Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 20:11

General

  • Target

    ab416899d5e4e690ea1aa84587a3624d_JaffaCakes118.html

  • Size

    347KB

  • MD5

    ab416899d5e4e690ea1aa84587a3624d

  • SHA1

    84a2ee108fd8f7159b87b46caafdf1ef92d4ef85

  • SHA256

    67f1646ab14378ab377487da4f0b7e484ee1e7cf2ef52b1bbef4380a8111c50b

  • SHA512

    b134b916e2e76dca9f7d6d413e3feeb00fde3efb7ec232516308c7f669a1ef38cb3a55a2ee5de75a88ec9d25b9bbc69b45a5aae3cd43ba134cc08930392ec379

  • SSDEEP

    6144:7sMYod+X3oI+YksMYod+X3oI+Y5sMYod+X3oI+YQ:P5d+X3g5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab416899d5e4e690ea1aa84587a3624d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2132
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2624
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2728
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2428
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2556
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275464 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1984
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:668680 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1480
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:668685 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2936

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          58807c8656c75841871bc7db59a06822

          SHA1

          ce8142c951d6348f143139c0075e5e3f745e68ed

          SHA256

          bf66bc45e6c555c9ab840f38f05bc9a882029e7ca1bbb2e702a345a4acc70e62

          SHA512

          f0f0a977729abb1691ea6f24604ec1fc1390fc036d729f1d98321b18df8084feeaac80b3a7b0e547612f304d0dca9fb9990c4980d9b08b21f8dd3ad0ec2d5cab

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e5994c8efa6370b2cb79dcc0b8ae51c7

          SHA1

          4600686439a01623d791d243892196091cba74b1

          SHA256

          8a0fe9ea2b57bb54e0677b4cd102849677406a78a4b92350801cb7d54442d14c

          SHA512

          1384ec7fd2536db65bb802fbe5730e669cb29f7eefe1e895824edfd0c3715f374276bf734d2dd449051ac147f569083da0a9b490cd1877f1a775d8fc0ce11987

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5ba2c54fa4295afcf0e99f86d3e5a223

          SHA1

          ea328abc79c624f18c3ede24fed04fb687bef011

          SHA256

          cc47d49c4aff894e4e8c3e947a0fd1708bb3ea19c6c98133ba29ee09aa9ef7f1

          SHA512

          af3e93344f0732b7ba4992e46a8d9bb8727700303d500fa1f0335bc070804ec7f60d0ae97ae09cf9394a242dd4dc63c1a6d05f40956431c5557c14e2f04cca61

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9f6ff96a55c34b2d1f44c710eff96319

          SHA1

          8a55b27288ad964b6d4bc8956eb97ef08054d68b

          SHA256

          6ce9c9827c484add42ac3a3fe032edfa5b6f3777b0d6b3b49d371465862b182f

          SHA512

          89954fb39cff986d7398d9f0baa8006ec0baada7d7b10145255bb94ac21cc831f394e666aa4837863ee8506d103c17af8254a04fef4e48d0ee9df8d57be38b65

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0f03376eb9e805e59cd590d2b32bed02

          SHA1

          303b18a789596a1ac1a077b475090fe0dc4481dd

          SHA256

          499211ac1506b76f3f1452d964827c59d01bae803ced9b4ee8fa509e8630ae9b

          SHA512

          acf1260058cdfb7303c295fd4c79ef9b95bcfb490ef50255428441dd6c5a8341924672329f84645380cd2968a28b45988d2ee8eeec13cc2aa04da754bb13c191

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          74871e78a82844ae4214ccd950c2ce69

          SHA1

          fecea538cf7ca284af335770e81991fa0e91af67

          SHA256

          4670ec1c68e110d2ce2c65190d2af4d2f66dac088533ae3b649f2608c3a2a800

          SHA512

          c1b299f3d6755959400d9627e8a312a7c8828fdc6dd4800554b4fe7e34c32f0135ee2bf3f80ebff9c7eda206bc2dea8461572aa0398707197d47ac7781df4fc2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2860923ed3068f3849ffbfce4eab259a

          SHA1

          995b546f855912d07d63d3188766b5b9ce2412c4

          SHA256

          f1dd5f8ff21e889c66c53828ef31b69069c27f1e5324c70c40500236d4fd5129

          SHA512

          d6073c3bc959e39b95d21c59918781ec26efe3c10b57e65ebb1bf14e9d825ef32799166398d8beaace60fdabce90fb0c52be6abbe5776920e1b0fae752150c70

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8068322b6d952082108bc316431e69ec

          SHA1

          3e4c3d06afc38215a60ae5251d0438e2c20cb3ce

          SHA256

          c4169636197bd252779a1eb521bf33daedcccc41f2ce775c52f1d970a53998d4

          SHA512

          1dac2546ba41ba4eddb33bb8f9c168069d733c42781982c5fc0375a1f634414e54c5c1d71ea55d880b712dac61767abfb6c2574d6ebe3e287c134b2da0e0186a

        • C:\Users\Admin\AppData\Local\Temp\Cab2010.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar2101.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/2132-19-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2132-21-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2428-27-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2568-30-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2568-24-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2568-22-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2868-13-0x0000000000270000-0x000000000029E000-memory.dmp

          Filesize

          184KB

        • memory/2868-7-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2868-8-0x00000000001C0000-0x00000000001CF000-memory.dmp

          Filesize

          60KB