Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 05:12

General

  • Target

    f994ac4a64d27f90e51ab11ada35df60_JaffaCakes118.dll

  • Size

    276KB

  • MD5

    f994ac4a64d27f90e51ab11ada35df60

  • SHA1

    68148aa1bd2a7a07808c9f2eea069a4a988c725f

  • SHA256

    3978ec2c91b2bf70471612e2ae1b31b677e66c349aa43453b087578681536bbc

  • SHA512

    95457625295caf889cff17dba1539d027eeaccffaec59eaa15c2d3f1b286e12ef317749189ab1127286bbd82310173e305ad4d2994b70149bf8ed99596c98573

  • SSDEEP

    6144:nSfwJACHgGJT1wySZdMwgkFHQF9oJqblxATGyupqSUK:mAomwyuQbl2T5SUK

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f994ac4a64d27f90e51ab11ada35df60_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f994ac4a64d27f90e51ab11ada35df60_JaffaCakes118.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2536
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:209940 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1272
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275476 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1192
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:668683 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2284
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
            PID:1780
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:1796
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2400

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          0f129b36aee8ed9438f5afd536781370

          SHA1

          1c7d9c657ec2ec0505b554c38201394dcd5524ae

          SHA256

          da6aad1602517c7b0c699fc5c4dc78fe646919661c6ea88707086f96414e532b

          SHA512

          608370167cbc079f81b5b8ea8fd53fde922193eef096596ca9a7b22960a423e78389c16a5388493b9dbf9e370cc9f81173e6e0594bbff9aaa0df6f757af1c6fa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          740cd80cf73975998ebf63c0ca49e87d

          SHA1

          634bfd48c44ca47b15bf768804bfc4432f874936

          SHA256

          af2f3cb24e2865cadf7739f4a4a94bb80ded8cad7ccdc0fda4abf918dfad8a00

          SHA512

          a825b87fe794faf917c9153d9c215deb79356f6e4ae104207755c119fa03e70246a75baca9e00ec27f0daba28bc50345d03e937ad5192eadbe2f2e2bcb3136b8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          c641fa2d6e92689ce302f30ad66f004c

          SHA1

          2b7df35e0cd9be6213be4025c4c2bb6b63428c82

          SHA256

          575c1fb7cd5b59494dd4efb5e685da6e3c99696850351c41e0b48a4497a41e81

          SHA512

          2dabc317c6df7ec911aa7838faf2a6238a57658b74fc037fe38548cfdc5365a1d2c9261faf26f5ad89f3348f5371452350528efaeb4399d0d9935bc6c31cad0f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          18cf70118be1e62a675de7e0b6455df1

          SHA1

          257e08f615a180cb1badd35f36770450b09285ac

          SHA256

          340d5385781407cfdbae1e6d7fd89c9339a195b060fb165c61c72cf5870167b7

          SHA512

          5c088f3722ddcef30f6f80f1f62817455c5c1e207a080bf45f04275313f0ef4e3a8a47c11d2fabf2ac56dfa942eadb3b12e6b15859c1ce94c00b825bed88ee00

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          8bbcd0bd27c6daf019e61c411c050c49

          SHA1

          1d514be1ecd6e5e8ad13a29d2a633eb76db6e4c4

          SHA256

          1bab7869554d7bbc818129354ab96bd36992c0194fb093f8e08bd2d359d1cc62

          SHA512

          8fffb92d756acd3879bb969e048f2ecec37309a025963bd7c85deb04a4e428ee0871bf8fb3c1be5bfd89718a50bbb0d66ee63a4c6e9bca09a72faaddd599d9b9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          19d7d58baf31ad237e58279a2f5bc30a

          SHA1

          9a86f52031dadd84e97521a5b445a0615a7050e1

          SHA256

          4b3467c1491e0ed170c291df44bec926170e7ff2991737b406838fbf615da8be

          SHA512

          760bdb86f60da0a718d91280825210f2482950957ae233794318ce68e5ec875a91432abdc2b48408ca6e1866a0ba9db454c16dfa81b2a7f357424dfbc1b5c840

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          a957beb76c47bf21a47b682955a34962

          SHA1

          c33aff4987a799c6a581414b929f9046f69c5b41

          SHA256

          7351ccee9151b989e478978e3e03ea10f3ae11e992d90b3c4498118fc899ee20

          SHA512

          205394e9b997be937fd3adb4ca3539c7dfd541d26e44b2ed8240427bd0fa2f91ae75909a64b20149d5d665fa9e4f5515be50e0c868c477b75cff90b41e622ec6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          5df6d65194086949bb5e6b09b93f99a3

          SHA1

          6213340130c601af504699d3a30ec2aed28f29c2

          SHA256

          4a0ccb117f83c02985a001e5ba04d0ab1429dcb172076e39024aaee20ba1bdd1

          SHA512

          6fae8d00fc0f0e416750973a5e3522b7290fac3c12265f1f441b40e7c98beff00d682ff17765352059a2d3a5f77abb99069e20e4361ada3ab22a92fdb2fb6ed0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          d512de328ea5fc3ce718b6ff782bf2d8

          SHA1

          60610d7fd64fc6b644d90752a2eca6cb0d6d0918

          SHA256

          717d3afba8fdda2b5a138ce1721a1762b5943e4e33182aed6cd596b61996cf44

          SHA512

          12ab4d95c2185fdced63f59f2f282850626b830b23c82b67481a9eb5a3f81578a7479d247107e31911b96eee75967e2a1cd58880b24e5a3a1372cc5a67026a39

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          d5cf9f6c00699058d1dc3c26cca2941d

          SHA1

          3b82c2ef5f7170183359c1f3ee85b139c6eb645b

          SHA256

          389b59886de15d80757fed8c9db013a2195896deaff5072bed1712e0ef7c2924

          SHA512

          c436f101eaffa72bae8cb2b2d5bf9b4d7bd8e1084ab39f7f8fb3d779bee14ae860ef2f695da6a6cea26481aaea8680ddf1986f0a31a0e94cf380bfc3a7902436

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          5ea7432b38ca5e5845a17580fc89e83e

          SHA1

          e2a9b374367c7895f453db78c0d8d3c4212de3ba

          SHA256

          646499e0147217283de90b932c0da689633550a25018afa8f1b5ff111a59f33a

          SHA512

          8763521fe881ee0832b3f10747c3063ced40ea7f46ac576e0c4fc6eaf6a208ca644f8af78df53ea883f036724b1db07a61887a395944da9f2acce69c42ae0b3a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          fc93e8fc74205f81ea33067f4cca759a

          SHA1

          0e6202d4e7340c7f40e34c2d094febeecc571e86

          SHA256

          e378ed90eef2a85552fa73d822296222ddc9fb348ed2b3815cde17fecfdda415

          SHA512

          49e6850d59f87ff08ce55c396ba64468ebdaa22808ce1783c38b06a64fc4f6e975b01daf55cbac2a26bdce9b280ce4d9418c6c2abbd0807df279de8eeaedd123

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          f454626216868e0df2efe7496c491c46

          SHA1

          58f5e557c0a58cb7b0815901ba2f65f72c500967

          SHA256

          27c1e5378deb463bfd0d09c8c46e5f7c20b952690f4533376aaaa1383c7265a9

          SHA512

          2fa571959c0a5c1969d1812591e641da3770fc6902edca2d5a6b5722a712b7ea1fbd05d04a2a6045d83f1b8337a47e328dc0b218969c36dce934435e04e92b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          2a8681630d78b2e4bc41d939f2d12624

          SHA1

          0e73528c16187534b041e6f424bb5804c8e67d71

          SHA256

          fdcc2aa04c16fddeb8df867dc4d269e1a0e43bac4661c2b579974c3258071b52

          SHA512

          ab178587949b1daca6173e657707d420af0e1edbc363bf07232f73c16fd285bd3b0054703a5e796803e2dde35db4e90e53add2dc4be06a372d9933675f8bc687

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          46d114cbf9292c1e5770b36a6ce98867

          SHA1

          9dde3468aa71efa074acb18bc8b93306c9b7702b

          SHA256

          b65c4719e77c29a9b107c4539ca8994e2fe8933585fe92ee32cb8905e95ecc24

          SHA512

          6e92601e1795f7515746fcac60b21758a34f4bdc0932edb33a066445645c68b5a13c4ff55df0e1589e5a03a80b5ed5587e27aa02a1905be3cb04e9cbd6abf454

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          73d8f3d7c1ea6d8d64e2fe0d88f1a22c

          SHA1

          514ad14bc349e7d6a6d1eb2eb290d65e8d227455

          SHA256

          dcc7a558e65ffb359dafad8fb856f54b50d2703dcd05db465fd3aa10d88b966f

          SHA512

          3c82d3e89dd577ecb7c6e70ed75d24d5b76e8b2095d31e4483099f66a390a38a58c0b9bf3b2e1e71270d09748d9f609e2166c05fb4fc69e8d4c2b1befb69dd81

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          5d912f7c94f04526cce083e44ca30a85

          SHA1

          3d11254e6d49bc80fa997dc65dc1e0423730bf7c

          SHA256

          7ef8aa859de748e5565d241366a9d5ef6baaa74b1dad6b88790881eee931aa64

          SHA512

          8b4322d2bf057680451caf63995a9d8dfe647cf5108cea5d3bfb7e7e05a603697fc14c73fc52421d2ee18c70acd430976008e40afec7e53bba57e96c3340ce85

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          641a7c7618c2ab649a3b1ae0276b6ee6

          SHA1

          de57b87bed159cb0a328b56408e5563beec21d9c

          SHA256

          906edf195ef822be8a885ec178f736982fe29a4d108f3f09fe2a185710d48a00

          SHA512

          27d3ad40a817dd3dc7a31038d565ed2b103ce989bfdbf702cbbee1b763bec396109d5578dec8dcd494c94b1629c0e4faeda349db1d496ee65119638194202c52

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          63fca3451fe4a40b9d6f10af53f6fe67

          SHA1

          cb4fbc9581d04f81ef7b85e6030bba9f1704ab01

          SHA256

          16229ab40aec9a33928c5768115623797022bdb189a1debff0b66da614e57777

          SHA512

          a480053d0538ed4a74f783be7cc24b26fd4678e818d6cc4e83eac34228a16dfd85ec78cef6ce11f64951a43ff32f66157525b57a64b44017c8de561d85853858

        • C:\Users\Admin\AppData\Local\Temp\Cab956F.tmp
          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab963E.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar9660.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • \Windows\SysWOW64\rundll32mgr.exe
          Filesize

          204KB

          MD5

          053349d7ad422a413294766d79fc0b14

          SHA1

          b3bd239f6d8de5d82945d4063161b06ff932ac67

          SHA256

          2aae02cbc873fd41602e7f69427602d3c7062ad62bf0cdb64df3502cc372905c

          SHA512

          3f6ae5958dff78194f1a730db94603bd0d88aa9a33c8ffb62dbe3a1b583b86b638bc017b9cb2a2f368815e00750e12d80be287ac77f4a15afbb7603fee1c154e

        • memory/2116-16-0x0000000077B8F000-0x0000000077B90000-memory.dmp
          Filesize

          4KB

        • memory/2116-493-0x0000000077B8F000-0x0000000077B90000-memory.dmp
          Filesize

          4KB

        • memory/2116-371-0x0000000000400000-0x0000000000489000-memory.dmp
          Filesize

          548KB

        • memory/2116-12-0x0000000000400000-0x0000000000489000-memory.dmp
          Filesize

          548KB

        • memory/2116-13-0x00000000001B0000-0x00000000001B3000-memory.dmp
          Filesize

          12KB

        • memory/2116-15-0x0000000000400000-0x0000000000489000-memory.dmp
          Filesize

          548KB

        • memory/2116-14-0x00000000002B0000-0x00000000002B1000-memory.dmp
          Filesize

          4KB

        • memory/2116-986-0x0000000000400000-0x0000000000489000-memory.dmp
          Filesize

          548KB

        • memory/2116-987-0x0000000000400000-0x0000000000489000-memory.dmp
          Filesize

          548KB

        • memory/2760-4-0x0000000000720000-0x00000000007A9000-memory.dmp
          Filesize

          548KB

        • memory/2760-2-0x0000000010000000-0x0000000010046000-memory.dmp
          Filesize

          280KB

        • memory/2760-0-0x0000000010000000-0x0000000010046000-memory.dmp
          Filesize

          280KB

        • memory/2760-11-0x0000000000720000-0x00000000007A9000-memory.dmp
          Filesize

          548KB