Analysis

  • max time kernel
    131s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 11:55

General

  • Target

    fc3e6f28ef99490ff0c0f2151dc38dc5_JaffaCakes118.html

  • Size

    155KB

  • MD5

    fc3e6f28ef99490ff0c0f2151dc38dc5

  • SHA1

    a7bea6d099e75003ec9d7decb1ca0bb68e71e6da

  • SHA256

    b9b4c83895322d2e33154a3ea248dbe447f2fd1c86db152e891b2c5793d4659d

  • SHA512

    11b4dc002484cc85299d63325ce02216747c732eeb8402bfd66ea694fba22b478249cc7d634f4381411b42800e9b0c606b4fe4bac6aea74466631ee2806685b1

  • SSDEEP

    1536:i4RTwKmT7Tm8K7tjDC1nyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:iyysDChyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc3e6f28ef99490ff0c0f2151dc38dc5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1512
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:472082 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      679f146582fd97321fcadc250b6fc435

      SHA1

      eb96caf8f42d774fff7fdb1ed8f9f350fbddeb36

      SHA256

      ff0ffc98786a6b1119e654cc53509795d212df3767660d60c4ed086cdfc36d62

      SHA512

      5e612e924cbcc2ee8a9819f9e4299137203b381609ca24473297302557955c5c98fac2f43fbe423bb409ff86f5ed507425177edc625f7fd6cada2f39d0678aaf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b52ffd3a1c271160996ed363e2e8a5d0

      SHA1

      67215bc2af4adde48be886faf3b3d2fcefdada09

      SHA256

      6b6a2200a2bdc1c199da9c89ae55686efef76875849cf84c05c85551fe9ebb78

      SHA512

      c6e7f8036cc56a89a3df3084ab503327c970aaa0a72ce979e05a738b63271568cb4f1454cbdc0ee1a84276cb884703ebda81ca40f666c9ecb5a79143daa71810

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cb8650c7dbe12cdb84ed82473efbe54b

      SHA1

      8c8b78326a6ff564689920e0780054aa95d927f9

      SHA256

      e1b9f36f695129f62744f443a2d98f40c467462431b60675b639fffddecdcd68

      SHA512

      64ebc3170358f585331d027a463bccd4de4b4ec8401d7b2fd23c3f9ef658135f9f84bbdf14649e62e3362fac11cc0c8e4e10bf62fafb391346dc9942676ab594

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a18362a89bf4c0692b0ce860a28e4813

      SHA1

      d5b8c19ba48df201c40a6cb1f151d8b657d0c530

      SHA256

      4a5420d033c1c509d667cefce94919e04f58c61c86e56f20611589b314f8c524

      SHA512

      97741c99abe7a38ac90ab59650dfc56b953f731fb53bd7908de9748365c0d11db10d1130189177540756aa2071370890cd74aa5c25a2a3fd6c5fcedd07eaada5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b32e87cfa474b1969b2923ab9e9921ec

      SHA1

      1a35429c929c67b465c92b4c78eab1cfcaf732a4

      SHA256

      52df065c068cabcb44d923a95d9e8e8df0a66f30a9092f8bd2f907f8a69bd4b7

      SHA512

      9821f8c3f346d7684c12b1e4a9c1df5ada3bfec044ac95660b3995f0f045a2994e5feae1b1f505a13f9825a4edc0292d3d8570f45b261723ea20e34abd68f031

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fa1d4e6fbe2c91a046a88c197e83058f

      SHA1

      58662b4a4a9e4e5d00f939733619beeb477cfda6

      SHA256

      ed2ace8f9ce7c7eece700399a7d0f7caedaa667ada26a3164f340f29ae3c7edb

      SHA512

      e2656714c50bc8ef7360b2740efcd068ec9d22fc29d6846ddc3c5f8a1a2ad23749238c7c83219df06c79365dfa8b361fefd3687db81118f9cf9f46e255f33b68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1f0f66aafa132ad41b7bbeca5a146d30

      SHA1

      c6793db1b1ecc815e2a16f09f656f33097e7c1dc

      SHA256

      4fa1606e7d0ea003f5b41de3496ec125f7ad741801ca517d401cf41aa028793e

      SHA512

      08f439e3690cf4dd1a27b40df3cd41b1162c218adf6bb33e08e11a9bd8fa44731962f1f56b0cf0952fc1ed8f133df2a1293659739ff312ef5cd5281f25116263

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f1ffd75d81ddddc98e4a382af8f0ebe5

      SHA1

      fcde505bde7869ec47ce0c52518dc3444859370b

      SHA256

      ca9f06ea8a525868366524627fb1975b0a6d9232d13b854192cf07a934fdc676

      SHA512

      06177a44f6d5021f597568109ac64fbbf0b06c4269eacf7a0bc93c5f7ddbb36190a6053febab586e4ebeb620c7922bede61e52dbbe735dbc405b9eb8d90f79a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8afdbf7f4cc2ee69d7562a4c9bbba533

      SHA1

      5840d40892db5a6837af9e055f4f2bc7ba6bb5c5

      SHA256

      75e735dfe4fd7b36d989dab6c434f1dc04a65adaa687739b51b565ff34522026

      SHA512

      ae90022297c67c60d7551c0a1377c8109f2b8644bce24609260537ab74406b9e9eee6c8bbaa915539d3d7bd5eebd18105071da85ca814b665ea4093a4458b1db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6346638804f2158df2d10e69ff3bbe7c

      SHA1

      574e02266720eb3601baba494686a057b1132eec

      SHA256

      c3453c526869059ceb1ef5066eb605fa766325199ba7375222e2d1933fb916f2

      SHA512

      7ffcfdc4b2a097290a3d001bbdd2ccc7c1df9e3af2850f11e6180d732e966a197ef3ef369c5bb0acd78d46343915898617e7913cc15935b4596fc6d3050d0e9e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      acea29724409b38ecfcbd450e99f819e

      SHA1

      2da110c2e17230ba06af6d4302ad3a849ab33dbe

      SHA256

      1257ff78b48346ffae1418796ecc687740b536b4c142f005c91e15a1ad84a886

      SHA512

      90ca8390a0528905c658ffc53d54508c4e9928cd8bec47f573e07dd69bff8634287e5f1607021dbe055b982b077dd34ce7f9e9dc7dce3b38398a51ef762d6b89

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3f427eee8e3ba6b2385c284074855766

      SHA1

      ca6a114ad509bd724b4f3ec6727ff7a210410050

      SHA256

      47224a01a1784cd3266624c9fcf0b90f25f8de8f2ea8785874e7ce75b7bd201e

      SHA512

      51cf859d4a6c14c40f583b529a18e1822d61a13fb57d837f79a4022533734a48e09a7e685342b3f2c658e9447f69b71f82086d6b552cf38fe5914d18a28b396a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9021888a17498068874decdcb5efc9df

      SHA1

      2f3e0dcd049677721881ce1f23d1de566c74af77

      SHA256

      ec562ed3350fe8399dad02d1bd9fd9e9cc50ace749f3537d109388d007e0b654

      SHA512

      b7b65a77436760dea29ea9e96bb7dca01325dcdcf921ac08f351db8c2926ff6ecc5fade4bb28b6bfbef6c30fc250e5b77ad41af17b9f87996bbb30f2f6b929b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0fefdcda24c2b701a0ed3dc815d5bae3

      SHA1

      5a683cc6eccc592c86375c84825a802fbc2906ed

      SHA256

      22d4786c554a3acaba02170c1de3e1b1f5fda3bf35cfb425f71651cd6e86ae8d

      SHA512

      365dd7a546a250783c9510e26446842cdc185500864017194cbb2570b0c6b459fb9c305c7507bf91742a6373883177ce592da7b7aed1702b47883a68eac5bcfa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      deebd182722d3a64a4520c00cdd31825

      SHA1

      bbbde58d2c3c1c6aefc67a5bcfc3d3a16d9f4ca1

      SHA256

      8efe7f08b7653e7946147050c59e74be9986e455b57540b7326972ad94ba266c

      SHA512

      b242f9672cd9eb42928bde37b33d1c55af8555af3df267dd5448d2cb9d5044ed6346fbd7a49d5c19a79fa7e1080a2d6d1dfce091bf67da7ac56fa9cb24e77ab7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8fcabce083ebc0db371b0527b6eb6af5

      SHA1

      18e427d6a6f42488d3d099f65517a34b5967b3d6

      SHA256

      0358695f206bd2212fb42c3f91b2707063985813b9c94e2f5cd234540632c4b2

      SHA512

      26b814f8846e20bc458d9e261bcdd89c056406a858ec9de782c5620fdffbd6fcf4891986a1d574aef90ccaa804d27bf3c284e301e1e56e97f03bd1b2b8b29f5d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ee69693c05352b2abbecb457b7bd0a6c

      SHA1

      226268d7929047192d8bdfdb817f7c0e1a537cec

      SHA256

      b18bb00278cbc6b8c973bb6b4657e660d93b86f240bab647eba33157fa2f6fb3

      SHA512

      84a1c859948ec3e30523ed6297c1a2961f75fb3afcd8b32cdc0eec182a55e2c6fe7d91fdc5a1e1bf4072af8b1e630c4d38660e7d5ee7ffe73be5959f24841cc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2a0da17b2ea91f12f33bd30c68e34a07

      SHA1

      f0d8e5b56ae3fc75aaea0774b8de77a99d0e41cc

      SHA256

      1b215187962a630b8d33e272812c00b603cf367d243ab3c062165bf18e1a1295

      SHA512

      003043373a8e31e30c775457d8d82330c0945eda18bfdc69e15290fb8665be6d46a4b721be6b36f632e7f5db1ab1311a1699040846ac94cf0c6bd723bc26e1d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7c6290f0c6532152ab282f0e636b7036

      SHA1

      dc459878cdfb06d25f865258100aa141318722b9

      SHA256

      3224d11dd1697d595d0b5eeb72e50dbeb4c4459c8b184f073c3730d0ae17b0f7

      SHA512

      64495f728bf35a4cfdc99541d8ba7c7f6a9b259031ee865d4802bf3d37f5ab78d8514340899617ac21b6c554d6752889b8fd692089a26ab89a253d19c61c89a6

    • C:\Users\Admin\AppData\Local\Temp\Cab7EB3.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar7F52.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2080-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2080-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2080-435-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2080-442-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/2080-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2356-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2356-447-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB