Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 17:23

General

  • Target

    aae503ff45e7353270c4b4f9d8a910d0_JaffaCakes118.html

  • Size

    141KB

  • MD5

    aae503ff45e7353270c4b4f9d8a910d0

  • SHA1

    e96e258bdb5de16a2dbf06709d53dcedbcc2fbef

  • SHA256

    9a1bbafd76f1e561e6dd95f78a81fa084bfcd9e09945df73e29d59e1f59114e2

  • SHA512

    08a05acecaad10e900095a468b994c5a407c018c7e0c9db5d5ddb536e513da5ffdba6037d406c73fc71d6fe0d7efca67a80a51c33292a2b7c9b085145f903225

  • SSDEEP

    3072:ST11lvRIMyfkMY+BES09JXAnyrZalI+YQ:ST11lvRksMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aae503ff45e7353270c4b4f9d8a910d0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1228
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1568
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:340
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275465 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2944

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            685cea414d918f4e72197eb5e3b14d2e

            SHA1

            3a769d8eb7f2320231594497883eefd509c46960

            SHA256

            f58e4926de35320271d2c4f349649ebc067b84f60e98b10b1381016eb5472e80

            SHA512

            9eac6a193b4a8275fba6ced5e8625e5be50379aa3611227510af683d38e51dfa715cbac33747bc86eb511972f8c195eef0627618624830f8d4125e88bd439e48

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            a032a9a6aa954d85ef79a07563239c6a

            SHA1

            550c3a2d2580fe8bc4f5fdcadd80c744f9705d54

            SHA256

            d29ce8d52c039239c27183c6151c86aefff5d428a8af78bb43bc83c6cc85b22b

            SHA512

            950dc2368ff1a18e41f23892eb2650755f3f10f86314f3cd9ec9bc56fc37a164a1b1feb9815cdce5dd31c27882cea00da90d0ddbcccf01e68628275564a02271

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            d594e6c603530794ac7f161f04d96555

            SHA1

            e3dacd9ea0e7fe0dd8a8e538ba87cdd533a529e7

            SHA256

            c36cd7f5edb5fcef032a2d97a960073dece43cb0729a5d9ddd7b2786a41ae193

            SHA512

            6d67a8ec8a13f30970b29e349127d67cde0b0e0322df329596537bc7984746204a3098afae73681026279741b278f77a905727e25bbe02f48ce0dc18cb1a18d4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            5948179d49794f2637f88f1961346d74

            SHA1

            398b23a3d70bb84be5bdf7089d3358149ad558ce

            SHA256

            f880c0fa758d7c4d8db56c328ef7d04de3a3e0fe6d77d73baafff695b8505c25

            SHA512

            2d3081e179eaeecae6f2b760bfb51486dd161e2308c69ae7104a7fe7af71f76733a620b7a318beb11a82f3c152d29d10c3fba23e9e3fac19f0a3959a19d2f14d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            d3c6716a56aec5395eda0cfcfa2d8484

            SHA1

            8e29a21f9ac9b69be8dbf1d81f70e74dd25c2428

            SHA256

            20dc4ee7753a1b7cd8e5dc3105658e2bf866b7d5ed86d45cebfd69b6059c05c6

            SHA512

            54bcbf2d94099625bfa72e29825b23eca1e2aa5929d20119cbdde48d410d53b796254eecdb4f89e1f22f92990cc8e9acfdb5778b1b4c14d10d65864f54bedfb6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            07427fea609b0bf9fe8e7fa7b16a9069

            SHA1

            09f21e3105edf3ae15eed27510ff1ddec33fe73d

            SHA256

            e0363580da650a2292a2759e5d7f8753fa9343fdd9100856f1745daf3e27dc27

            SHA512

            4407d3436f3b012587c71049932847f295a8aee9027cca8df5bc2542f277df3b4a627599b302e42a3020563d06a94c6f7dd926de4466d8a5fbfcae9fe9984a79

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            c649620573e1d1281a91e22fc56d1316

            SHA1

            4c890063f4cce0f838c0b854cdb109e7dd69e9e9

            SHA256

            1dabcc53cb29cb095ec382677eac5a30e16871ca7b957721ae359150d6b6f43e

            SHA512

            8d3afa14eda54e92e817eeca1dc4f07896859f3952ca50efa6633273b615fc3cebf162e349a45e224a547d35b9e34581555f397ad43cc10ea4ec9a39df61b8f9

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            10270b6b79942a2452205878c60a843f

            SHA1

            f264affc31ba248a6e4a80f5b774f7edac1a0ca7

            SHA256

            8cb7dae2628e01727c2ac684c01f1b983939a0ff0715194722c98f230830676c

            SHA512

            d0bbeb2b9cfb99a72eb979e8dbeb48b45ee934ea52caf547f68d40b6c20d93c65b6e32da3ee6aa9409a92421e7213a436961243d813a42a15dc0610098aca23b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            e65db57950d2d39c186f9a9c3c93038b

            SHA1

            2ff1217af696e424f4a8e2ad1d6ce8581a27d3e9

            SHA256

            659bed2fd0fc1ecd8d4ab2d6132eb4e28334e2f940b74941ed8351f50f91c619

            SHA512

            4d1296b13cd36a4e1212e7ab94165259775e8267970d49accaf6496c3ae6c73cb7ce8a5eed9b0c909ea1738d8480169ada8ef566dfe33820457af7601b511cea

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f5bae5c8add28d25a97c9955b097f9aa

            SHA1

            c2259aa9cca7a2cdbe619b7882f369a72b3dd22c

            SHA256

            dfcf27897552ecc2eaf1baf287791f767e4618fae0a5ccc90335f9608d0b8bc6

            SHA512

            5b0eca2de6a12450409d53fdbbf0fac6b913eb8ffc5eaf41148ca3cebe52202b73ba5f5c445c064dba592e0857fc64ef25b537d5b4f72e8372cc754f9870c8f9

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            3e6e710b064fbe152ee7f856df1db04d

            SHA1

            19651c0259cd34e9e1788226a97c271f687f5afe

            SHA256

            addecc32cd426e96552bc3ef217fd0cb1d3b286ea46a818ba386c3481298507e

            SHA512

            56aa2b510102f601ee131965bc6a68fcb7dbea4449096606d9eb80b10a935dabc1027660cba5a30856c5ecbc20469df12940f8ac9900f6643d6ce1c48f7ff005

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            6612a4b11eae438205675cebeb9eee57

            SHA1

            6045d986328952d203d0864dbdc20610177ffc36

            SHA256

            1aa3ad0c0549a07681eaeabbc9ef8bb63d1e37c41922010cf84d2854ded3d387

            SHA512

            06fb122be3d981112a0c6b0bc1d89a3b929acb59e8847ff9ea313e7a327d6eed73124538fd65572d118160e78fb5b208192385da7216a020df1fa2f2e5d4c356

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            bc15cecc39ba369e0ed67585e7e6c4cd

            SHA1

            ae143180f20debe7462f18e7e3b5319ebceef450

            SHA256

            601d14f61265fdab0d44e377f66ad4718e76f39e0e4c584b7a48924bc3af9f76

            SHA512

            1f4de9a5deb1d0193b453cb5d89e96d08fba978b54c1c7c7e3ecc9ea2ddbbbd9aaa53f00c564dfd51fb34dcfbd5ee62cac027dd5ae5b15dfe5d6a90c41d32a9d

          • C:\Users\Admin\AppData\Local\Temp\CabDC8.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\TarEA6.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Users\Admin\AppData\Local\Temp\svchost.exe

            Filesize

            55KB

            MD5

            ff5e1f27193ce51eec318714ef038bef

            SHA1

            b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

            SHA256

            fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

            SHA512

            c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

          • memory/1228-436-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/1228-437-0x00000000001D0000-0x00000000001DF000-memory.dmp

            Filesize

            60KB

          • memory/1568-448-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/1568-446-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/1568-443-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/1568-445-0x00000000003C0000-0x00000000003C1000-memory.dmp

            Filesize

            4KB