Analysis

  • max time kernel
    69s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 00:21

General

  • Target

    2a51f24dfb392c231ac10e81841cd88e_JaffaCakes118.dll

  • Size

    260KB

  • MD5

    2a51f24dfb392c231ac10e81841cd88e

  • SHA1

    4651ee8e43f80b92b38eb2535ae54be0458334f0

  • SHA256

    de00b3740ab3d3820225c01b410ef52607ae81c19b4ab9dfb8408b6823ce1f80

  • SHA512

    08158754cfe2d257808f40b6c4a42c4df24eb3f4453d5bc5b860012bc8cbc67817c9580322bc981720e8edc550502293e003e49fb66ea911c387f41e628cffd0

  • SSDEEP

    3072:HibTTp78CcCBPAG4vQFsqI07yMpo/GnYCrJ1kNfC/eb0oqG:oT14KPYvVMpAsWfC2b0oqG

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2a51f24dfb392c231ac10e81841cd88e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2a51f24dfb392c231ac10e81841cd88e_JaffaCakes118.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1640
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2804
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 228
        3⤵
        • Program crash
        PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62b526cb329af2294fe58715ac27102a

    SHA1

    5a595937a5a4e2655b4109e18892d4b327ca8f8f

    SHA256

    f3c72b4249900ab003ced19c80ac49176e505b34d9e3ee29f558e4b2caf8ba1b

    SHA512

    f28722599cdeec69b48dbae97362685884bb6feecb844c143ab1f7cf780e0d28ed6385923a6414616654e1554ddc0aa5d57d0a6e60ff83517a83bcfa9bf9994a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8dd54d61df661b8e97003758370acd7b

    SHA1

    3a98b80f74074ce80a8e55e65472aa8721c40961

    SHA256

    31607f4b72bc790253df27af3bc67782086f689ee014f1ca6faea1dac02a90fe

    SHA512

    1595cbc020b938082831d4fa957e3ecd7ca5d5b0481b1b9ac400c21f30234e8fe95649607be95e4b034f54575e40f61a30b9f3a4c41eb305779e62e6af4a00de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39ee5faf110806d128c1b731580f0267

    SHA1

    7f8b5f61e759c2f9179f86b82419840844302381

    SHA256

    35f9654b82b9879c16dd56acb07f5671731cae11da2be1f81a20fd8a3234ebf0

    SHA512

    b0206a1326e1740b666c6eab91c2ac41fade101e5e8cbd3545cf9d50148597868b79bd715a48d08974f84c45c1df0876de0ac645a3c54655f4f012063e4ada9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b9d319bfe88689b55409aa481e0863f

    SHA1

    6988b2d677f753e26ef75ee81a6dd2f5ac9a48e0

    SHA256

    93474bc06ddb26f7827b55114a736820fa6a89eaacff24d0156d18803ee13e3d

    SHA512

    5f7da8544cfc924c78ac2e48baa6a52e404d3a0237bde30d0f0cc3acfb205d5a2741b8e907750ef79a3f12ad60d1512522f81d871b19405bb155646d2c764402

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b55bd5595021b7f966f323feb7f3b78b

    SHA1

    46972913797cccc37d8f015d595691d32cf99acd

    SHA256

    6f1e11275f957ad0e8d6c96f69001f06227f0b9be14828393703b31e2f4647b9

    SHA512

    794dbddb138a549b317fb4438f812f725e72f24a73cbb27edfd5dbf2a55ea90e208c2ffdc950e2e3c88eb0e304e2fbeac271f1efbeabecaa4c354bb164c2f540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baa9cb7d75182d9c6f70a74926d58060

    SHA1

    bb9c9d1ff44be8b40a849927f7a3e69a52b8a3bd

    SHA256

    8f3738f3bcccac3d17ac67068076db7ccb0964a51d9969c06b50b14c76804451

    SHA512

    ebc417312ab0f082384d056802a768a836e493c1b8eee1a23666714bbb61c31e30938c5c07536d62cdabc3a213bd85c0a48080d17e7a9f2bd9475afa1927d3ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b83505174f469381fac7ef5348b65fa1

    SHA1

    a5448bc838ac3890e43d63f0ed48bb23136556b8

    SHA256

    804b93e63b91aab720d6467dd89c01e38b7b47b1825ff822e61f806758e738bd

    SHA512

    1bd0959ea520bd7eb327fd3158c0de1878bc89097bced55f71243dd2d89bf8eda37f96077c564413ea888ecf6ae8a43543f75a1f783f8a97d36b3f0302c5ad38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67d8304d7cada174bf6f452d32e795f6

    SHA1

    229b941d1ec59e5b2853d6c797a476f262656da2

    SHA256

    26de059701077b6cbad4118ec93d12a4a3bd95312a806fceb8a7f3d44f07cb86

    SHA512

    85276e04c79a4d34aa4407fca141b1219149f249b49dc6d904b177245a8602012ef5deb53fca726466eb7a5da876b4e5f428b0212165072e03f112df5919f082

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b3a43c62f7d6942d9d8ad5a522a4e2a

    SHA1

    2a325d97a1bd7fe9d012b7d875e7b7631a3fbeb7

    SHA256

    cb2c0f6c97d8af96f03dbf32ebd8da3b042e2eab2e314fde38c462c0d00f4a43

    SHA512

    9956bad346d7f0d527c8f6274a13bf4ec60aa7759dbb73d05c5599ddca8a3e526c8c5df190ec331ea0164dcdddf393500e98aee47f1ff48b198f88c6a04678f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd7456ae6e0f2b5bc05480ce3c32fcea

    SHA1

    3ccc02cbb6c66ce8065ace7c5793663207e061a0

    SHA256

    4ff89a001f61755edd338ae307c9068650c64cddc14f8f0b88370db16cf60814

    SHA512

    1797f47ad1b4f6b2f859b9c25460a4ca5401d3d8089223694d436aab44416b9fe5eef34d11e92325a429d99ee2b49d7357ed6435ec1e354fedee95d42c2f46a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bafc369e7b6f11234aa11e7c7a8c902

    SHA1

    439bc934d0d87b40bb57936c17793e32034da3ee

    SHA256

    0ca18db08a5f22348d2494da521fac20e011265f622b980544ca271f3a44c0cf

    SHA512

    d095071fcdf890355a4e458b549dc552a807865ee2e7b5e5fb9c1128ccb076a8945f9c0d1190eb6450ae03717ae1a230baab1af9e2dbfa95949dddd3b4883387

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edafcbe1256de98ccc96b1b7e288a40b

    SHA1

    e4718dcc95dc370e78ab467ecba0e12d739448ec

    SHA256

    cb91ea1431d59264282c14e79a19e0feaf968352e44f435c58dd4914065f32f4

    SHA512

    23183b786dca9dcc7898142cf579733f6d68cfc67df12239b60d8119aac159854d9273fd7ed14af6726f31775124fab0331a0f6585064ac9e7527133c9873c00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    183bfe921f282573a92d81894e1cff8d

    SHA1

    00a108870faadbaea468b4de44742d35a41f009e

    SHA256

    eaa67fb53836bc2c0e5bf6b78845789885cfadb8662f84e0775398d236bf3674

    SHA512

    bfec88a3341924502a8a4984c53cf2d66f90ee1757cf6162540eea480a0835f0c3df3d03f4ff2fa6f9516c2373a5a53c90965fda44fc1c8da9fad7b08417419f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce1b2e37627a6cc315e3b600cc8b6f69

    SHA1

    c742cc4e83646e1065593281f1d731e023d503c1

    SHA256

    4974aebf633dcff6902266ec3d019a8a6d13da7556d43c375b32d623f9d2e16d

    SHA512

    b8beabf9e3dabe31a911d7f0dd77bceea39f31848637c26f65a24474be2404d3bb0cea0e3f1f59959fba8c3e29664ebfd6f4016f02f215e9e159e628b5f227f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d45682fa5fa994e333605f6c81075e5

    SHA1

    fb7ad6e767dab9aa20b83cae8c24cb806e15226f

    SHA256

    f570c71943a284b74466e1636459f5a0f8d545ffcbe398ba3e51e9478b357df4

    SHA512

    ae9238ff9aabb19f4c11129a1b26a5544707b6f60c4127939d0c19b32340efcbb15bf40c0631636678bcb2c21ffac3ee23835cc0bf429e731ad5e922560c085f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    112196f29a0488b40ec59487573b61e3

    SHA1

    014a92e712b76ad2f2fd589f5195509fffa1264b

    SHA256

    74faa29da41f90db3497e0b142410bafd36ded1ec006b6a7f412153f862ac9df

    SHA512

    0c754d661d4c595601912533ae90be88b462ffb309402a7029251ec7282d50b63db0ac9e7fe1723f6dbf48d4b5da9748741ea01ff3568851808f1590774158d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92dea8fcc7619c1895c9c9a81c205d72

    SHA1

    7272365c9178b9d7418943de777fa4006a753955

    SHA256

    5b33a37cda506458d29f551d17e503f6dab413e4d9d1c523150486b3f3c028ca

    SHA512

    48800856cd54c8f58b3a7e9c0d6afd1d11672abd8b2a7f094f8ea4f607f783bf23ff13fc114446925d8fd29f8ccfa8f4d96e94417c39b30a720d7ab72d4b1759

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a03b088e2ea57b6639fd066827675ad0

    SHA1

    8532a16fa1c462d1d4e6e7ed0e86ff01c6571036

    SHA256

    511baa857e69a1c1cf34d9e484bc0cf1c3018804731fb5e78aa916bc63e01c59

    SHA512

    0500cbd9990320b7be692735213d742145b09ba8def4370e94a921828c13c538f6a9a9c2c7b047aff9df8ff8a205cc215e3ec0b2fda0421911ea1c491fefd28b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{68931041-3CE0-11EF-880F-D61F2295B977}.dat

    Filesize

    4KB

    MD5

    12bc9f5c910ab398caf4fe06ecab41ee

    SHA1

    1bd72235ae76dc17123e05ea41f52154fd8319d8

    SHA256

    e3e4da38e3910be763b6932d1ffe8478b503d0bd2f22ccca68f6e80598b1f62c

    SHA512

    63eca811f645868047399950b058012c04b6a4d41c02fe8a9788cef38e410120dcadc81688d14ff682cef6d0399d3f6bb48b867d53606d4a0d2e6ba30f6e435e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{689A3461-3CE0-11EF-880F-D61F2295B977}.dat

    Filesize

    5KB

    MD5

    bc6d84a2b9c10db116b1f98e9bc0deac

    SHA1

    b2af636abd13839941840f980cd6ae5d7cb78871

    SHA256

    a2eedef88074a694e25c4a077b2ef6f8bbc65e5491a709ef4ef68f457d7958ee

    SHA512

    6a3a0884929ab1eab5c9a707166f368a82efa025109a03519f2ad0eb053162d382e3e1f86600eb69597955104a46875c3aa4bf6eae8f7217b856a65a4205a644

  • C:\Users\Admin\AppData\Local\Temp\CabAA46.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAAE5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    221KB

    MD5

    e70ecf2fa14973e7c61384fd7dc5c4e9

    SHA1

    b284f9366cee9e961d9ee3be9148a87a5d2ed7f1

    SHA256

    fd0f984f320a0422206c370fbc00c2e931bb9236d2ae36c4f9a968fc9241571a

    SHA512

    563f7501121a16cd24a67443a919afdf4d011e930fea2719418919b9b1b1e30620d63d83954f8427899628a7023521a69cbae20597258f7654647c987c0a9aef

  • memory/2156-8-0x0000000000250000-0x00000000002C8000-memory.dmp

    Filesize

    480KB

  • memory/2156-1-0x000000006D080000-0x000000006D0C1000-memory.dmp

    Filesize

    260KB

  • memory/2308-16-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2308-14-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2308-13-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2308-12-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2308-11-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2308-15-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2308-10-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2308-19-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB