Analysis

  • max time kernel
    139s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 04:46

General

  • Target

    d9a300dab4b7fc8e36ccd5f792efd866_JaffaCakes118.html

  • Size

    140KB

  • MD5

    d9a300dab4b7fc8e36ccd5f792efd866

  • SHA1

    d2eac6b46ed2637c035b90db5fa1d7b368f15f9d

  • SHA256

    6feece133baecbb4922a2de3061233505dda3b567c9dd29dfdbcd3849b60807a

  • SHA512

    931761e8b1b1608b447e4d1484c99a0e798d2c0d96e8011900b6141c1505bc1e633ba5bd7b9190e570a777a6ad10e6237d2464d637e8cb561a7bbaaba2fa4e32

  • SSDEEP

    3072:Sw+zvfJh0yfkMY+BES09JXAnyrZalI+YQ:Sw+z3Jh5sMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9a300dab4b7fc8e36ccd5f792efd866_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:892
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:376
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275477 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d77ee4cdbecc147731541d99d7bef91f

      SHA1

      db71eac1607453401894cbcd5b7e073952e5c416

      SHA256

      1ee09d4e87b9460a472ff788198c24675f59c081277d44268d3984c5f3ebdcf4

      SHA512

      5466ac3202f12ef69ce1f220ed68249da3cac60724b8ae90e33bd5edb66e331ba69483518953ca0154950f416de05b5a4650a7ca131bbdda7b5bffc1d49e222b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      923632347cfcfccf9c98fd8f78f8513f

      SHA1

      1335024a90d082d58f6e77382ed34b335acb70c1

      SHA256

      543725f0085cc104cd6f6aaf3641f02ce905331c7d20bf42762c9fd73e578cee

      SHA512

      0a29971fa49cfbac6824b2f5f95ea37e7dc083694343837106f15c3ea91a6593fd6cb90d65f5c890dd2d3a82ad3fa7ab662cea3fb11e596399cdc098459ad3c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      41eeffaf85b2fc6a2d527c2d3775d45f

      SHA1

      cf9d914b1d1385a7745bf95be38255c014a98bc0

      SHA256

      3f8e706a4e314641ee912dc205cf21e5bfce4c8d8faad00315c0bcadecd65356

      SHA512

      d9d224e70b34aa90a96014d18e6f1f4588fc74a30246cb3ff90b9e6d635b7a0afe2544c353bc98c5a700033ce11f99df536e2829ff94143c4b0ad1a016857116

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d34bf609ff1bfa5ea602b915f72e661e

      SHA1

      00a2d159e1762f6b678858991b87b4ca7342c44f

      SHA256

      ca767ad80a574885182a617db899877073d872f5a0886a2b608f97de879604cd

      SHA512

      c9f361974449598db0fa8f788eaaa0e94e7ee74a89fff6caa7d96259ae02d8cd13deb4d54a2195f2c83b25300e9e70bfbdd20b4a6ea0fcf3d7881ea5e46f358c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      562e752cd07b751a18338a829c77ac44

      SHA1

      49f8aa60dbca7693b36fabf1321caad1f2264ac9

      SHA256

      9c49c494d1305e411ef78ea53ce739340a58c7cd8124f0a1303b641f0785d453

      SHA512

      db5856247de648948584a47526dac35d6fa9ecaca99486bf7f664c192174bb51c8d0a4286d56be28f3a5e40883815cca183cd3741513cd182fd33cd711956ff7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6281e4dd26c1ce20cc7c3b6f5d4b5b9b

      SHA1

      1a950a4605c169ad9a4735ef02aa35727b3a59f6

      SHA256

      43510b02b8a005941827e5de63c26acd409330b888cc03950948bf3d6ccfcc3f

      SHA512

      c985b4ce40544a0b1f232cce1122e85c006407f175c519ab45e2831c9c88425e0162b9ed17ea82c7acdad44cd4681ee15381ee58ff13cf756dd5e90218c8feb1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      de7e7af4f3bc9d42c4dab437e5027069

      SHA1

      8e361f85ea329cfdc85601f531faa2cbefcddc8f

      SHA256

      6858011d76d52a8babc1ed50075a2b37d8b74c32d73c53d140c43620acf9affd

      SHA512

      57fd22b58211a61d52c375388b447228eb7e9874da19a80e5119eacad0cd62bd9fada2b01825029c11bcecdbc643cdde61bc26a6f0ef7f0274bd9c4195cbf36a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ffb3c383bf5e449e9722e6ce987d81fd

      SHA1

      89c2173d63245f04983ed3a7187b9d14ce38a66c

      SHA256

      8bbf2179be82a8358c8fe7989a46ab64ae46f37ecdc2fa43f6f6b9929b17daa2

      SHA512

      902361c482b476b117935de43170d9df209f45dc791f570b33bd9268c765f54a02d1bef04743b6c31c0dd7c6b3232124a2e1fca61b68f8a866d4a665dd937c5f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b50f5687f00b95c2576b06f9fba1668e

      SHA1

      47ef3edebc31b5c81581fe2065374c7d010ccd40

      SHA256

      f2d1283327226475c10d5f17f64282967cdcd1f616d62a91e3fab3c050233fc2

      SHA512

      f15a2a1b78a026b6128b00ed7d6b2d1f5e71f471e428b8b65643602fb44e8f8d78cfbd0edf2b733000f7042d53183a44e9fe8407faa6dd072fc1852607266798

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      06619be8243a64a4742f5931d6870092

      SHA1

      fed015fed122037a102a30e3d6cfe60a86e20d16

      SHA256

      60b99519f785ba9be30d24d708c496c68c97718bbdba272ec2f9bcfe210f09f1

      SHA512

      7624f3a7add11528606a596181d0c6f3f5a88f601ecffd38b970fa8a87a46fd75345f4a0426a0f1d3ace872bff891c5426ca6a4abe46f27bb23612c9b5453ad5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6750879b999266f3eb08ec47982ace2c

      SHA1

      a32bf84693db87ebcfd337325e940ba395a5923e

      SHA256

      5180681c1bde40d326f654c2dc3c48b13bcaaf09c7cb360687f2bd3aec93df6c

      SHA512

      04df248ec745fc28f44c21918a306588dc63c78a5a092d85f514d6e2446b62be7289fe5aa4bef36c6c4adc43ed5b08dc24ac9338c0a8136eaaa395da9db5e9da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ea5f545b57e9619afbbc32019a3b918e

      SHA1

      fb360fefd36733338a8d2789ec5d868be9be73f7

      SHA256

      d5f3724098151dc44c74e8ecc47472b1067d5fc8eb5a0dd6f7d7d3cb0cf4a128

      SHA512

      e36ffe56d85cb36069386236fb431fb2eee1ee78c2d1285b09c2637b426b4fc916f70ca8de6da1058300449d298cfed53874d681c648fb1dbf5b9d65d8b8e8c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c0bfe9cc10d67c961e6fa95d293b5c37

      SHA1

      c744a7ccabed0415b3452f96a1afeb98c00fcd9d

      SHA256

      47a06574874ea9e0b2565142748e470c861cc072d584b6a5082d1a2cf10d121d

      SHA512

      482184b0979654100c0ebd2412844d1a21793855d8e3bcb0ff0aed28f4caa617cf83b48a6e7bbf38d459baa03768074eae1a9c8cbc5e5b20f767094388b3e8b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      300668057be4428a73d4291c5444d8a0

      SHA1

      f563691d567dccfa4d1d3d5e25f9d07d37bd419f

      SHA256

      830284dd4dfe180a257a70dceac28bebcffc727d683ef4a59fd8274e9a737de9

      SHA512

      928e01a8b4e661a60e4b1321f5e08915dedd5ef533557be702c2b7d4fbbea6877e27499ad2c4a3afe7570a1abf9c919f9df8721667aff34fa46052eed85e805f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      526a8698b7df4843de7fef1924cfa433

      SHA1

      455c318df3c20a5532ef96dd12610d7d8560459a

      SHA256

      89584f7a4564bc544c20b3f3b836ac0b43ef6d929303855cbe7e39961b59d6e1

      SHA512

      8f2186234c6c6ac0d0f31674b6bfb80623568e5c8ddfa4946a4416ffb2baeafdc0f990f3926f6872e6a938b25111032afd1f7178db532a6df3a1414aa4269583

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      96b2a89c26624dcae32632fd8bfde37a

      SHA1

      efc32d0bf460ba51a7fefa91a3d172394e8b2b89

      SHA256

      643a1f1f650450aeec1715dccc59ca4b1123104f4f464335632d4d250afc3da7

      SHA512

      f53520a4840dba81067d96581853b57b8b8ed8113f2e64b03ebdf24fac7180150c95a251ec6a2ddf3879463f8465ae987fc6a04d2d2bf33872ed2eaff9daa79d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cc309c512c7d88610db07d671810ffd0

      SHA1

      1e7da29f1caf351f8a4ea5f8e556f7a2d736a4ad

      SHA256

      78a9dbdaf01158e786e8939ad3daa57021bef027d1a2a42846561e21da600da9

      SHA512

      8291b383bc00df6bd44f1d7553604e8d5716f9db73508e187848e729c91f7bd44d245c1da5636d0f0e5f95c729729b5972ba0a53b4ae4685e6c560a983077234

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      be8b34bf9cfa42b8fac2fe062eacff2a

      SHA1

      e5ef9c7ae2abd5851d61dd4d2495a3c09045ca04

      SHA256

      b9df9ca7f1559f5833b8158f076d49723b753080b6b0db083ba35f3e778320e4

      SHA512

      1a125e03261981524d6eb614da63e8ec6ad000adfb44225ba276da00eb27bb707037f19671e16eb51cdadff86aa743e83431300424faa65e59520cf2000b0088

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d44b801c68dc22e87889850873489b74

      SHA1

      759fdf1825c57a114d1f967ca29c6f4d795e7911

      SHA256

      821837e4e683af519eeb732c4151116b7e4a88441993e54230eb7cbc2a9baed3

      SHA512

      62f0ac02cb83c9abafe5437d505e0ab10fe3f2dcab82f77e28b17f1792cf517b4b4a203418fdc5d4d227ff4c11743a21cadc571e9ee99ab46ee280360867c3f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      94be1569a8a7a22afbfc71f8e7af9847

      SHA1

      05c328b3f73b4bebc40fc6814ecf23a19281e539

      SHA256

      fe148e393129ff57fe8d4b1b01e9ec66ceed423326bccfee6009959acb0e73b9

      SHA512

      ab51f4793a68f239ef9a6ee6998ddf705eadcfc29e03f18b09008666312e2c61bae8f225f449f67727d099636bd491493f7460f6b79777334580ecfa1bf841e0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      50879826ec7fdd8e1d9181ee5cd6705a

      SHA1

      3da7666ba49c46e44f009098434865faec042a3d

      SHA256

      64100b7deb18deb9bdaa3956a13d7db45cc8774951d5628fcda64be9ec3857b5

      SHA512

      538d28af67fbfc0452544892fc11d8d7fba0cc2c7157db3a8020243701b7e31ff1a12f78914752dc93250581cb4b9c19e8c89773378a545fc002750893d83477

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\article_article[1].htm

      Filesize

      4KB

      MD5

      e05ed9e70be1cbb92f0800dd9c284feb

      SHA1

      0c7c6d072a6df53efb57df243ff613742fc765e2

      SHA256

      760bb7504ec5820b99d34f57ebe21737cb6c3f3c52f58d5d52a34657487512e6

      SHA512

      899ab16ca7093567f2ee1cb32258ee87be810fe1f383e36cbf76a35cdb2064f1d549c7527a8b739d24b8eb7cbed94f6f1ce662653b8d44c6252bb20a25cc6323

    • C:\Users\Admin\AppData\Local\Temp\CabBFE5.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC096.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/892-456-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/892-454-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/892-451-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/892-453-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/892-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2432-440-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2432-442-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2432-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB