b674e7c6e

      SHA256

      3e44ff8ee220ea449e739545ce9a1d9a7d4839a47ad7809ca63cb0fb6b97484b

      SHA512

      14c892697feb063dfec17db12152c4a6ccd29912447b79e435d7e9f86024faa03fc5767f4bb9258d30d63555fe197ceadd34c97b055d58ca236fa9bb7a305861

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      69c7c147b44b750240b5f3c4623206f3

      SHA1

      fbe852b8a349bec32aad4c857d860b1ecd18b4e0

      SHA256

      dbb8677be70f17640257b09f983d2f4ccf6fb615aa2d61e6da05ea5b9dd42348

      SHA512

      fd4f317fb5e982ce7db4ca68eabe50e29ca56b2787ba4e317afc0fc27296d096da9db8ad9d1726c135c9a663dca7ddee699b71133c6de5d2c79c8b0f506584b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      25b32a684b99c5e26b372d7a382f76a6

      SHA1

      5d79cf516f6a73597049d7dc80ab0d7dd5673064

      SHA256

      4bb50bab311348edd81c7dfa4e73940d9e2b21541731f5222dfcd00bb3bb23c9

      SHA512

      d5c1f8bd0e9fdee2fdfa0bcfe206b6b54fa7a3e0d7bbf4eae9ba007d3aaf24747c458b0466da74c459000a2e862ed82d056e3e10399defeb2e8bbe1865078cd8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      263de1fa1c62ca63638511307e8f1a5a

      SHA1

      23ad00948b350cd6bfa640d584a89ad2bd93c359

      SHA256

      0def0493ec6be36eb54489229c9100f6e652a6e8893d8622ff1ad4b1d7b6b1e8

      SHA512

      63475c633832aa07d657962ec7d5dd924ed474ed92c481e3eaca5fe320a0d3544140d8620312427301159b3bc4e39a8dc0d7206ef938ca2b88105facfb411b41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ece34d4b06261d94b52da5662a87a97f

      SHA1

      cde101d04a50a1977b186d752306f936dc8d88d0

      SHA256

      b329681ba194b5ca3c50d701d47db916a755dcb3dd3426dd02c2ad6800bd39cd

      SHA512

      c0969ee4e288229334e7b28ea1372a02b0d630528d7071bd1f4d3514228151ccbe830172fac08497e00b2dfe0ea49390f9352f76e94b21dec2955772ff52200b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      341223ee01b2c73c06b5326b0dba0251

      SHA1

      6f38b46f1e10c62d9eab1426bcda40f773d83025

      SHA256

      f25ffd9dcef83bdb5034fc8fa2537f79e4bff72af3c97feb44d7852a3494d978

      SHA512

      98ef99aa92e057f7985ac715915fcb4d1ac756c283c01c6c8fdb39e88545540d10a422e5a32951581356821efc21b1c3e0055f76e6f4f78414818b3de83c1d17

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      957ee9e78a46afaa1b6990ce7173c0fa

      SHA1

      218348502973c0f4ae39555260a8c3187eb320df

      SHA256

      8989a9f54152de7538919d616682e45aa1560a102f4cfa13265400ad2a03137f

      SHA512

      aedcb9384eeb9845754dd0f32d5e58a178e4682f6da633a1ecb2a32247dc549b7b5bd2b5bceb38422592f7b62f3ef63ee335a6262416f331b02b7d1fbfa290cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ddfda41692ce82148c6961cf097c7332

      SHA1

      b7c596229c841f174ac8fb0f8008a53148e5a2f4

      SHA256

      578d801188906727b461d3570014f44333807705660930a98d5db02b8d0093e0

      SHA512

      99a14a9de5dce2cc1da5ccb54f00409e3698abd70d515075bc16da7307ca6fe0b6f2ea43aae0530de36e5ea9b5f9c39492fe87c1d2ac24f2c4a435fa904e3a50

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a9606ee04638222a87e38f0dea8e58fc

      SHA1

      c760d1b9b5106aa6791ef15ab265020622be792b

      SHA256

      064343551c63e768fe8fef26d482b783735e826c650b3693d6f9f2e9cc8aa5f5

      SHA512

      91b85c6e25a95ff2ba0c4a86c096c30b584e51bb8db2950d907b1ce65877bafb4f98bd01013b101350ee81dee94d7f10cb9004cd828c21a137fbf99a99a37824

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d399bf2e130c224b21f9e2ca2c102e38

      SHA1

      fa7c3f15dc7930828f77adf23f0f450bf29f29ca

      SHA256

      67687c7a99bc9c91799eb34957190056fd3e7172edcdbaf0010e5a2c5d8b3ab2

      SHA512

      38abe8e561d0f8901b1aea1f998bf9994fc14942d0dc6e465b7495252ddb2684ebe711f77c5be240bd9b40f1f243b3bb5d163ecfb45ed3db8a648be104dc7556

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5b7e1dace3795a8b75fe11009e318c0d

      SHA1

      3673be32c47465a74a12224f403611473ab4e576

      SHA256

      aad46b615bec4fd2c393acfb77ef37f1f564ca317e0ee44989be457ada631944

      SHA512

      4732307d6ec2068b5cb4824c935b0911da4c57a4d9d648987476775f5824af86d06b4f837ecc4a761cd07f2f758559c2eebd29082f40154563de53381321e5cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      995ea8a4f27915013c7108e9b80b509d

      SHA1

      53a5b3c0ec628408e18d075207d2fdbf2b6ab14c

      SHA256

      daaa0a5c83bbfae36bf07d2ab89ebcbf101d6c9d5c9df5dfcf8479cff5676097

      SHA512

      2b353b59d5ea10f9580905066d5594be0db6778642efb3df3de8c85ce5ffe0599a67e948d93afd265d4dc3203d4a868eb6ca977641a4e4a86aa56801d241b348

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      67c4ad03109072000f499cb67516b8a7

      SHA1

      783034153ecb98193ceb3dfd68c047fe6462fc49

      SHA256

      1aa42c7fb5636e8390a4bc2333b611a1a814dc07b09f6bfc863a8e7453035917

      SHA512

      a0f6e52dc5309b16e2043a42c0362b1f4926bd99b39e986c9ea2a03d2554cc429fd0124186bfe89a2063376c2585fa643e4774052c94fc41122cbe4ced9ad9a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2767f650fe76b39adbb620e217366860

      SHA1

      8e75d6a5fd0171e12ba93461f110be88b64a19fd

      SHA256

      9bdef9d27768ff12df30b8bb02388819be8295dbb0a9361254bdb546662d766c

      SHA512

      89009f18b15149941c7f124237794a07314884280cb86bc64fc20d0f4778ed1ff8bef58537e6a914171ad75242c833b16bf679c1ae5aaf5b9674a222b3ce60d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      52ab7994932abaa832c6a38fad932e6f

      SHA1

      8c489a1b541e56b094e96bddb9fab5c79eba8e42

      SHA256

      ea9575c446b0f8e652f2d28c0a65caeaf4a56b6e521bae9c7c1720d60531c7e5

      SHA512

      146b1be115d22f178bcce2e76c08c795bc897b93ea2a6af0c55427e164dcc45325aced1e2c08631fc81101c5e7423c6c17c7b88875b9c365676210844ecede96

    • C:\Users\Admin\AppData\Local\Temp\CabCC85.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarCD67.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1608-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1608-17-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1608-16-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/2308-8-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2308-9-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB