Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 18:54

General

  • Target

    02ce39a84767fe553db5d76485c4e233_JaffaCakes118.html

  • Size

    156KB

  • MD5

    02ce39a84767fe553db5d76485c4e233

  • SHA1

    27ab7b95710950e44956eb3c8af028cc2cef9a95

  • SHA256

    e24ddcff0ba829e5273132d58214cf65efd0cc30d34ae2d500ef646ac5e0f5af

  • SHA512

    374fcc908a9c98d7bfb87d96573c01ab125fbba84cafd1ef82309808b74e41ffc7c7617c470ec69b4d29e39c00bc44047ca617f85590f205b94092591a7c64af

  • SSDEEP

    1536:iPRT8pcnLcUuuagj54SyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:ihv14SyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02ce39a84767fe553db5d76485c4e233_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:292
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1056
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1732
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:603146 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2400

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      39baf46234516975cafdc701feeacbea

      SHA1

      64357cba089c49b0e191fe4fa8cf3ef5d9cb45e1

      SHA256

      24ea1e684424b997e7e7d429671ebc86833f7c5d0d096543c25243b14e87451c

      SHA512

      9fa1a7af00c712c780c05ef8ae948088e3f4520a96c7127a782499bd5c9847320c325e29942f316241e999dc617add4412375eb9f00c5d56dec93e4a90a89053

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b9077f7f8fa6fd371a3f12d13e24ee88

      SHA1

      07791af8c3b6b27028c9c73e9e0b51610b96ca30

      SHA256

      48eff7d51d0337b73e3255e58754b8e6fdf2aecf8712b0c0c73304687275df5e

      SHA512

      9d547488a06f4b42dab065b07ae817744ae3e38eeb2bc5a65b22eff4f339688921abc4438ceed3a0cf82fef1c7fda065c8a2d5e2e6c62279230af8022ff84cf0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      85105c6cd50a7c63eb75f52d4320ea4b

      SHA1

      b6504433f9fec20ed526701ec91b49e788376412

      SHA256

      ca24c29889a58c60d0cc75a00f6307827500faeb33ffe646de6fd74e2d788588

      SHA512

      7ea49ceb987ea8090e09b96618acaa10c95de62755f7d64b6dc5204b776e8165b80bc0573b80b060cd5713257aeb04472af2b9a3f7b675ef01165b49fdae40ac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      84113e0186026ca9b6d6a279c364c8bd

      SHA1

      97ea15c1275ddce673313abd02961622a0a72872

      SHA256

      175b0406e2875fb3764542e3215a5e33640d73beac5dc59766846237a935491c

      SHA512

      14b382b8b9e8ea9a480c507c9a15fa961a9741af0b17a9970b5f784c4a3b6d2db775dcac106d957f69e290d5e61a20e728c67abdbd789813602ba870aed2873f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4c36f18dfc632d67f87b43e2c209d2fd

      SHA1

      da94ed71c3769bc6cf9656205ffd4daeac52a1d0

      SHA256

      79b3e9c2d67c524ae0d765a8750e8efe338e4ebbac122920efe49648dfdd2cb2

      SHA512

      c48817c29a8c34c317077f89dce08f44cdc1a6afab6440773dcf6aec5c07253eacb07dbf55bd352630024133da4712edc292d15cbefde30409b91c965a683e77

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5a6473ee4be422f3428a74feff835d1d

      SHA1

      4da08bd304002f8f7650647fc19c93c8f2d3e0f8

      SHA256

      7b7980996f0e1b46868b6a9051c6cf1d35187cd5ca0da88f3e8c4ba75a5e6583

      SHA512

      c90a4a0f1b1f1478b0606d18c54813b897268be7e75f11eb6aecbab806f4c91093a804acab6561998121f68d6507b6ee35cafca3022d7699ad9c0ec039215e41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      89a575b427ffd3fe8fc9044565ee3aee

      SHA1

      8933accedc5ed815183690f89a4b235f06acd9cb

      SHA256

      cbbc6d24efce1561f6b1227f25a89fba1a5c30498315cab121bf6781b582009c

      SHA512

      7d589632ac03ebc98f55ed7a4ca46aa66adc0773f0bb5952d56034bcf910156fdfd5e0880374784f0754f2ab9b3d1107a17450ece4ab7da9b20064c31b2219df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      636120412e62761eb2209f467395858e

      SHA1

      dcf1245e8ad4b721cbdb6aca2534f73b0bfafe8b

      SHA256

      45bee397ccda6e6ecd803d629feef2ea97342d4784d6a6bc45e33546e7120608

      SHA512

      58e8d70a5b60e1fa0b5c752e7551f0a5c4188600622e644a2418a74bd0abe028c7f4e7c560f66309a4a68da7258b54db5a1006ffe03d07e28729afdcf23db059

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a1a8abc2488cd7f36f807e7ed041bd94

      SHA1

      d67422c8a4a2eeb189b43f61005ee1ae10cdd6c1

      SHA256

      29ff910c060d56ad77b07258b333e174699cdc9e4afd1813e92cd53fd612b56c

      SHA512

      7d36bc05c5a79667c95e02fc9dd4a298e0499e653b8e4b0e80726db0f97b70e3b6f3b56cc1258451022bd6257144f88f9cece1be4b268bb5febb58f6ea0a79b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4b05d4cda74d35042598cf4a4d48a06d

      SHA1

      dd79ee16d6f64074103de5cac53a2cbcf952de9a

      SHA256

      7b3323a475fed1446085668413386e22709ce4038486175936fe9a3171e45ab9

      SHA512

      6c4c55c323fc970502f8ae8f7c2e350d6c8a33a47eb18bf5cbe936aba8f79c041a38cc67493d64207d9203f5cb8484eb0455d83c0698fbf18d296b94560c6cb3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      278a38d3c3ab65dabeefd2d31c653dcc

      SHA1

      3578c92faac061715b4586eaede2e9a5b989efed

      SHA256

      60426624ded43937f61e9cb072c3f54481da3f0ca2140eed516f7858776d0d2f

      SHA512

      9eabfe20b52c22b4040cdaeb62ee41411913b5df465b3d1edecf16b03159510d924f0c8dcf6e0a4f280fb9234253674a2bb8f9d8525d0cdccfc8fc1ef6ed5c1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3bee91b95f57ee6f33c304d84967cd85

      SHA1

      03b13a1a1792d5093012caf9105ca11dc3b76faf

      SHA256

      81c7cba86d1c9af3bb3ed685e0d0af28d5b19573d5d5d0c98d8b01b32af96c3c

      SHA512

      aecf870f60f8ebb057acdae96c37ca0a04a941829eb061ba8b5fdc8cfb5eab6a247b52a9f90871610eb381b4dfb1ae709c036b5476a308d1cc84d2456e019288

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2e47c51fa925364c25fcaab987885bf5

      SHA1

      3114e2396c1a35f31bde1cdf9e1517a91fdc4e77

      SHA256

      d3837c999579c0648e06888b2ed28837371d6c58ad07041937fe406688118843

      SHA512

      a7a49264ada58b8d84dc62adf1788da2e68dddc8be2414ea3a9176a779d6cf5a042fce28f62bc487d3527983d226334ac572f2bb3644f435f675545973aa782a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2e643c9c83aaa3e0de0d38d25489d129

      SHA1

      9a501878b16e7fb155a81b1366aa9483f125e644

      SHA256

      6c00607999816d93f71d1f2e91065857f75356fb4c0c3ab0972af78ded26927b

      SHA512

      09b03604f093c028419c4c6bfe4b190a55c085815486c1b7561d4843e5271b5c0d39864a14cb292c46638eaa7289014cad12f65ce6969a6619e9477c5047ab4b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6d120ffc4fd6a30a7dd8042df2a3d360

      SHA1

      b3b32e95a89b12f644d73e645bae9f055875fc24

      SHA256

      7cfa811269f8a1ea8f7fa01da7e89978f13fd76a6f0456bd7b0bca977e7f2503

      SHA512

      0a5815871f1aab94e226d78170361fd041907abec1fd1afb8d0e5b9acbc2628700bedcd18576885bde389846a977fdfd451af483ba41a539663f2d24fce42a22

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c41e16346b764272feed83bc091929ba

      SHA1

      97b71ab8ce4e5dd03ac50b181e166147e619610e

      SHA256

      584313d91581ef27317aa525a44b29522ae1c1296fb5004816d9b155d5d86f34

      SHA512

      c85d67f25b467e3f4f7e603227c974f0e8ba5d0edf80a734cea32935685fbce6ac8d292e7b77880525a607133a574e94d59e8e541767908aba7b7078a876930c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d9be50501d9e5997f3f8533f34b8c82b

      SHA1

      89403dcb603060b9585c38c529007281fd88e391

      SHA256

      10bab6dbbc10d76c3f9db276e23ce37c389392d603cd3b964997be15b075d75e

      SHA512

      d581969dd9836234454ff4dd11da454fcb30a65bc82fadb6f0c550f10d15e6f83ef37992c688bc6629158556574f51b3c3d33a9db714c6efbfd0425f6e6fbfc7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d71f75acb646d6375b0293906b10b474

      SHA1

      f910a20ee90e810b08aeca64fd5cff815577fe0d

      SHA256

      706dccbbca2aa98a10d833420ce4436796c76473f09d2edf8844da605c6e0c46

      SHA512

      f7b38070cfc8f83fd11ed2461fb035362027c27a8394acade474a30a9f564b42c34f5440bb3e9f81e2c2cbd0b934f87bae4fdd13ca6ae77fb1df0f2a2443bcb3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cd3c64cde04a48256a4d2313ff6f6c74

      SHA1

      add6f2f6ed0910a561fc427527a5d2d628dbe10c

      SHA256

      3afb334e51c32f2ea28e92ad33cebc68a7da3db99bd5c697f81da7a1b6eac623

      SHA512

      1ae9737be1e470f1f2612c23afb96cd4413b961bc33bda0720cb91ce650709f8ac931b57eeaa6048da9233fc8bb2b0e9138246c1f8f3361797052fcbdcf4ae93

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1fcdef6660659255e6db0c4cadf16d7c

      SHA1

      92ae95283820e7fb196e1d3589a9a166c79195e2

      SHA256

      86518696f20736abc51e0b6f25c05d9c7329b30f9f913e53fdfe816900f4ccb7

      SHA512

      132ec6cc2e0c9b62cf3c9fcdbebcb04361fe9bcc2932b2c59eef5e5d188b8108049788e3f11da9ec63d59a456cd308b05f5d6f0b55327514ca089a4199376987

    • C:\Users\Admin\AppData\Local\Temp\Cab7763.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar77F3.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/292-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/292-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/292-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1056-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1056-446-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/1056-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1056-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB