Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 08:48

General

  • Target

    b2a456c0d18c8969f41edfa3dd0f1228_JaffaCakes118.html

  • Size

    156KB

  • MD5

    b2a456c0d18c8969f41edfa3dd0f1228

  • SHA1

    c4067b34c9b7beb1a3bdec4ad9b2d52c79fb69a3

  • SHA256

    9ec301e2affabe4a4ccb7e63a61020f35a21b6aa558c4f1f02d2e083b60565e4

  • SHA512

    5335307d1af4826039856275c5f87d012724451f1f6ec1a2570a1756b2f8f3085c508e5ce20e29e756d45cf58a0ab1f264be8b32e390c2493e6172ddb58ae5ec

  • SSDEEP

    1536:i1RTXczbKeBCe3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:ijre3yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2a456c0d18c8969f41edfa3dd0f1228_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:628
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1952
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275477 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        PID:2336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2e6cd537249b9a22db00f7df730965fa

      SHA1

      3ffb3878d1b1ec2bb413be035b7b085e89d10280

      SHA256

      9765c73b1a84e016713671db987488bfb5dd21ae7ab19aafd9b5aa5ac25fe45c

      SHA512

      803604c526fa0c00277f83a7ecd45452c1ccfb144f94b1a5c15aa581e5a06aa52d579c5a52afff9c16daf8c1a13dc47d2f9aa206a4e839b96e64628c86defe03

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      48e4396f29e0ed5298fc0bd6600b82bf

      SHA1

      bd9f5e0d171bd0f6e7645c58f027db4c1795cca1

      SHA256

      461e6c5f8553917106c2240bbb95265b4d5b8156848c555b1b72f32e5a702ddd

      SHA512

      116c6b610a43065e205828aeccb52631b1f722e946272ad79c2757887a1981882f7b4f8ede0f7d605322629f7a3ffc1e4c3f2cdfbb4d4d101c9c7fb74f98a13f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      87b656e619a9b6a086ae1d435ddfa95e

      SHA1

      723506c271f248949877248d9753e72beae73f74

      SHA256

      5b553b7cbf74cd0cdd59a08673370a39e137953efb4183000e4afa4bfe2213a5

      SHA512

      6ee29f0df18716ee49d5e580f48df1ef235cfa8722301f8a6d57e39a2febf3b510ce32f8c626fccb228eaa3fef98fdf4e26b8e3f4e533b72a9c088500002c4b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0089570a447cb9abbdd95481e13030b5

      SHA1

      46dea3b8e143ab595f1ab3e4f680727768df81d9

      SHA256

      d2924be31b80d8bf27768cb2f54a7a6c43032e3d224653008752568fe6909366

      SHA512

      26c5a20567690c2e66d7ed60caaf4d5a0fffd93830eb0dbb91c8a82f061151d77d05c12dc8131597c554537500c00e271695e06ccd74fdbb33d586aa85fee553

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      643ba971680a155cb66ea516225ac14d

      SHA1

      bc11eedce3e531ab2c7e138a10c1fbb9a90b4e56

      SHA256

      791136c6faed39bd125da26e72f542238ebc423382deda76f344603f1cc58fda

      SHA512

      2e68a79521daefd000660f40dcbc4cc88ddd5a9d523e1277319cea51885039a93d03f3e623293b72d00b2fc6c58d6b2d32322ddc84d0b302e52ca4e62ca4a4c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9c31d113d841e0c4cfb5eb944219bdd1

      SHA1

      6ed3f1adfc70a7ffab01dea8eba0d0bcec20758e

      SHA256

      9cc45152128b6d00f33eccbed222a3ba60887ae9908353b4c0f5cb8baf6cdf43

      SHA512

      26b4d9583021df2abef1b81cd884061af8b9c3b72a0c3646005d71935d8e536a7c179629552187a033fc7beb7e8f17c2e93eaec67f6d9eadca59fa7e78f9a6db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      75f999034e2cd6954676cb4b28f82ebd

      SHA1

      32b5969cb697332eaec9677175f7edd4c7f8042e

      SHA256

      eac254f6aef922551f6613da2323c0569e56b84c16fa743324ef76bf90b80193

      SHA512

      90072adfb89392570c7b90088458871a54fbf83cdda6e8d308fde80eb1cc86c30d93a65572d57d4524091546765f21440e9c738d9b6a85bd1e833cc78153d266

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      36e3724d9132903757450730f57a126c

      SHA1

      330dafc67118a52f59b17334c71885ff95b4799c

      SHA256

      4bae14e14d5de1dd1f7f7190f0080e53c7d349ff553fd369de35d68fa66c5c45

      SHA512

      64490b6d3c59729389db5748704bc28cfdb11d1c094e2a395a6a3b2b76b307f9bc90dfd621a1ea87a05a14a4ccbe860266080e467b21560f592c41fd46b17d5d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      053c7903623f2f5d63bb0fd100e2d68b

      SHA1

      3cd9e65a9102166743bbbe2282e1699b2863d144

      SHA256

      4f56e9a92dbd3449efebd8ca4a0fcc9b95b4de909f2baf2f0f6238a98e61f0f2

      SHA512

      9ae6a43cabb79fcc5646904927d37c234652675e78d7d496bc7efdef0b975d7b9ddf2d5a0ba940fe41d928bd2e816962b3801f6cd962fdfd40c7f81fec15b535

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      25b070f7e74f0866e9c9136de962183e

      SHA1

      8b8192cb7bef4b1a5f7e14db692a13e21addd428

      SHA256

      e7c1d70ffb92a65b0f40b2d75f0ce157cf5023c400a74c0ff8c83094c094df02

      SHA512

      a0d67887b39a77f33038cc71739ba8c99c3de633de0eaa31ac90049f8999690c13e3b5be0ae985131b10a3dc389f0265499f8b33fe95a3aeec0284c6b6f7b859

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      689a75a6855253dfcb19bc9a6f372dd9

      SHA1

      64c209aa1d0ca07ad0132ef825cc9b6dd787a1c7

      SHA256

      060237af3bb5d6ee1b8c1c454598c6ebacca47053253a72495ea7724f6398ccc

      SHA512

      b1078f390b45e95f6543c67f2c4275af6990929de6933bfb61ebbb78381c9ff32cd12a5e1d228b14641331c4469a55274caeb44af56d02153580325287d428dd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6160e8df32de7c2c5f3a1dc4a4d98d60

      SHA1

      cf574290bd2546107bf089ba212a29e1af50014b

      SHA256

      4bcf856fe3134af03b9a3d2610a4651d5d5cb1ed555fdef33709fc9e711fd32d

      SHA512

      706375c26a0181625476d6d8635629bb7dc47fe3cac5bdaae29afea8671fd68e5cf566762444592969aff2c4d5399e2e926cbedabdf6b9f175f0a2eacbe14c9a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0d1e376a34bc4728cf1f6b924b22548a

      SHA1

      70b447ac2473f41b78c85d807ccfdd2215bc863f

      SHA256

      0529a911b6061bc8ab5ba716fe10cf47b04715e28ce5624e1e66aced6525d6ed

      SHA512

      2030dce8c81db3de366d37e9fd2aee25ccb98d3b494f54ebb8e804daf1a55f3b53b0fe324ea347267457307e70bfaf7a1254026f57de83ce548759cae4aa5aa3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d41ee2eb73e7d5635358ae77f1f37328

      SHA1

      7bab0d033321eb5c01270fee44a1c061272e0c58

      SHA256

      a96e8c5f7566179f61d141d426e301a382a234a2c5df53cdfe4c74d1a5a56253

      SHA512

      8afc913d43f04a70bd0e51b774034fdadba05fdf44b84ff9690dc812cfab8a07bf995870f664a50b866b2437c1c934758031d291cd2fc78c8f8adcf20c93b93d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d5f34e0ace544d8782c7fccbd80f026b

      SHA1

      49a850c0442ccb231baf270ce948ab8fcb32e67f

      SHA256

      e17f1a55579ff40e4f536241b7f11f4ad6a61f446a3190c8edb7dec034f9c135

      SHA512

      356a79bc6ddf1873e27fe739e0deb1f6fa7a8bad062e5fb6c67ff176a6bd0e06f903437f6fab48ff488460c2d0a5be3cbb6bc94ba3041d79a0e1f99173fd2f19

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7fc09cf09a72796a6612855d8a6a5a11

      SHA1

      d630c95ae4fe6af2f5f8ce01c6b2e670af2a0d69

      SHA256

      de1cab79bbc11f93d9eea7d47267322323aafd411d229c914351d538b2162dcd

      SHA512

      d20090d7e75e14658ed117db7fd61cb26e0a0863646a895c24359a17265be98fa073b1c9323f66932228d84293ade870f5c27a79707b6b53c718661f8af146f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b7b25a544759882226f3af4dce7fed12

      SHA1

      1b688c874346bb1e8f65cb54abe1886e159ef945

      SHA256

      d670103947280efe1b95bdb3b9ce469e5b0f1d61414c4186fcd7052357fcf624

      SHA512

      b79bbfc6bdba222062dd4ee43e5abd3849e8079d439796338353f5466ca5556f2444e39da7a25fd730c770fdc6d3c003137ece98bf36b81355ec2d7378f08be2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a773cd84e165f784772ed75e3a7b1626

      SHA1

      5f2a6e1ff49e8d9cef5fecc4db192c4c5de680f0

      SHA256

      816003f9d70c037a4fe215b426f013823764740bd93c9d65dd507ae8d3e5870f

      SHA512

      3eb8d0da8abfde2f85e0fb8c3241dc4d39736984c6aee3bc6321e092a2a9bb7436d9a16a82156aed27fa21ee78cd784705ca5f99f024016cc8b7843951ba2d4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9e6d360434321dd6796e352113d09c6c

      SHA1

      aea8070672f82d439dc198df4e4ae0af45d8b7ce

      SHA256

      38470a9f519a4613a46093dea1fc9d5ae45f6f88bcf3490e7500c19761067d69

      SHA512

      55fc68152c2dae1dff404934eaec47dba2e1bbf8b586847e7d93aa2bbcb42c77bfc22fbfe53a9f9511aba0b9671708b31c01a25af7c5ac295f6d87775d2379b9

    • C:\Users\Admin\AppData\Local\Temp\Cab1E1D.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar1F0E.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • memory/628-489-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/628-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/628-491-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1116-483-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1116-482-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB