Analysis

  • max time kernel
    121s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 03:14

General

  • Target

    f50c7d74d2e05f306b0b3f03caea43dc_JaffaCakes118.html

  • Size

    241KB

  • MD5

    f50c7d74d2e05f306b0b3f03caea43dc

  • SHA1

    1c283b7488759bea4c886924f0ddf9701add5d44

  • SHA256

    a798c50fee3cc12225fee21aa2c2d1a86a64dae358114dbba81b6ae2cbe90fee

  • SHA512

    af4faf5ec6d3423f44936eec5bc4c7011cff0edd938ffc4e27ba55cd01f7e626d00539d6a5f1715f613ab7b30267e3c10721736549249781b076f9ac2b8bfa1b

  • SSDEEP

    3072:Sry6yfkMY+BES09JXAnyrZalI+YxyfkMY+BES09JXAnyrZalI+YQ:SryfsMYod+X3oI+Y0sMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f50c7d74d2e05f306b0b3f03caea43dc_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2832
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2724
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:406536 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2620
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:668676 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2708

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6c18f9b32e3ccfb8c566dfa2143329e6

        SHA1

        f8ea219a8e84511423950ff72d23984a6897a776

        SHA256

        3b4c232b42ffa394b35217271f63f0fc26f8f1a7706c246c189f629a55e12262

        SHA512

        acf07892b38d7fc266369cf6109595599617489162204b74c4c16c13fe917eda7a00a89364fed0b24d895b14c5b350d370ce311bbf6d067e38fc38f1990615e8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        cf891900fd2e35f5c48cf4137e3707ee

        SHA1

        909aa3184fc7df4fb596ca84aa15671ed52b7bce

        SHA256

        3d35edaff323bf3c0d17b75ca0221f2c4efa8489724c4cca76247a5660633694

        SHA512

        ca5cd9cbb7ef98cbad0ed61542f52fe7d61c533cd3eb83434e464c4e35d468777ee3cf9f5d6afee68dbc6ad73a7cc1c16ef82efaabe498f8ee425a5a137ff094

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        501d310d64b1602bbd3e10e06501e9d2

        SHA1

        5d8a1f77938f510e6b0339183ff646dbcf17a5af

        SHA256

        d39a8fb7529557fa7ab0c679300a2bb7b7ac0908341b8ae8d0e4061aba50546e

        SHA512

        0c615c4a16e1be75b82fc42250ec3d7b4b2e3728486488982b0eab16f71e38aa2a55fd194ffd46e2382757564c55d1f20422c5c24fcd16a34583d3526374e801

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f3ce88d4f6210853d51ff23fda7b9e98

        SHA1

        a146b82e54d930fd3800ac91a0a800e6d63d49b6

        SHA256

        1d5b50916ebf2abb82cb187e2d85c8ff56648f0a3d532526dcec593a5a1f952e

        SHA512

        ab72c670ab5c694d57ec70f2cd592a1f36361bed7e3a85fc325a90adea8876803dd99227a14a9110fd2df56c5c379a293da107b2afa382d862c873ce9f0680c0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9312d9e8546a8145827882f5148548c1

        SHA1

        b7a086e7f7caf0868ff10a4fa86fe7033d78bd41

        SHA256

        c8c25d5ed6394feeb6b438224efbc82c2c76418b422ea072478f00dc458e6b52

        SHA512

        7ff24b09f20bcda9b23b0ff879fc7b1fccd2632405ff5e504aa474b840ceb647a48b4801e6217c48cceff1af7f559ea46c98763c85d1ecd053c13b49bd0cdfb9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        12e0ce07b10e9d8751e6f6f3478081af

        SHA1

        e49f3c196061ffe6a0b9390cebfcfc817ac48cc3

        SHA256

        58e0e83bd66296a9aba76e05904c3041af622d111689e3a8103f09df3e5e8147

        SHA512

        eeee8876507ef57a66202913c967207dbd9d20a1b44393e04f8831980e0c422c711f782c6b229bf8f7ed5dbb114167d757e75699084a9fa33fe284e0e1583908

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e3493c30921c5443fbd39ba73cd045dc

        SHA1

        aca7808d91443e236691c51030d44ba2ba8ee573

        SHA256

        0671abf043bc184c650ee82cd4fb64d3e682548ca4a1803af2bd747e2eeab6a0

        SHA512

        4613fb9580d462f736a1b257053a0f61aa254353c11fb38a4b58c29665284502f144a4a4d3c56774d8ec6edcc1498e4f5296a41db8b5e4862e56fa4869394bdf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        de4445fbd4aa135d538d00dcdc17828a

        SHA1

        2296c59f2219bf0e7ad27342992a8636405add4b

        SHA256

        8bc5d55db693d9ca4a132549296652efe8b9d7bea9f44bda94bec065b565db87

        SHA512

        b9c1b73bf16d6ebab5e90f1c913b1010876385d97b23af48cc74b1c5a0b7744c46e4855dee9a7c7d6d4c85819f5703d6779ffc066de10c8b8b408fed25278efa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        72f010899e14342684d7ecbb1cd94915

        SHA1

        5f52599c379e25bd267811a4917832f67cb5f66c

        SHA256

        bae1b62198287ee374e2c06b1c3fcf76faaebd73c0a78c2b21eceac4017ecd11

        SHA512

        3e1b9fb60710da622db32f90aebee4ed2eb2d7b76fbe5c0aae5dcad4c88c9db82d6c13c16b8820371f0e27f3b951afab0b76049b06fbbbff16af42a1e773d7ce

      • C:\Users\Admin\AppData\Local\Temp\Cab7F1F.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar7FCF.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • \Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        55KB

        MD5

        ff5e1f27193ce51eec318714ef038bef

        SHA1

        b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

        SHA256

        fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

        SHA512

        c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

      • memory/2732-17-0x0000000000240000-0x000000000026E000-memory.dmp

        Filesize

        184KB

      • memory/2732-6-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2732-11-0x0000000000230000-0x000000000023F000-memory.dmp

        Filesize

        60KB

      • memory/2732-13-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2768-26-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2768-27-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2768-28-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2768-30-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2880-22-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2880-21-0x00000000001D0000-0x00000000001D1000-memory.dmp

        Filesize

        4KB

      • memory/2880-24-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB