Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    17/06/2024, 03:45

General

  • Target

    b699970cedb54a3d8b21a17ba783bda2_JaffaCakes118.html

  • Size

    157KB

  • MD5

    b699970cedb54a3d8b21a17ba783bda2

  • SHA1

    c28195fc402447f3401cd25ce6e69872e18cfb32

  • SHA256

    2344285be204c7a95ef54d725a1aa3579f4632f8942c42e0f7b9bda0bd206bb8

  • SHA512

    fb511322684a229f66cf13722a24248b437aa38628355b8babdc706be053f8b226a6e52465e131f5e6e1a52a9e4f546cde20a6aa57fd7762e797aa89ab58bb2d

  • SSDEEP

    1536:ilRT4qX3Cd//ijByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iTu/ijByfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b699970cedb54a3d8b21a17ba783bda2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:784
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:448
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:406544 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      234b9419414ec74c2fb959af3156c74b

      SHA1

      7017d6335447e490687c1a5975744c4d2944d84b

      SHA256

      0b4e5b32ec059222959d6802192b67264d49ee8674874cddc42e10d127b60480

      SHA512

      998857aa3d8a7dd91bc55ea8409f97af8cd8a1a90e2f4dd89e11bc0e497fc4661d87b65c8bc6775c2e09c395234d41f8442920015904aa94edce4642b857f98b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fba80bcf987d6b660498770d9f2277ae

      SHA1

      762a148e28188182a6869fc0659f7d4c5ee259e5

      SHA256

      d75f72489a653101ff732a8058d10a2dc98b798afaf20993f02587ce3e72b0e0

      SHA512

      adbd0e1b9a2c00c5a335aec0077be61eace8e2aba76a1f8d9d48819ef12b8a410500ccadd7314f18f9506514428ec0391d25d2dffdc291db94fa3d8476ed51d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7470b0c23fdbced445bf50f117f2c438

      SHA1

      dc41ee67d93bd22a9664582de5bce7217a5c30e1

      SHA256

      c6b45179b22cda3bb664f37127af4ec3da6c56736fddb80df98bf5ecc0844c12

      SHA512

      bcc4fdfc178da5f1ecc33fdf1b914791917cd00a08245dfb1d72a7701c906cf1482965423de5f538d6ddfdc216ba8f602803fbcdd76dbf06ce8586022f564bca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ab710ebe34c48317b3d37ba5c40b27aa

      SHA1

      53bd07d1af8f75679b0382ef0bb1049c4a9e5864

      SHA256

      31605294f7c222f6e8c5e80af6588a76aa18cd59aeb0c59fb17fe4aa11c6935a

      SHA512

      d5a084817fce967eca71451cc55feb97879de83aa084f0adab27e670e3300190f1d29755dd96afd4377dcf6e2c8f661ba93f8e71470ff6f15c96b25bc2290490

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      76ce13f3b3b47b0fff113bad418ff2bb

      SHA1

      72267d14130ef64aad47d65375545661b2b83b2a

      SHA256

      b3bd101f17bb6b41c0f077f9db57d47200d8dc59e36a5e5ab5f1ae63aab02221

      SHA512

      89f0dda2e7f3000ded4c140066d9bb72b7b84d39f239a33dd1cee9fa7f5095032280bda3a7eff93b19e9619e5a13fda6cfeff49a7345c6c09bf649f240bf1ade

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e299c1e6517fe15c604c1b1b72c2038e

      SHA1

      af0c4701733b2ae435cf9b57f0a6793a29dcb1c9

      SHA256

      799fe7912378778386fbf6aa77aed4f875c0b96dc4bca419968fc5058b36cf21

      SHA512

      549a668306ac4d371b5ceedd1a1fe6e26333a3f5ff70329411878c9614091d843a2bf263d165f6c3f554c6747f9509aee3cef2ac2e244c0a2005d7ae954c6b99

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3b8307a790b8910eb0ae0279ea08108e

      SHA1

      42348a7134c4cc184ad035e150135d855de06e43

      SHA256

      dbde4756c7e89884276f3f6581cba4363a8b7547e8cc741be76f329b12ce8f21

      SHA512

      b7125027455707cbcd2d0b5ce69d96195b474161eb49967d709dcf583fe12a1a7c2a0e03a27f5c122f94029a24d8a86e91d7006e39835940a1f1789239b308c3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      08e86b39c38da67bc41f212d949b8fd8

      SHA1

      d1f8d1e2c6f33aa620f37aafdbce282b2a5c3b11

      SHA256

      8685c17a2e41fc3285e24153a635126aa03f6ff42984a52f31a7f30a14a1102a

      SHA512

      67ba15f667c27c4f3c14c696ad76727bf968e37411125a4ca3bc3bb67a237e482ef4eb8e43a3092fdb3bdfa006350ee7edba3cba6564007769e6e8e6600d874e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      78392a2f3256d0af92d49fca790a0345

      SHA1

      98b3b57d4c0d4fcd10c5b064eba38c47ec9f2dc2

      SHA256

      cc2894da8b60c6befe8a27f5da05b20781daad24afc85042bd2873ea612b6d99

      SHA512

      d74670c54c79bc7cd2aa9a1185d87579a65032b9d00b20250fd460893a5e52cd186b2b9a5dda342ad1d07587a2e8206e95de09e207a5c003471e6e4b5daa40dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      df206de70f9832f9b6b482df4a7ecd87

      SHA1

      f3e2cbb201e7cc12052399f027562c9d8f86985a

      SHA256

      ecaa0496f8ebbf3ff8e58a02288d52d1c1a4fe4c39005bc5626668453f53552f

      SHA512

      fffc32b0e6811da3794818e75add06986fd0d7facf2d353a7bdf83892dfcf928214941243a47769055a23737f9fcc6a4dd199d137e6e6ff1c570209ef541640c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8a910b08267b473f9d51f8a102a98e30

      SHA1

      dfd90acc5a7b1053496de18189b8947607bd74f3

      SHA256

      6f8a1ad71914fc4329fba52f9e5a2be383b4637f6d9d6054dc7fff893d0795f5

      SHA512

      dd53fcb0d121b446af3e464beaaae715303752b82e9e95fe97abe604e49f3a4102adef53678b0730f9773dc5287dad3998542f65fb7e65176c4f2696cdd38067

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      189138e3ef9f7d835f95c7eaab39723d

      SHA1

      9e60e86b4d146c26d8721dd5dbf3f153e263dc9a

      SHA256

      c1b2c458c15bab8c45859da349c9116842713e31687727c8f8923f913322d2a6

      SHA512

      cf55d80a5b2d36f699dec22c9b0c24d0867b863f89a65c30ec3701b4b639685d0b1534d467a4dc81c82c563421b759c6afc1b7f77490da792814e891f9eae83b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      76ae89174de712595fbd78bfd970e02d

      SHA1

      2fa1d65585bfdec7adbf134949e3118383dae65c

      SHA256

      9ce279d5c5a707b476c46964010f5053227f7b7450c8412e2add642fd18e52eb

      SHA512

      1d2eeb87f73a5d093793b8f94471f925736b3a8188aa028e470312d4b438eb91e72a024b33025c3990e5cd687581ff4edda29f87e3b30eab17c1193d930285c3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1b945531eb9f981467f2590bf657140f

      SHA1

      5c3a395ba56281f0c4cf784ee65bc1c1fa170575

      SHA256

      19d8782900afdc6095c87cf1d273c645a2b04191d3b289b14262e235a7e4471a

      SHA512

      29a5c40aaef03253862cc0e9b30fcfe90fa0ccb50076c90ea515447da1a1af8037fd25e1889fd26afe9f770558a5ebe7633ff42f1f90a55c5cbc018bc6ee3d52

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      424d4b2f0ac016498c0567254faf822d

      SHA1

      74cb65bf61361c71e9d69b48645b0625c6eda8c8

      SHA256

      3451fc7f91fc78c578dc4f210e3d9c34fb4c7b457b32bfa5d62b3f58efadbc55

      SHA512

      a376a909133f377c742493d7221ba683a9ae95eeea4add039ca703afc5972030005a0ca151f54dec9fcff2de8a431ec7a5b811227fa5e5204e2d14159e3ce014

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      22ea306a193bcab84ecd7aedc3156d6f

      SHA1

      a7b9a732eb08bd204715e5ca151c85b7b1dd5eb0

      SHA256

      094d514dcc573715222ae8f4a8a0aaa28990198d4356fcd6d472bb5dfd9815c2

      SHA512

      f3e833ea06649497ab45cdec2b447b54cb4817df21192a48e8499044e026c2214f84fe11bc6a7fd23c4b9a8d8d3aeb9128cc096e80a0350c60c664d55be07a83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      320a63fc84a67b0bc507fa8d472d481f

      SHA1

      b078c2d1b285da0efa7c9b9d7acd3b46f58aef42

      SHA256

      38e454c0a74a65c3982f0ab1736a3e69b91932de72b5ee2922d9b23ff57f2ff0

      SHA512

      fbada206debea3d1124af1860580442431435a49acc9113f378115043f23ed39d18036d2028c2d373478db07579c4c86ea35cd428c8e98c0def6f9f3d807bf4b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cbc8b9b1c48ce6ebe7fbb48991ba948b

      SHA1

      d4c06cf6e6d71d72fbed2ec3994fe56a9c17f8ed

      SHA256

      b4d8653086ff52a42b4073d7bdc4bac833f1983fb9a6347a87390392bbb1fafe

      SHA512

      826671dbdd4f48759120843e202ecdfeb00d39fc51a6466c5a99e9c2df99ecd9a10e79cdb01776a946ddc76e399d25aa2e2bf2599fb4ae7a0a9bf38e3cc699fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c75cf27a5c0ff94486325196f04daa1

      SHA1

      088f46e993cf33b87b096c83e8e99fd24872e67a

      SHA256

      635c05b1da375ce742dbc2c6066e2a0e2548e41aae386457d56779373c39ec98

      SHA512

      d12e2d09bc9122a6182ed3f4c722285d449a1a8ec07fb3848db177d9c123689f57fef496d858f651961cb575344f3350c064d8902a20bd09ad9af140b0bd9b9d

    • C:\Users\Admin\AppData\Local\Temp\CabD59.tmp

      Filesize

      67KB

      MD5

      2d3dcf90f6c99f47e7593ea250c9e749

      SHA1

      51be82be4a272669983313565b4940d4b1385237

      SHA256

      8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

      SHA512

      9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

    • C:\Users\Admin\AppData\Local\Temp\TarDFE.tmp

      Filesize

      160KB

      MD5

      7186ad693b8ad9444401bd9bcd2217c2

      SHA1

      5c28ca10a650f6026b0df4737078fa4197f3bac1

      SHA256

      9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

      SHA512

      135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/784-388-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/784-387-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1928-397-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/1928-399-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1928-395-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB