Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 04:22

General

  • Target

    d110eb73b88c55f085abcf06d4504d32_JaffaCakes118.html

  • Size

    161KB

  • MD5

    d110eb73b88c55f085abcf06d4504d32

  • SHA1

    3603c2004069b3da345365c332f22263255eac59

  • SHA256

    9c4d1b32733169fa06d4a8571498e06804b7b68e1a26b2e8872b362260416bb3

  • SHA512

    c02394fae232ebb27d14e2b6153d24876b1fe642b35eed9733cb88fae03d13485c5a89948e39a098e7454804b49bc1887122e79108f8cf02a8de8124f5e6af49

  • SSDEEP

    1536:ifRTjivhlYy1WaTWtTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:ixshQaMTyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d110eb73b88c55f085abcf06d4504d32_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:604
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2060
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:472080 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3ffc0a865490769d2064e8d3e15ae3a2

      SHA1

      250a44f86578588a343d08518c91202ac7f3b9cc

      SHA256

      65279c6e853444ec1095e3067bf9665dcd4905a4e8f17b96391cbc22d4071828

      SHA512

      557e1200fd8069de770e48d6446a13e80a72646d9ad392def739385567602fc05d1d832c27ba102a1bd22fb4a5429bd1eae223b2c2ca3e5a12f4dd1980c995f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      61d10374f502722652b1937550a745c4

      SHA1

      50b7e40e2518f69afcfa5b352b5e6e2a9e51370b

      SHA256

      d1c430db1be8672d0fc102f8e8c9d5cd736a6a3bf5cf69f2245aacc5afe13a02

      SHA512

      5f5ffde068459ef74bb6877c619dac00fca82cccfb3f31c8d91b56e9661ae6c069e1580d92941e1abf4fc1b7818eb0cb18e70fd59dc30827b6167751e18c7eb1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c4e9233c24214a820177b4c7495ecfb7

      SHA1

      b15fab15edefbd4ba3698aa8e26136cacaa6556f

      SHA256

      12cbce977180f98ce0b2f74da7f015cb6eab6ce53f5551ec4d920965fd45dd4c

      SHA512

      4b141819438e3955429c5b1b2e15cc8610de4475412ae1e9b3fad1a08c1fe331233a8e37a5eb5f6623376c6f1ce32dc695a15f0b0c80ee5a29d314e0d517d732

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e77ae3723224ea560420ea70dce48249

      SHA1

      074c1cd38d8f01bc180a5105f6e44a45ebaf1c3e

      SHA256

      dff6d918d8af3c359f2d84a4bbf8bd10579804f7ffbb312763b01053cc648d55

      SHA512

      98c0ce6015f229eaeed1eeac3d237e415086e97d6b53c92e1153b25faab086f6640f91d2aee7e0f4a1527f3418e7a31139b4d6d3ae6a69b141b2f99061cc1203

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0f6dda0b4370ba116c74bd79789eabc6

      SHA1

      4a37733c50499988b81cd80b6e36815a250af72d

      SHA256

      3661d9597652ac9ce7d5c94a97b22d4c6ba2f467cca9406add948cb92602016c

      SHA512

      6704a98125952329ac5f144b9592e2f91ca929c0b7fc2c03c7bfcc5381983efa0585c4bc81e5db6c25c54f31fe741e2f47494a7171bf90e22d7dacc521f5c651

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e657daea395138c1473cc25a0777a7d2

      SHA1

      b4a215d8262bb589f29fd506aeec6ebc310e9863

      SHA256

      53361ffbc7ed14da6856f17ffe230ca0fd252aac8df343fef0e00f24a3d3d3a0

      SHA512

      6beee8a440f17d7c61020c229a7302c407404bd36f99f9ec33887a9354bd1227468686f543d9248db06eacdbc95b5a9caa886e07e72c260fc6295d04ed3774c3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      572bfe3e902a96d1c56829c1532b8279

      SHA1

      cedc26b78c054b7de71c0975ecd16ebd152fbeca

      SHA256

      5268a21229757b054461cce5b93299f3ab82da189aa2053e8b99202ed802dc18

      SHA512

      d1fd8d2b6ca8681dd2bacbf718eb7540518925b21db50655feb4447dfefb5c11c0204791a78d626ea62a0881d48d9bbcd432dbcf78f6591ef74b73e0a7561fff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fc34d3e7d2fb23785c464b65ff4ed218

      SHA1

      e2148e0b32d967310b0919e804cb0361aa228d96

      SHA256

      d12d2742c12be000db428a2abee683ab0bf89e4c0500518f96bb0fd20f8132d7

      SHA512

      57a9464a975a689a78a3f65da8cbf8dd872ffec7ce00995543a6b4ffc6c7af558829cdfea4f819eb3edebf0413149484c2c4b8f0ea275a2f46a2697e658732d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6273917601e87fb65405c677a6b29ee5

      SHA1

      7cec90ed514118d556c7a69e42d75964c4fe4636

      SHA256

      f1a54ca01ecc11b63d29f93c481f2fcd4051434466fd245673b679a7042bbf05

      SHA512

      a6e139a10fa1f8527d1144e891fee5951d4cfe266b7d099f88a4831b6951f518f1a3a3b664987a65fd54dec09ef7911998af231bc53e4c015c6a9687af210602

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      42266a86db6a0f422a19661825ab49b0

      SHA1

      4c308c4f1ea2234e994d40eb2faeb96a506c2910

      SHA256

      7ae64c0003ce658f7da0072ce96be972cf58e3da5a7dbbd6c99c711f8b0960ae

      SHA512

      3feb26838cc10c64a41ff1cb3429f2018a3f8e84e364d97c3c63b35d0a3a4501de7be67a78e707412423ddf4cffe5c2c41f855566841b0744e35e836cdca7350

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a2c467415dbe933f86f31a70966bf496

      SHA1

      cf392e5078cf3b225f336f6256f3bb23f0285de6

      SHA256

      0e3b649793a3287c3e34b25347d3e722389f18e1bd26b948c264e0fa14d32626

      SHA512

      383fde224aab76072e43678224f97da425ad5a6b0c61f779f16df8fba4615a2b38f993641fce8c0ceac4f6e6aabb440ad0aaa0b16fb1318bda3f68dc9eb6623b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      00d4aab4a17d7d9548ce844cae6940c3

      SHA1

      c482fb255ec724837f95bd3cb660dc8427517490

      SHA256

      b6bd412ff1074e5dd1133888067e62d70eaca3b458c5b2bb29ce6f889ffb8a5a

      SHA512

      9e69f8a4a707b37cd4a71255301bd521566cb37ab933cd8580414d150140db3c9fd510f988117152b936499173a7cb56198196e5cd7973f7fb2ba2005a154bf5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d4b60aa29ea7ed2a3ce6ebcac8348e22

      SHA1

      79eabf2805ab583d09810e7d30fceeb2a8d56a02

      SHA256

      8527ed71cac7d4a00be60c86320d9bb2e06f23b1e9f1ca412988ca657c00693c

      SHA512

      62f48a13773886731b8408d6d557b7711051634873541a7a708c4ab1e3813f70d6f8a531665bb9a5fc0d565bc3584be66a6b2ca83a560e608a2e57939f7ac057

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eeae4ff406d098cbc7ce314e5999b994

      SHA1

      72e7e65ea955507c87cc3b139c31ab047afca649

      SHA256

      c382b52c01d9fb523c642829166bafe9a4243535cf7bf7179a2ff42f16b4f488

      SHA512

      1e570789db709e2a34001d7169c11984b5438d1b3f1e56d88d174728ed834fd1be616373bc4100c3514e13fa90c1e0ba8008d2f55ebba8187cdd39838744bdc6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      13231adc635a942453a3c1307ad4813a

      SHA1

      7c2449f86461d64b4ddd13bb7beb0aed10a4517f

      SHA256

      1b50566e7c75feba28ed6dfc35d4657b8917593998bc19f2f3e268521299525c

      SHA512

      c3e3509a33e3ded56fc6546faa02688fb8b41aabaa74bbc8d169e198f19266e60a0355fb5c0e5de535cb0082afb4a6f657f91736d353e74e3ea852ecd865d819

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      827c482bd199e7121f6f2ff059788214

      SHA1

      61fa325600a8fd8485b645f75b7d17ecbb75b3d7

      SHA256

      2c3f3bd78658ac61a2ef66ab22a8c0eb86e6350019181b88932140b41aff0977

      SHA512

      84810da559e2d05c1028951a224a62c45e897a22cfff8f4a2d40f841fb3f3a49432f1ee6fbb88e37d5fad277dc38bc929e01fc5fe651fe2b054b2aa8c5b3da8a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9bcd69c7549cf24bf483b314b0c9488e

      SHA1

      5fcf1382a8cad42c0a997d2f13b0fd1aa623c2b8

      SHA256

      f9407d7c72b347efc28ccd9f04ea0a39fcbec0149834167f330dc937669fc15e

      SHA512

      1a05d20e9af26c3bbfecc20f751b2e79ef2d9716413c626190cc8ba76da86db631ccb2ff9b37b06605f80941b25016e533df359c0d08d32d1e0142fefc9fd0f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d623d7c77133edf7640aeddc070da152

      SHA1

      7921b675ae13af85ed2ba5e248f3e2f6c4724458

      SHA256

      8e3591a4e682f9cbe92f3c86fa723978d154d60dd2aa2881a759b1e4300fcd9b

      SHA512

      45ecb930874cadf574a6875550d6edb7959c5d0f9e57a1c69813796f633e1f8065256b9de5a0b784a2654161c238b1ca6154101905f0af532b35dc02c28c6594

    • C:\Users\Admin\AppData\Local\Temp\CabF0C7.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarF416.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/604-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/604-445-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2460-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2460-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2460-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB