Analysis

  • max time kernel
    135s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 19:06

General

  • Target

    f07592b9bd8012bb22a4976058274e5f_JaffaCakes118.html

  • Size

    122KB

  • MD5

    f07592b9bd8012bb22a4976058274e5f

  • SHA1

    b22d7db47e98e795886092f664996e824f7779e0

  • SHA256

    10625d3e05006db9e262d0bfa6af5855937b9daf89f1931924bca5a6fb02c747

  • SHA512

    83ff3359e514f38076d5ddce9fc90b35328eb7839f6599c72a6c264ed9a70b81ec0a761e39fdddbedb8a9497a7ca98ca9e9338f26d4ad5149286a9f795d1af43

  • SSDEEP

    1536:SWyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQ+:SWyfkMY+BES09JXAnyrZalI+YE

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f07592b9bd8012bb22a4976058274e5f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2752
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:406537 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      491e4c4301e49aec9c8f233a4a3b7f74

      SHA1

      53ee9e28acd2a2172397828a3c6361f8e85881ba

      SHA256

      5b36bf6d38c5d1ae58661e28ea4a732b953cf81f09ea5f715717622bdf22789c

      SHA512

      86cb00b9cc65c0e2271aacbb021e9e75a5e3d6b81ff2853eadf47c8e573be6fdf0fa41cee01c5bf35191ea52d6e80f8f93508c7214b4c3d81a6cb43ea4e0e51c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0f15fe6311b38f69904089dd086aa8fc

      SHA1

      bfeb3a6f9196ed1d4c45b8c7c10e3daaf1cb0c21

      SHA256

      a520d4bc027e5e91e09e923da5acb655d8c328c6523a1a7c948bcd7c270617ab

      SHA512

      e28cb1c2a341fd04f7439ef5d4b7cd3dd12fa387b407fa71324192f03929f98be3e709816a38902346bece54961f059c38cec046c0656a69b231da6180dc6a7b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a81620b02285fa831ddcca212be564bb

      SHA1

      553156f0f8af8f911ed3850b8bb3b5f0cfa3806b

      SHA256

      d878c2ca0764933e0f812c346503bff9a805e0e4b2f418d7a962b0ebef6d9fff

      SHA512

      14bd7a1a1a6e2edf08a08c9a97a80502338717e36b086bad0ebe60c10d60a703035f955fdd3a65ae6d1d256e18d6f2cfcf6ca6f9edbf65296ddcf63c3ca86c0e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0dec1bd8641850b08b7dc0fc649cbd4e

      SHA1

      0325678070419b6433331c9f4ebe1b9aaaa78b57

      SHA256

      4492a518a5ddad33a4f1d68c6876937ffd169382437c1455217e507f27ba4a15

      SHA512

      d04364e23542c1f78985315d54a210c53c5e1840a0a4696a24bfcdead68d60664a3e9031a43e059c35cf2e2f36e2387cf459a4cd847537ce47cedecdd1e530cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9bcf950a16b916603589c52bbfd29140

      SHA1

      911d1ca259ed9e7d5167c9a223d46e3d0bccd91b

      SHA256

      72a381feb8714bc5c9d46509967fe88ab5d6c5067fbcf9857c0becfeefbe055c

      SHA512

      dd381495edac2deefe28c900af04be975a85dbea3cfee3ecb67fee9624b05d50635a95064bdfa193e91b1b06d847a339337302226595fbdb5b0ccfb2270d677f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dc2911928e59ff83a0fd0f100f00f88f

      SHA1

      e645500fa1a18b7f722fd8bdca6aa05892fd1612

      SHA256

      758ea0c7182ee41d65ae29f14a40d03ba2b658b8b7cfb4c56ba14d86f9720607

      SHA512

      1bc58ada8d0561328450cdc86f86f631c1146fc3f618eb56f9156502eaf27e1a15976ff52b61aa79d9559e54575e8ebb5d694a4d1afa43db59f92f79c18eaaa3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      58c06b09d4f38a7a171ec38c585001b5

      SHA1

      1f9c29259b7c879063a6b3cb35159602d8273111

      SHA256

      d680c3732b68ece5e895efd87a20c5235899ef6a4352a68602f7369dc72b5a80

      SHA512

      dd0b57aa455f975274ec42468560b33b284c9b4102d23b3ecf162262e51a30f30eaba0dc6d648607a25ab1765a58253be32c0edb10ed3d95f4b93356cab17e46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2df34abb287fd3b2de295a810cf48bba

      SHA1

      017199079e7486adf845610b18f667141e2f93e1

      SHA256

      d8cc94aee76b6f63c8431707380a6ec5145db1612559eecbf1a8894d4be25fef

      SHA512

      61d88dd44df891df6c48db969867aa22c29a8dd75ad3ef5ab733965ceb96df6b885903b3fd0b685ae8df93e1763bffbe731e06a623a4d006dc77b330d51f1124

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8a6ce7b0dc5fe21e6e429c0cc47a868f

      SHA1

      86120c4dd2fac901ce850e8f8be8cfb1913079fa

      SHA256

      fb565863539396c5e6fde9894527639480e7315e8338fb0728da1ec93013d0bc

      SHA512

      c0cdc317fc56a99378fafaf53fd0cf09b9e7e815f5bc54484c28cb6438434bb32fa73c2778124f352e7ea834209500d0c414d97445f315bb3215f530fa49cd02

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4042ae038fb0fef36d591693b9ce7c12

      SHA1

      5b4ca42d51a751728f2c52616960337813f2b533

      SHA256

      dffc7d0e9a0815b1b3947dda4bc906d15533991cd076a3abb42bc6a13aa21d48

      SHA512

      05d5dc9ee5c924f30678c9da2f1def13d8c56858a350320c0ba7150ff03f2816220d5613ea8ac41228eee2f74e30f3b09b5ec43e764309cb5a1f3d911c1deb73

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0aef56e604f5cea9f5f52db1e52946a8

      SHA1

      be9e9e22a4360ddc564cfc2286425707c08bab8b

      SHA256

      1c87512295822836295a04da5139aef1c0e306e3cab4fa0e7220f3ee55ab760d

      SHA512

      ad5f3e0b365e644c24c62ce85677078120030526faff477abaff5543f10b729ecd1f761681db8db52ebe5f347847ad7cbe8a69ce49c2d6c87d75c196d5270030

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      15319e4db8e922fb2bf4b4676950e4c4

      SHA1

      a3af9923b3629723ba5c3f1ecf472670f0327e6f

      SHA256

      df931052162d92cb722b424d5c7ad44766fb32eaa16606bbf0304d7e288c7ed0

      SHA512

      1fc83d5f5467b8d68f86f309d3f62d18e8ad94da22fc05016bb85786c8ccc7c4bd3881f4741684c74df4a6ed55cc6b6c59d2f7f9e573ce21d9b2ed9dfc02d42a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c11ab45a079e1054e37f0d93d12a74f8

      SHA1

      0aa2ee124c4234b31261a73ddebbced2723ba82e

      SHA256

      86ef1619867c41d8bf6ca7ce7533dba8821d85706ba2d41c537223c5994cfa62

      SHA512

      59726f5e2c532b650d2841411160cbfd83d8d0964ba082f8a0640646fa86e33d6e37beda53c92d515ce01dbd5b60ba6071be3a8aed30ba5aa0d9ef98fe548bae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      896a8018a75392119b46f6f6849daa88

      SHA1

      76201b7f8da988aac2eafe6d5e7ee82160d2fcea

      SHA256

      15ec0cc316585c9b5b73ab71e46e0dae16818d95fca9394b05675495c08a3343

      SHA512

      aa9ba63a97026acc869d7751aac034cfef7cf89e0b70b769fc28c6d3dd19c3be33f6e109d215b3d166191692b8b0bd58b3953b0650be6729ada41e4604b61a1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5f12607f72c2ca7d4f79b22fea1480b7

      SHA1

      863c811b3f3c886822f7faa89468ac80b6ff8689

      SHA256

      642e2e1a3a43fb4580ba6bcc01212301745078e0d9f2d5a467a6b4c45573119d

      SHA512

      f2df1fbf9d7927f17569162e3244e58e83e7f9cb5f6529184fca7be836f9180758c55bb0713967c91776ddea080927ed1c0585e1fc0686dc4a074a34f3886a2d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9fb12e60967ee07c016102734375991e

      SHA1

      3377656681f59eee83e5d1809b9b94f7b96bcc77

      SHA256

      8bb8dc6922c03c3ae4debc4324d3768894536d46a28bb675dfaabd80cd33a3c7

      SHA512

      561575925a9181f9a3f6aa51367112ff875cea8f84ad1a98c7dc4857ba7b9927369ce59f9d042b98041e1ff6efd543cbae04290c79452fc116e667320ebbc6e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9ebf4aa18f7726638044e0e535e707f0

      SHA1

      94404316d4e3f0773b7a071e6c779742a619bb0e

      SHA256

      0e33c30dd361c7c1cad2d653caf8a0a6e9f47aa8ac6051659798396311df8689

      SHA512

      998bd05b0fda71874d97d8f8afdcaaacc7590c52899f6037eacc7a4caa9b65b1ffb1608c6f28df7df66767631e6e29cc64ea1188b6cc3a2b2a5dc9c7962fb87f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a6e3c4a0ee680f220ca498c160dcb283

      SHA1

      ec5b2c5b8c6fd887790df026473ee487bbd609ca

      SHA256

      4b856ee16b27ac11120f53d569b31de3a61a9789df3bf66e19de4fe9c8b5f5fc

      SHA512

      dbc60337f8394268a1b4b72f5dd28eda369051494cc12be695f766fd6117275672051905090cf3a86bc3df869284eb6c61c89c913b56c6c9a3618580f43e9ef3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3b72034de0999af1182a2e100ecdbcc5

      SHA1

      ad3ed0bb308eac927eee5a94d1a43a260434145a

      SHA256

      e087b82fac79a25668a53c421f6ea678e4e006f55f8ae23f6f37488cfe51162d

      SHA512

      226d3128982c2cfafb71ba02fc36076ad9ee72d52c45cc25c11a5e180036fdafe24cf293a229818140264323bae1338cf72215fb64d471813f9fd1bdb6e9806a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      03bf3bb5b3dcf09385383a9e3bdc882c

      SHA1

      26fd0c6fd40f78ad8da3fc60141f03f33c2a1f8a

      SHA256

      0aed1aa5e09856fffa7bd88544ffc78f551220923cef8b866f5356092ea4b427

      SHA512

      8fc2e2999900cde06019cf08f5678ee07fc8a70faf60dbd76aa3421c26bbbb6470601567b7261d7d87a4b5535743ca688ed0a84e199c12f33c8af1ee32ab48d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d90c6c597f84cd211572a90b82ac9c91

      SHA1

      2123a2d7abef8fa0457c722d1220c3ee74510c56

      SHA256

      e3aa8c6dd7dbe0f04fdcf15d09b7d3ff53e35e0bfeea38945f4e6e8730c5d957

      SHA512

      d14927f143184dcff5d712aef05801961c37485ffa81ce3a768d17253c53029eb6d07c4516c3c027e2b39ebb525ccf0862ee289fd23aa1e3ddf06c16b5c4d527

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1937ca2a14b9203cea976e12a113f1bf

      SHA1

      ead5ac7be19c059e1613537264685c69c23fd7a5

      SHA256

      c3234d8899b544181fbbf530b732b6465935130072f531dc7b30e166aa106547

      SHA512

      7d0ec5259198e256f19787a7e77225d5de7224b51c8ee9a4c0f106c9d54260144a355166c6d5a7472affa460f2680111372998f13deb1004582673d5986fc280

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3e09d44abceff2b43a594f657724ae9d

      SHA1

      8b47d74b2faf568e3ffceaa0e55bc89879a98cb5

      SHA256

      d7e58016cfe1135b3a3fe2ca83538cf47594cf56b2b85c6c403d3de282a67056

      SHA512

      6f68ac85558876b3f66d2abd885f8eb893cf0ae122fac0090fbc35d21ebbd4f6b01b8bc4110d6595881e9558a6c9b2d473a8a8e839e0d04aaa7c6b9ab97fefcf

    • C:\Users\Admin\AppData\Local\Temp\CabA9E8.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarAAC8.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2560-7-0x00000000003B0000-0x00000000003BF000-memory.dmp

      Filesize

      60KB

    • memory/2560-6-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2560-9-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2732-20-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2732-19-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2732-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2732-16-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2732-21-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB