Analysis

  • max time kernel
    139s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 16:24

General

  • Target

    dac00ec589e1e3ccd4fd1789be3020b3_JaffaCakes118.html

  • Size

    696KB

  • MD5

    dac00ec589e1e3ccd4fd1789be3020b3

  • SHA1

    5a01d06c39411a458707950296f62b5a1efd358f

  • SHA256

    6175d06a1ad5256b580dc6970f03200bd7073306b05ed146d0918f4d776cbc87

  • SHA512

    be767ca5322d2c81468bbf8a77035c8d026f2bd46170fe2d5468a05cf0cdf8814b378a3593eea792d9017c6d540f0132eeac5bddee308efe5c781772f98d585f

  • SSDEEP

    1536:SNW1lZXIRUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SUlJyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dac00ec589e1e3ccd4fd1789be3020b3_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:348
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2344
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275469 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9c8fb99b6369aa53f1298584092b8351

      SHA1

      8c9606dba3575fa6717c7af7c6c610992799462f

      SHA256

      cd8c8bd8149dfdce6596eee2a2a4340aa9a5f9fcc76aefe0e48630109dbec553

      SHA512

      a23e48c9a8b2086b8b3616a5cf95b7c66a3cbd59f3ac9220ccc9e77b099d0a0a881e8cc75b0c6f4ef19c5bf3e7112375d798abb2617b33963d6ad411f19a38e2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4f1858c301fb3cecec97502619c681d8

      SHA1

      21a7665048ac93a09fbddc46a42dd22e1affa019

      SHA256

      da73d9408b4a64b5b541360314caca1ddb4fec23095a5d73e204168dd62c1010

      SHA512

      03260b82b657de5d8aa551ab34b76851ed8afa94a610687879d7e70ceb470eddf13aacdb695934db44402a9e66e6328a8ed270465711ce9b5ef3b71b26999517

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4d183bdb1506c7676ebc3f090b150bec

      SHA1

      a3b717618eafcc423f325bec4d0a3aeb159029b9

      SHA256

      1c5c51d34a846b334ced255b0a50fe776c5c958d755879e4d7521c3d40dbe569

      SHA512

      6c7fdba9c0fae53b81834b083f4a5a5a940636b3f85e2e3284c3a8dd47f2ab32a5ad8db31b3dc000b584e25cdeaaff0742c00841f5f1443de6e23adbb7e82525

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5b69b07963476d2b41a1697b323d5010

      SHA1

      9513fc43c10fcac4b121115ed59f1a8d9d25e2af

      SHA256

      c755a102223dc40d7fcc5df905542806098a12ab117c6c546d63fef469a72cee

      SHA512

      af399c04ea23ae5e6614881ffc0159e1cf1caa4dd7c01507038a641276db8c0ee49b3babc3bde30f8548bcb7e6be7b22b00ddb2ee033e11cde8fc0ed5ccd3453

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      51cbcdd9dc8a71d65a887827be97f513

      SHA1

      20ff9998561f41239bfae9b05b4c284475429869

      SHA256

      9b40c9df388b12bc4c02e1392836e12259a44ef35217f5b436051b4f13a43c95

      SHA512

      74bfb7189d9a36dfcae4bbb0657042b72711a07ca4e516ea851de3eacfe1ffecb3091b31da941a54e44da4b142afb7e87e07037fac72993a07431685b3bbd0a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      43ec25434459058e040fb0a2903b0a0a

      SHA1

      9805609167c397330e872388b052308e480dc856

      SHA256

      984a292bdc76c0b9f76afb269e40848ede852a9646957188903efc932101fc52

      SHA512

      136d6837e351e994d2aad69375b0f45290e8e2e89f8642c168f0377dd85a1ebe6b0d27123a5f13b276934f58c919b34d37fbc0d7d12369f4b0230c89cc9b2724

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8f7c185c556fc1cd6ffe00ba9d8f38fe

      SHA1

      24fc200051ea49a523e420535f15cba60dcfadf2

      SHA256

      c5af7c2f025aaf53805b11dd07e7be57664f0af3c6536bf744c95b33785c074f

      SHA512

      201e1bc4f54874de3a86d607116f1442e4d347e5d6b7219c76ad5df2352545adc3cf0aced6e30c58c97caca0c60788b15ce781e8490990a68b02fd1d3f587ae3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      af305f7b33dbb82a60d174398dde4e1f

      SHA1

      7a316b0ccafe81e939df9511ac1cd25b5bf23ef7

      SHA256

      13e160c22ab4e76d0edaa911aab148312a8921d1f892c8257b8dac81d2395f65

      SHA512

      1ff4148c2d1c3108bfb38b42af9d8e21d7f3736eab1365fd65fb402f5745961333e8cfd55936be13fd314647524c6dcc05cde6836876c248feff2720c8d94d5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      12daa688c125ace0dae15d9eb73b2335

      SHA1

      92fe8ff4a0e4c209df1dd8d6921bf208479efa30

      SHA256

      1be651ac561c1a24aadd5391dba3aa7824bac35134ce6b8e95e933dd4662bc44

      SHA512

      8752a8a7798c6915ed1d7fd15963e3ecbfaf77a4cca264132fd389ff1342eba1645d798f810221bc9cdb74863dfa09e92d697d96be354017833682d8ca69f17b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e1abcfb6f8d711f51c75bff482d54b6d

      SHA1

      7f6d7502444fb9a7d158e507c39b9d93160ce516

      SHA256

      66e863ae01d09cacb2355c8d76dd57b8b8a98a8f91708f016e13c4b9597ffca2

      SHA512

      e1cd2fb8928e3fda65579d35882d915dfe1046d07e504d5ce666fec5c1e766733e0a3710206655335213e282d8456af095195acc5dd11e369ceda6ae4388a960

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      94db8d60a6249be916223931bc9eabec

      SHA1

      aeefb095a21eb6975cb1ceb1198d1544f03489ec

      SHA256

      f557b5631c6422efd439a743c84d379b2ec9671eacba912266ff6d8fe6dad43d

      SHA512

      3a56dd507919efd1b5779fe724d79a053610e32f7a585e240b101250afd67aa0e5fbeb2cb48f795231826aaade1405ee3f0fdab1887e50aa0b155e697a1608dd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      852a0832d09a924ffb3e87997f59770a

      SHA1

      e053342f4d619076ea2e852b917a095fa98195d1

      SHA256

      2a35a46309a1d4573e34497c40d20cf4b397d0256ee22499fc05ac5e1c0320bd

      SHA512

      1323d49f61ed982545f3d9057fd11597cc0ebc2a8e0b2ad5aa4a742a5a607457caf96964ad706b66186913f5a30901f8a65aefdfaefd2ccc7a48b6cec23eaf82

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      650c1fd3bfeb5014462cc244558c43ca

      SHA1

      7e995cc0947cfa035a33c13f6a9259a6aeb4d5fd

      SHA256

      acd0278b019d55137a770c34895f42bd1913c8a8d28868e00ddc1c6f78fcd756

      SHA512

      296152f9def7c591f6c8ac4d57d23cc6512c1aaaabe96d95334efb5bb873057b110c520d81129141566fed85e3750631c3630f096cb03cdeb9c92c564c04e085

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      480a1a403d17de99e6677056ef0b4716

      SHA1

      53ad29024a5380a118e01f63efcc7b4ea4811373

      SHA256

      9a3ac9461c729003a8a4e61774bbf13ba5ccce40a78aacdde476cdeb4201a645

      SHA512

      7b502bc0c6145c392729cc8c1d14114a407dee7e53ff986b41223a0244a9815ff6ec8111c79d6452bf97644f336723f26d170412c5963caccb3900a648d356a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8ff0bf6879a1e4f70d4f6ab6daf93d89

      SHA1

      a81c672abda29a64d44a96c236d777368527f0d6

      SHA256

      68e0d14d2b73e0c1fc76ca34f798645301e443d4e56c816f3d5a4fdb47314438

      SHA512

      08dd4d9da9172f4040dae9373c6cd1e854b56282d961df9b581d94a926ed4b75ba7c3480a669c6a790c0ebdc636b22d162ed4eaba304535c2a93092744e93c33

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7aa27fea0ac9b958eba5fd625897702d

      SHA1

      2536630b6019346bf5bcd8d0db27db3e2356fb19

      SHA256

      7c4a09880cfc497a6dbbaa4d1375c9729021a25a36abe3e69669e514872be5ee

      SHA512

      ecbd3afaa460f743b94b448ad692734be21caf22767a5142326117f890e993038458e94b85739f783e3953e0801006070e9e56598079eefe99ca2e48ef1d3246

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b52b5baad5c2e927dddfc401578f8649

      SHA1

      a122d68fb980167eeca0568a2a963013f06b91a8

      SHA256

      08539267311583f6dc89648174277932cc22e6bfcea5b0708280abe0fec60d3f

      SHA512

      9c790db13b6bafc346997cbc4548380c6ce77d9af074ee9a0a3bf48aa078f84ec89bc60951a3cebdb43b3b9a1a61c15e6ab1cba5c041c86210dcff237719111f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c0f97bc90a68e0c89b7da09211aed379

      SHA1

      1cfc07121415b7e0ecdf848ff936d2f5771400c4

      SHA256

      c083c6ba55e52bfad1c954e751db7c0fe425705f72668c1cd406108db32cd076

      SHA512

      b24aa1a0d4c43116105e7c9e9930d90e40fd40dad899dda6f7f0ed8bf8036092be9279eb91edff1716813c2b3997e86ac6193c744c4c693864cdb804a4626e73

    • C:\Users\Admin\AppData\Local\Temp\CabBA7B.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarBAEB.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/348-437-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/348-438-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/348-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1724-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1724-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1724-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1724-447-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB