Analysis

  • max time kernel
    119s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 02:03

General

  • Target

    722e6bdcec821c1e35c5b5b40459bce4_JaffaCakes118.exe

  • Size

    221KB

  • MD5

    722e6bdcec821c1e35c5b5b40459bce4

  • SHA1

    813dc045b3a61099374eaceec9d74730de84b534

  • SHA256

    24281d37d6b9f1f628fd490e6ba50223164ea5605005eba3cc439a18bfd8d2cd

  • SHA512

    6530ab2faf87ba69ccea58548c12986deba3782c69e1ca8c4931d2188605ede8e59d10c529530face8165e2ca0f12623c1638cd8cb518f0a87eb21544136318e

  • SSDEEP

    1536:7OC0FvV4OguHxjhpA4Bm7uW0vSUsghQevBFkutIbgTuFqKRr0aF5frleGhd9TfBi:7wV4OgSzBmh04eZFkz3Rr0gwGj9Tf8

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\722e6bdcec821c1e35c5b5b40459bce4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\722e6bdcec821c1e35c5b5b40459bce4_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2808
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:340993 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f558276dfc2788d75510db080deb646

    SHA1

    2bff94754ea28226baf083817dfe81a5d11dc56a

    SHA256

    0f3d0a6ee5ccb4682335a0166b1883946b6f0be45932d13da4ea272573021bca

    SHA512

    43bc2fe23f4a6243973f55746be8e6bc0f1ed3c66b0e9590b8f44db87e9006342a33c73605537de3510e1e77fdd2244bb7ef142a761fcc4d9379ce6936237bff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3cbeb3d0e9f4531dd5d5d3835bdf574

    SHA1

    e2e92895c36224f2bc1dcf3735ee33eae6bce97a

    SHA256

    536aad14996a6ac310a0990fde7ee6cb473cf28fd063bfd0c6ac65d2a5419585

    SHA512

    af2c0ecc90fe2cdfd6ad39e531309364d02faca53f9b057e1f37f5efaa6387153e82ea488133006d8e79d28c899c55752b3217d2f0b68e25db5b237b099f18d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79a497b31f6ed7d8e02e6fbf6369c7ac

    SHA1

    30ebb7b4fd219786daa9a6a0222e788ef7c169c2

    SHA256

    030be7b82cf8a257ee4b62b5f4b6a04b2b8b594c2aba83236dd7b1f4fbc20a17

    SHA512

    15dea7c84bf8d6160b693ee0f5f1881d775a3d6d3bd0b0da3044ca47efbf02f27c5c86cdd98cf16edacdf0fa55cd28b47573dd8bd837939b7047d92e3d0bbdce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f081835d19e40d66c37c6c5f181403ae

    SHA1

    f6ccfdb3d5cb58eec47d03fd15d0da5705564fcd

    SHA256

    e3949b62a7c7ab00cc755589ba17f26fb80c11a2429dc8645a42f682cf190df9

    SHA512

    0b3c84d683ff997fdd32dd609d88563d76bbefdb686b14528a57421c8ab3bd367ef542588a9827643ac5f21fe335afa958ddb90fab9f94f0e4dec028937cee76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68fac4fa082fcc7d840495864d1b80bd

    SHA1

    397b59a870454c2e6e5ff37036657ef68e6be285

    SHA256

    470a315671ef160fc745bb2fae5e11e0afb45780865ec60c1ba5a16ec322ddc1

    SHA512

    a37047443c803a34a172220afbd886056814727800d1352eff3cf6e5ca9eb991ba0afae88cb3c305191388f7bc6aead517d375886063e3b98c60541f6008eb9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bcac5098f4d4b0df1cdc0cdda1e2804

    SHA1

    5e8d6cabe8aa7b74292070ec712e6bb47d67cd5f

    SHA256

    a090019a7e7db73aa572f01eacf5c70d0bcb5c8a5c765af39250c67430ae2de8

    SHA512

    4adb20883110f611b6b99c33d89ef81d2386e30059478436cf47229fd4b385605f9ee5e71e4ec75193dee4676baca47ef4a50d19a58c871d226e635109c53e8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8dc1eff8fc6bc9ebb32659d6acff496

    SHA1

    159e90ade02ac0190ff7f305119ed695f4ad944a

    SHA256

    363fba2c83a96e16558a4a8a9eeeb9df3a6207c28cbe5785f4c2f416cc01813d

    SHA512

    273f9f08dd880b0cc5373867447a274a96e0f95340b2a7ea568684069fdd16f6ce66199316714cf869a9a6f433398877b0b938b1dd59af1f6c0584373d655703

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bcbec2319f74a9af0999d8a22dad288

    SHA1

    1ccc99c13fab2151707d94d58758e544ad919913

    SHA256

    e6aa1c2c93feb2ea9c3093f8f9cc27ed15630dccdecda8e3cccfbd4074c58010

    SHA512

    79361a9a597d0bbd124e16f45521bb153143b7d3cafd833593f0d82575de45423b8b932ab67276c9692dedbf60541d0eed1c01756a33cb7a92470baee694b842

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b797c8319db9a1e31f3e8c8b5ebce912

    SHA1

    acd805830c093f77a88364218e3b1f2c68165041

    SHA256

    a3b6bcec9e777b6d5726d5edb7ad4c39e42fdc3a58922bd46056c3ea7501f560

    SHA512

    a3de94c588a4edcc65c279223580dba31157048d0cd79c17c2a743486cb09e719694a62f75879de3564b86423c7f519be9a213de054fa7700d88cde7ce4157c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecebb8a09ab941a2c4b99695bea05316

    SHA1

    1138f85f570813f530985002282ec0e499e6d9a2

    SHA256

    920ad2be781885c4926aa1d709fe7b81ba439f660f5f7a9b4fd35b73cfb5e157

    SHA512

    6f548fdd0dd365c1ae837128cbccff394818f8effb7f84bd8d73baf665dcc93c9b1ac46c17d81e62a326bbf6b870918ed82305c17c19c4e6bc52dd7c86cb5722

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c96b22cbc7e07787761af2733c732f1

    SHA1

    522bacfb88ef6b034c9d4ff5466a6a6d90e331b4

    SHA256

    791542072863a0a1429319f3d33d468d97acdde0a9f7737dae10f2a559875b5e

    SHA512

    fbce190e0f8f0a416677463dfb3ae3910d5335ab6e952a03ed21a724ce975c79268db6e9eca883587e833e2c2bfeb61267856ca2fc7e4614454aa26eeb4bb1c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3142d262ee5e64aa2e17df2ff7538ad

    SHA1

    6d8df60219560843f022d4b25c461ac2e28f2663

    SHA256

    d55b7b9c5c0d0cf123d7376d736528d15cf32681dc9f0759888e518b03582b24

    SHA512

    01661d7ebc61db9f0535a6f319d022c453bbb872ba35cb1b68578b9f956157673d58d02bc594226db4dc0bd6ee202ad3dd78daeef3f37abaafa325cd44569f28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fdeb3fbcfb53fb55611ed468165461c

    SHA1

    cb2e16b83502ce9f4a1b608ec27bb47c872c4fa8

    SHA256

    36cbdc06e40ce29cbacc61e51170983c12a3c08fe70dcdd73fb91e946aaa4dec

    SHA512

    5324267e0fab205a4b2da70c84a892986e8090738a858b4918daaf378e588569dea257ecf946a8c07dcf51a36283e283a57c6a19b2b74b87389b01a86789a202

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9bbeda0a813f53e1ee92049e12f1237

    SHA1

    813a25d77f7b4910455ee1b25cb913270f1cf02e

    SHA256

    d45703b3e1940b75ad038ff450f309454d7e16cc9cb1d0eb1023307e7af6c745

    SHA512

    3db828e241c6b4b62a37fe5196ff5a22321f615a14576225e6fb13da08d613760e2f18ee1b5360a5126d9ddcfbe007e2617f97a8d2bfedfc7f37ea99c0960df2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cd554bec9abf8da4a064ac33976e570

    SHA1

    63c897df8a4e06055254e09316b9b8df973b4b21

    SHA256

    7c2ff4256f554ecb767ed66d5f1d2c977670473441016ab5a1799a295a51a37f

    SHA512

    515bc382fffedf4acf14b00900b117387c04aec86734a5eb8937e34bb538b9ce82ca75fa2892db335965bf541aec1914bff883566be9c1bbc35d245dba5b6ac0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b758108a5e29fc919e4257e50e3e420

    SHA1

    0fdcad12e07413e3af1533a36018db7cc117163a

    SHA256

    6e9f0bcb63ceb6372b3bffdc5a83a38708c0bba9be1614f22d36d10a108d5095

    SHA512

    16deca4c3ba687beb38f4378ceda71a5ce436572e8adb51cfd62cb662e5d8e8f7b7492e1bc7d5b7c89dfe85a06c87c2211de98aafe2166945fed80cbd2656c8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a721b58c2fa1a62ae0fc4a13b4ff0d65

    SHA1

    3ec2cd2fec27cb6bfd9200d6dce3d4678b30b44d

    SHA256

    82551623be317e8e65ad664a860d073b744d8372a8088e74d21c3423829b6b8b

    SHA512

    1805c43c22f9c83a5e11751369fe3265e99cda15ef203979972bb75df4927b6a9f963ec9d6f3353a45179210559c23896e8c614d781bc23ed55da7912f95a190

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9FC3F2E1-4AF6-11EF-90B1-C20DC8CB8E9E}.dat

    Filesize

    5KB

    MD5

    205dfeb008477faab6d2729c055e24a4

    SHA1

    bd8454ed1387b6e32a04c6e2cd01a8e99cf866de

    SHA256

    1fa15a35c52a3c21ccd9e7eb17d33b12fc5dfd462f1a5a273fb6e1884369273f

    SHA512

    885b70348894737d59d191c43162a1b54b33ac7a243c78784e112f97b0404d39e2067a16952474186b1a99723a350870e90f653db9a29cd1d995c7e95a23dc5e

  • C:\Users\Admin\AppData\Local\Temp\Cab31D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar390.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2628-6-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2628-0-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2628-4-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2628-1-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2628-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2628-2-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB