Analysis

  • max time kernel
    132s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 12:15

General

  • Target

    180b31c4558d3a67f4b22698f0ceb4f2_JaffaCakes118.html

  • Size

    158KB

  • MD5

    180b31c4558d3a67f4b22698f0ceb4f2

  • SHA1

    6d768939891171cef285088cf95ac100a779c714

  • SHA256

    026af0ab1ac3fe494589b33e6d5424b895138c0122acd8606eac971905547c81

  • SHA512

    7fa484dbad7f19876a9fe824842704e46ee4a2f2cca1f358dff229bc1c22f055c7eee5e5a04a7151cde59af5a8e06a9988e5ad2365062ce96ecd94de3d40d280

  • SSDEEP

    1536:icRTtYTdvLOcCyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:ietGLOhyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\180b31c4558d3a67f4b22698f0ceb4f2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1044
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:406539 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2444

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      461621564a17240bc55a4a68e8cf8a90

      SHA1

      d69ad2ff1c8a43d038e7c2382a220c4e2a4eb8a3

      SHA256

      fc5f8c40c549209c3d6f187a5c8d7dbadd79a4a49ec887f940b2f674b303c7ab

      SHA512

      8736b885603f09ae00d43aeb434d9e14717b5ff9f3f3a2018b5ae6ba437f668b7e5e9c7675d516ab24ba45a986daaa697c4003292ea0ae049d9498831dcecf98

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f1771764ece15df32687861195f08019

      SHA1

      e260d15f3915a48f3c1ac9e035722b580ef9e69d

      SHA256

      a5ffbfe6da01e950ff6aa9c8ec9ce5f6db810ec42662ea500eeb4f7f494aaccb

      SHA512

      79e08c7f0d4dec78f024fc9f719c82bd2af7d9341c6c2996158cdeda667bf886ea21765044b6930a9e407afdf818b3fad62e609da0885786b87a735680d9c1be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6b32d612639e723d643f72f4f5211fc7

      SHA1

      80b946018685cfe59d464e024f9f5ead73e3d07a

      SHA256

      e35dc4f836389ede6ea39f0d8785f137b854a2b031afb3c065d83d2b5ab933bd

      SHA512

      306f4dad48054bcf9ac20b51773366da148be3226c6b71198e99cdae57183618213065d08df15efdfc84219b6ef6f1379a9ad90ad9b92c75cab82bc3c8ad5fd4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d997a0d304af9ab2cb8ce0ee51845581

      SHA1

      90b6dc5a2edf252ad5c642d04f6aac42a1f947d7

      SHA256

      1dc60b6632aa3dee64dc76d70574da13c0b9f660ecc748c192c83f2637cfbe05

      SHA512

      e23e596fec845af7013c943d01f875def5fc61d261b80d17e00db2d29b7581e25da9d44a6a40cc059acaf3103c463ff16838227ff47a9922a2f134d5e19115b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4acb20607238f47bc41c4ddc00934644

      SHA1

      cde1674e9299c0816cfd5c4d8e682655dabc66fc

      SHA256

      e5bb8aed05d899e28775731baa42e7dba743bce6a8822df509485740d667a82b

      SHA512

      e596e8a50a9d247716eb4ccb54bcc9c6e8b10d9215be388909c038289748c762835c3547fe593576209c08010b1683fe5e438cb73d06475d71ad7642d3c987f3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0f2b5c534a8b40db4d70d13ed7a49fba

      SHA1

      4b4a46b76da38c74b336b41ca6c7848eecc84974

      SHA256

      19eb3658ea957b93ee4511abfa64d3b9f843b25170e7beff640e50b1e5cb5488

      SHA512

      1a76c50f8a81f47f3b8e77333d2e5eb99fce3983ad8932a49a9b4080166c06f28215be8cfd9c19f8b151a7003ad9349cbbc0ad861d3e332ca799be30ff357bf0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c94ffc31d1b35ad09d9ffff97821db0b

      SHA1

      8665ea25adee08511dbc565f0f0ed9be4d814447

      SHA256

      f13fb0e9df519e3b41c31a3a849d93d800943e5e91993c76bafcba2b2503799d

      SHA512

      c297d3032f3aee0684117a5e7fb25f2c0abbc9910ad6642d5233132e91bddc21e59bf0c213fea6130cade90ed9f0f90d873b4ca0895e3dd7549562a44e64ffcc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4ea7143639fc886f515be1ea394dbab5

      SHA1

      d1e1d36669f54d987a5bbb54eb58391387db35a8

      SHA256

      15aed2ef7e7d609da2471efcf31a4bc079b3ce1301cd020b941c99b4942c1a91

      SHA512

      e4f45ecd471d7c226589ad7e533d767f9061bc40d9d78290fdd37d22f4a9ee5201c56e5a2437d874221fe193d3db20c593b5035596c97696b05c89ddc1c6e44d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      520efac97a84b224fee7921497193d7a

      SHA1

      ecefc43357e9da2329578ca7126b47217d25eb8d

      SHA256

      864645744a3b0a2ded9386a9a1c21cad0dafcb0b1246e2a3bd3b6bb469ea0cb1

      SHA512

      c55739ec8bbce53a56cc109848731e1fea26fa3e789292fed3fb20a8e1a88be5315edbf2db5fcdcd25cef12bf9a41b255f9d1f2d1037c6fe9665683ca5ca91ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      97472d6843b9a2b032a7cf5c4b5fac7e

      SHA1

      39d3ec6d751f698bf472502ff17bcffc6716c54e

      SHA256

      9d055bc50bfe1149452557d64e6bc6ee023df2aae14c70dcd24f17d7ce0734d0

      SHA512

      6e06352a0a0c033b6d58838edd95e4ad1f48711a92d2e7aa9b49f6fb3e9eaf48a1fbd06b9291ab0380041f9d0ca780083c0348ac05f62abc3b68291480f3de0c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      253f6de640621148260de129731f0810

      SHA1

      0b119325ab541d8cab3ba3c2608c52aaecbe208a

      SHA256

      2fa115fe641800b6cc67b1c7d702b43d260578f220c509fe686edef686bf6083

      SHA512

      27b98ed0d7554f815375c359e0785b3533688445bcae57e64430d801277412ef0e526cc34b65d7dc4c2967fe0be9d890943e5084ffad5da8813346e230ab15d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eb863cc28b4a060b79919e77fb84dd9f

      SHA1

      8e93c45c1fbe9d8abc63274bb94ac0304f145ae5

      SHA256

      00b03ec301a928a99eee1bd3a746970f0201d325f7d1a23ed6d8074c95b73237

      SHA512

      8a9f80a1be2295360a8a42bffddf97438fe56754f4329f1c9ad80ba0a83f7f2c28bfbb772a401e10f64dcd6e9bff6d3f2f0153fae7865cef245fd135e4b6db3e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d63dc4c0dba887f2c7c117fec3213788

      SHA1

      836a2bf9d2a144986e4fd8ef830bf0768153bba0

      SHA256

      02b635cc26399e89630851a9484b8ed775677605440a4f79c0392f8a6bef2e8a

      SHA512

      3039fb50ee24fcc3b986701e135e1e0a70bb1d8918d00971ea468846f5bbb4f80481b1ecdd4c1d9097fec5af479eb6e19d282138b4528ad5fa17ab045f0deeee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6481fb122cf2889037e18c47b282ad66

      SHA1

      cbfe5ae7d8a522f153920d4a177599045ed1b9b5

      SHA256

      9b6082a9250d1e31d205ef57384a6f62ef7a4e1ff556f55509bda72984a914b3

      SHA512

      136b02d7d14100ac5463e5707fd64b388d189bed5dd4067bbee8779e36244cb62e4c05ce2768891d550fe36776145a27b94cdd0fc61e9f7dc7732dc5f41f7dc7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9a56fe7c328b69175cebcf73f10652ec

      SHA1

      3f7d29b0318b2cfcedb3a118bb12720e8d0af4c6

      SHA256

      7e344cb91c504d927f606a0b5d21f3f154e55510dbdacd531a79808c9b587ce4

      SHA512

      295e6979dacc3e0019c5a2d25d3690abf5b14387ef4d3a301fdb2551e621308578ac489239b772a743b0779a7ae0210b96db3be9b006dab5b469c72f66477b28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      15a58820ffb8d5cd63f1df3fa08feb84

      SHA1

      86fb4cb0f57595bca868173ba751d94e1ec4d6cc

      SHA256

      7a4ef866b0b1312a1028fd22761d131a35ae7688294f48e176b5d42922439738

      SHA512

      a7163578a0b2c307b09be99b81e6c2d41cc6203fd11c9b1313d0e9667288ad3b46d37f959bbd0ae617b3ff83bfa1bf75122f18a352bdbb6e7de43a2c798eed41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6db801414f97309ec42c70002b52fe10

      SHA1

      90aba27ef88576f7497af68016e4fe11413339be

      SHA256

      32565a9dcdbc318efa2be736e4bc27e8f4e01ccaa89938f66fdb0695d624fb6f

      SHA512

      da9cde082d7d9d2ae6be6ca406c855e88b720b188a072bc35bdfa8faf34f786ab44506efa6b4f02dfd0426c9cb3ed54e877b439a346dd92d9030d1d3c8a54259

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      05e99fde223254c661e1c3df6c5a1341

      SHA1

      7cc4b354936ee4defbf9e0a4648274fc5fa30e9d

      SHA256

      0588df5e9c82d2c928d775730e3bbfcb0239e5c91ec731d916ef9c5db0ed4330

      SHA512

      03a9a3ef0828ef32eff903bb2775bb5cf41de33bc18c0c7724062e182bcbf5fb7aafcae22eed1f237468bb08ce2e092d26294f3b71491a6883e3831f4442cfb2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5ab3a60d010b815e198b0303c39726ca

      SHA1

      4bc6ce3b13a7c5fb6a20e8443c196931a4a4262b

      SHA256

      1ab07f81e657ffa5fbc2337afa2f1daa88dd2dbae65ac331218df0fafc023697

      SHA512

      a14803c98348da856081a1744faf90bba5d902c356cffb59c6202957c751fed4463365737271f1fc7a58b40e68b07ab106be4f54e307e7f6b8394592f9fa4e55

    • C:\Users\Admin\AppData\Local\Temp\CabB7AD.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB7FE.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/568-437-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/568-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3064-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3064-446-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/3064-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3064-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3064-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB