Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 11:30

General

  • Target

    b347982bfe4137c00b68068fee523a99_JaffaCakes118.html

  • Size

    155KB

  • MD5

    b347982bfe4137c00b68068fee523a99

  • SHA1

    620957b5b3866dd82dd77f3f39c79dfc7d51e8ab

  • SHA256

    5dc213e79b19ad2ced62ac9330fa0c15e5d3f81c06cea69c1177a24b5858561d

  • SHA512

    02a59802da0a7318fa6f87f28e1395f3b287f99e53c765d3150350137134710710719e84fa6e17718f6b46d1051fa67bbcd901d16607abd22adf17b66897089f

  • SSDEEP

    3072:iP80iSQlOPFnyfkMY+BES09JXAnyrZalI+YQ:i3ill8FysMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b347982bfe4137c00b68068fee523a99_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:796
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:768
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2976
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:209945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      13a508d3daa92e320ea79b188733809e

      SHA1

      befe7e1698ff7faf7bc24268256757072f6a2fcb

      SHA256

      a0dcba084da616c3da57a04f42734033084bfdedfe8a092b34b6f48ec2332622

      SHA512

      df63d956ce628830d72cb51d2733c0a2f7acd05c9f8a598e60d706d36231944bf1fac21ba4dfde02ed329ca708d61e3e1993d481ea499ebb4a5170ec2eb7579f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f1bfee19b5c2b7b3199604e232b04bed

      SHA1

      20b49a283c33214c9d1717e44e0f80ab06c470cd

      SHA256

      a2b7c7c53d328ce8056797973c37bef8c18e12704bb99e78b230cef17a55722e

      SHA512

      3351767cb16479b8920f193788fdc3e87a3c92e87e193717ddfc6a4ca9ce8eaedc5612695a413df118a47c597d86adc25e22e3749e774a65b28c65a86dc524c2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      884445d2dd74df75c7dc695143a73e38

      SHA1

      e893ba52b838d7e7e89e46b863fd290cfc8e88d5

      SHA256

      9404e178a660c1153511942047c196c98af8e0c2e466a5493e16b5108f7a72ba

      SHA512

      cfcd591c1d7f188d6ac957030a3b36121ba19e1233dd28e0f2b0c0737db41cf668df8a059de0b6a7569306f9bf52b2c73d48228b9ced1faeb5d5f4738fa2ca1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dd9d42f694bad125cb2edbec92d2016f

      SHA1

      4813ec1a78ff8fedc9fae6f52a20f44f4a69c362

      SHA256

      0e17b5d05bc2a872b8d689735b23c8beec7579716697f53908b4620bf2e66e36

      SHA512

      5455ed0e291c2cf0eb3e78743b24bd37a974e8a556ae4739b86aa52849208a8b25b000437e574b4df2f6bca0d44a13747ac555521561dcf1f087d239e3930b04

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      02bc8e86341e36337cb56290b4cfb395

      SHA1

      9c9a0ca4b36554e0fb2eeb62eb0f023d08569207

      SHA256

      e3834383ed4fef111c83a88873e52e1892d16e48720c44f9e6e2fcc4d5a974cc

      SHA512

      3378ee662ce39a19d9fd8e07e9aaea98170cace9faf9b2b5d053c39966dcc57c140c4418d17db92de8252a812664573ffe07ecf2f5569da86812d2d69b0d654a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      adb9e881c08f61edaeb951c90e83d0a4

      SHA1

      625c825a26128744d7852ebfa810c87e8b618de9

      SHA256

      81df2a166ea7a3227dd704c91683e79c98dd195ed38cb62ae41efd6b42ad6c31

      SHA512

      6de1bfb2347bd571a1deda69e849548a1ae1649cfa211c26755fce3deb9511161f037e3998b2daff590f08c21238731420d245796dcd6da3ee98eef6afa6f20d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cb1d321295e73d35bd65b84a35f5cb16

      SHA1

      d772f0134f3fe2e90667d6ea591ccc6d2a229eae

      SHA256

      70603269e0838c0171e9f36211a756c0b0cc4a04c7f1e0cc1ae2a8e4ee160cb3

      SHA512

      7b6fe6ebc56a21444421e9d330b5e22ee5534c6978bb2f0fd3aa31615447833e22f71161473e10b656f41b308588f6b730a0e71dcbc2d8506f597c557bda3d20

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      12e04ef96b0cc4749ace3c3dd136c975

      SHA1

      ba13908cb1f595256e4b8de1eee588176e4458cd

      SHA256

      d8d7f2eec8c335da59516683c77185d67587d7fdee7d595ef0b0f6625f39797e

      SHA512

      4bfcced45dfc6c9c9448309af08f54cb905d6797e872c13ad329cb92cad7c792367cc7866327b3c9c20408c2813c9f42c158b3f0df39e9c5cacbbce95aa0372c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4923b11cffb14805969a28e1f94ba40a

      SHA1

      b2d32d84b8fd7ce51bd8491a0524e040510085c0

      SHA256

      f3036487beb483c6184edab62942704ffd0681c662ed2c5cb3f9a0efb61b9020

      SHA512

      3a023310d67ffda3f1f42f1b5775843c338c592cd6846fc3ce5cd120494d6989cf6565fd5f9439152e937dc8c886d3980e71cad0b34a8bd89562d3ca15644e1f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a023d4d6ebb9784ba42d55ccf466fe29

      SHA1

      7966cb5f2ab6bed1c73c6352bde6560ba8ab0d2c

      SHA256

      f8de33deac8f8313f2fc3aa61fd37597a630c1c0f1956c563377a8cbcb5c3c40

      SHA512

      68be525b68f59cf6622e777b39dbb43812a96ecea55b4be7b01ebec8f32fc13f036bcbb24a239a0fb8d6f30d82c4e0bf633d69043c5a6a0f530025dda353dbeb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1831d4ecb38f538d93e98fe55cc5ce74

      SHA1

      1307b48a0ca351b964302f1a0f59f8b34fb32c7c

      SHA256

      4a98548b3fc94409311ddbea7fc0d5a25df4887811ae02af0e08f74c74d27857

      SHA512

      25b614b106c1c499dae04ff6ea42e526544f349f8aedc58d6b020a2d0409577abe990072ab574b2150f165788e9153cd67a515fefdc3e3e65f54bcd129d6398a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      793207e56980bf24770933f4dcecdc86

      SHA1

      64db6557631b1529f0a911ba55a4e7355da3c2c6

      SHA256

      7386d0e75abfb907d4ed6be720d902bb1cc661816f8dfbb947cf0b2b87cb054b

      SHA512

      5f11a9f6240e44a6acb5bffc9dfe6ecef9906db7708a6318eee745ee73448da7a1e06b0ed75fbaefd5e27c5112771187c0146628acbffbac08ce1b135c21cb28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      118c703a66e1770ec6f31389244d4b99

      SHA1

      fd67a48607c96022f64a7bb5c36ec5fd59301cf2

      SHA256

      8ea2286f98c3d5d16fedc00742d5631a81b1f93250841d73c8f7d39d07b98575

      SHA512

      a9a8a75282974da656aa76d49b0a653dc2cdc08a1163c368a73d382b4a4043f4de8ddce557a8461f4eeae7f2f980a81edc2f6df1dbb38fd11ecf4c3114c188a7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d9349db0624cb03b7c4ebb85392655f6

      SHA1

      9700b3f3558e7d6bea6a0e7bd94affe3ed79855e

      SHA256

      c8e6b5e0e85e83a9da7d4a4ea01063e262bb781179c2aad9fd4e5fde8ed2b83a

      SHA512

      f5788d4d2d9e419907337f8bb31f126e9d6a3f7fb6b4b63f0d92438cf3daafb0dc568af212867f93e956fc13c3c86f73b308a00b0037a59f79d384782df081a1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ed4069e4469a1787ee3563b30f68c83c

      SHA1

      115b5a017a2f289e618b9d10494e9f7995a9ad2b

      SHA256

      84e5e27963c839bf8770a3713a4ea06f54af4783c024c52f20572ad6e5d5468e

      SHA512

      09ae90a4ab87c00f1bf8f209d04c8c8b3fe8f539be632374257a98245b7b6e830ddaf68faa3c159372bcb29fd05f667da7088144865891e8363872c519fe5cbb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d71c6e6d281f0bf894f85d594414117e

      SHA1

      fd088d89e992478589813f3bbff337017d6ecb8b

      SHA256

      e955acb2b0827096781dca69478dc3a3018441157d6bc33cef1c8e0b46770abd

      SHA512

      0076e2f437c26273dd378a663d408b71e0608cbd5d266fec306ddb1742f24b8ebc19e7ce5349a03e1da46c26b01864cd069c5b3d85aa05fcd2a5bb659e71e41e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d7080ade32e0e8ad09a9cbf2fb2ae928

      SHA1

      44113b08c9aceeacfd24ca0cc61513bf309c4f08

      SHA256

      cee54d98d67002beae74ddfb925ef7b98ca0f6552b2ea1009c36cef24c796d0f

      SHA512

      c15697c25624f64d34fc3f750576035cae2746791d16f7f66a187c1ecc69bcbc54230217093721ccaf0298465eed3eed41cc3a9b561a7165794e6b2e6290cc94

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1caf40cef4771bda0a659e46934392c9

      SHA1

      63f22639a7024a856fbc2ad4b30881541ba161e9

      SHA256

      908df888f1372475b179baac6cdd8f7ce63b4351a305757832c34941a1852f82

      SHA512

      e6b34060cee1cc5e8423c48a19ee4f615662dd06a82d4db2b19d2c784315ad8d6bf0199d460fc9c24d6c872d1165ad0e253994756afebf43ebd7a2f2c7d0e049

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a8aa029eca084e2aab0a8d9729ed7fa1

      SHA1

      02f8c12e64fac371714c2c0b1deae35bf2f07c57

      SHA256

      750ae7a511c163d08cc93f392db5437c5cff44e3c5f08c16740a80cfe44bd628

      SHA512

      62b716dfa5e36be40a367cc58fcb031a567d6c1c6985e559bacf39854655f9abbdfeb3f12f53bf3844ca4aae096e1a413a08054233fbb856ff000ca641f21ece

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6b542e9526b329431f0c97620e956921

      SHA1

      cf92a928b76cf326ab8af0b5409c2d59b1da7893

      SHA256

      61e9a916be7dcd3fc96b999a95d3d0b0242f675d57f8754c1f68ec92c16a1b62

      SHA512

      43e13b8aaae8ce15eabfa700b08cc3a895822f76f92f81381fcdc95400e16381583b4778d48c2cac9722a7b9ac4b3bf4ad8ca71c37e9dd2e19d7e0b5e1bb540a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      2de397791dc561777d707309585092fd

      SHA1

      d47cff2070bb826505342e3692dd9ceced364cf6

      SHA256

      3a5d5923fbc809ff425a78f049370005b7525098aa49e67f79b7d0ebdef421c6

      SHA512

      2988a56821aab5935949ba78a6035de2fa9ad90f260e67494ed0af30521eb5cb76b3180b1ef2879d56000566c96c5376f0541561a9f812ea360e59f8820cbdbc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\06LI96JQ\favicon[1].ico

      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\Tar811.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/768-586-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/768-584-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/796-575-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/796-576-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB