Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 23:27

General

  • Target

    27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe

  • Size

    87KB

  • MD5

    27063d31ca0b157046a84a82512d468a

  • SHA1

    cdcb21b5d7fabe554cb428ce3d1cdf95c1c4ce1d

  • SHA256

    92d03291a707c683879a3872f40d80e49c0c4d94b4b1087f2ed9244d02467b90

  • SHA512

    ac1d798f2f46e6c748860d9b96c5496aaa62004b1a60108a78310ceded1eb9b7cac1f45cbb7a107be5d7a245b14df6a7e35a7c6e42d72ff3922d77d05ba60e2b

  • SSDEEP

    768:Uv84kAhFE1LxByuEhzvBh5MKnNjxxA4w+jYiiqvXt2w+vSZawsPS82jN0dzAHID:UDkAwGhzZh2UXYmvdRmSZad2jN0RA

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    931b53d9c554de10c3f73771901e5629

    SHA1

    cb3d16c8a61b248a597279de9c0fee16207b95a9

    SHA256

    63cadf5da73c4c30be2427f8c95570f2565da99d47c7448fb8c6df0fac477d81

    SHA512

    eb83d9539e0fd5d3954cf817655b25dc2ac1e2c8a3932e103b14af6399d5d56164a1166a7524731ed702a2bedf23ef45321e2c38dfbfba4bf4a15c416dc19edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b68893fb7711df24d3fb72280d8aca8

    SHA1

    873a488a6d2f4b8c2f843d2342560203f0f6eb73

    SHA256

    25ceaf40513f10c202b04b6cbd928ccc2cc53ce4132e9c7840f067115f613747

    SHA512

    cd01950bf20b5d33c906902b358d3cecfd2963dc33b4e820d6d7f44f3f25bd1a81eb4a7f8e12568f9718971d922103f073392dbc8d6e5be44b50e54a5a0a5b50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0898346d65e9c4a138d00f5e322614b2

    SHA1

    18cb8817781f5cf9515107c3eaa772863841c165

    SHA256

    2f0277624370e3c025087a0099e08ace9b78a9f42f5302b7398549d2e4d1677e

    SHA512

    f41373a89711a54f2c171a7e018f8e49c125698dfc9db0e50ddb0b1e8533cd0b1742855b3e4171295dfe1845cb54e75f6b143894fe560b78a603aef92248aec5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaf0d61b920b14f80e91096befa21dab

    SHA1

    cd427de452af6c4b8a72cccd0030ada5279a589d

    SHA256

    22986dc498b928cd5d6597da4ed043d46bd23c690b47b8a63a2dc22c288a910e

    SHA512

    d7e48eab44e930d14098033acd1319f7e0a32df3d710a9dfcf04aaaafdbbc45e4cb684dd0fc9e71cfa268e14b66ae3ca7275e2c035c365645467e3a81eaaaa92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39fe58156216929a856069f982ea9aa5

    SHA1

    498739c413f0e49340c379c4e2c885bae1460f33

    SHA256

    01151fec12628029b9e4a31a9f55941dee57a6674fdc38bf480098189eb371b0

    SHA512

    ca10d3649fe4c2118613b41fa128de9481edf9993a882700216ca9d992f74bf2afb7b0a3af0b9dda50e3be5898386bd57b841d34084fec1fec613e5a0c3e911c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28fb8ca14cef56c64c183c1a01c0cfae

    SHA1

    aefe60b1ec1c3b7c55596ac0d629e8a4626b9d8b

    SHA256

    21abccb3acf7110b929723f50ca93a000da900b325d52026b7f2c3bb203259f6

    SHA512

    a05c7f50794fa11ac2a517d44a20fe99bc1c8bc5996501ded72ba4ee9dddf7b207dbd13c80e603f78cb7275d4ba6a4ecddf54a23a4e2978ffa9c9c70a7ff62a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28c55732a24b509c9cadc0af4fa392d4

    SHA1

    6be311e1e42136750e1fd85260494cf4ed53a9fb

    SHA256

    e57bec70b980cefc0f89e175f24b891b61b7585d24d5025d5efc1823b18b0f2b

    SHA512

    3b0f88e31e09890a195040d420d527137a2c2f9bcbe35293b1e14ba722051e17a4a0b090a9fbda7e13970ed46ce828a942f48dbf8146b66e9464a201ad6c5b9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    340baf9658e8f66c616a9fcb5c3afa55

    SHA1

    6c2f8ba3124b693b90c974513b2eace0e6592cf0

    SHA256

    653426e91ef23531f121cc7f1f18af887e4a16ba5a110ed7a35d78fc61967a3d

    SHA512

    04fa96d3bb572d1ed41e19dfd0d7a68ef9d9ae4afa5c21e2ca96d962eea3bb2827027af4f34b597e787e00cf4e3f4c7b593c44faca9adbbd0e07bf34c9ed3eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f08b87c994cfcf16e09c94177d626166

    SHA1

    160ba78f03c3b14ae8c7643a1c3aa0af5251efca

    SHA256

    bbb9ae41cc694859ffb9d1c09d7cba33b7cc4359a7ecd645051f68257b8368da

    SHA512

    2e441d265d39c7038aa69e517d6228dfd81e902b393a827350aa38d56e9483e4b9d2606584af204654361d880360f8b1bf6e8892fcaf61589db90ec16a22b390

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2af188bcd4ebbcb425e1b23256a04583

    SHA1

    ea4f829e14ec2224fbeda8778bc9f67708076f4b

    SHA256

    d6e44e773a883b1500f1e91f7e178d1057607e37d94c5a3b273317d1a75f8a35

    SHA512

    bf8a44a4afb9a7011420cf4fd9275aec1bb4333a6f91702a5d111805066b1080db8f38a0803d09e0ad39a5d0eb46a22d46ccd2cf5c2ca2299b40f024cae906c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    045a8f0d36682e97719353c03d717bcf

    SHA1

    ce65f63b397c87470c0c9a84e0754e151e6ed613

    SHA256

    dea65f8e0af78f89c1e63f93bbc1e2fac45ea31c4469d97a479e88745c47b66f

    SHA512

    62cb7bd9ce1261a999f5db9bc43510c0fe16f784d5c094e51061d6d94ef0393beb93f60199a21aa4b32b253515e6b36465456e734c5fdf8c4dc5b83bab0691a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0d44c568f8846d2538cdca910fd2da5

    SHA1

    ef9ba67a308cb34890dc3c3a1918519257a22212

    SHA256

    8a019101ca6c6755f5f6139587c965374a60b90bee35951750128381e8ad3c94

    SHA512

    b5ad2b5e02bb1aafdd91963a1228e9638c45eed78959089e92382565183c2a54b725b12045973a3f6b140bfe878f7c713e1f87b9e38ff89fb4ff97a980fbe32f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7df28cf7478bb848f19597d4cffdb556

    SHA1

    70d9a156b943ca8a96122d731bc9fbe34c782eb2

    SHA256

    6e65c6293f3a7393916cbe6a8a712b5f51ce477ac3ec5ecdb6a035fd4e904509

    SHA512

    81ce054bba6e9b1fa679d6057b8ecca894852aa4f954077aaefbba0fd9cc9c7557e4b3434edf80a0ff8fc3c8bc38df75cb9f915b631b0b5ef9b94e8f6a9c1f72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    261a1b245aae0a37be760c226fd778d4

    SHA1

    4ef194f62c9f14ff925e4902cb28db93290bc20e

    SHA256

    cc8ca10f4ba08ddf89e36d52b7b39d2e0877cbd21d3a18fb784aa358752d189b

    SHA512

    5029e167f9f1fd33a3a429df7f98c9b3aa1e08a51dd68b99e99cf54470e942d73948a7a9f403496dc7909183d1c065d989a5cd0a740e27d8039c38f46ca6b83f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5341f380e64451d3dea5b42e8b6e8efe

    SHA1

    2f9b2a3c38b91e52fe131a82009c0ffe48ff1e21

    SHA256

    737cc2715e2293246e8f12d681aafcae06b936379b6d005d2945ff0f0f605e27

    SHA512

    12c1b7051d267c460a49e1b7a882dae3a8a96b62f5549db6d9c612a82c30f344cb8642143711ea5e2dd232e5a916580575033acfbd27d1d590f14fb4748677f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    919987d2555c1e90afe80303c7ad5e4a

    SHA1

    6ad8fec6c2be5942a541db10bf49210c8b2cef87

    SHA256

    c286b7098cddc61abcc5e5ec92b199d9bd78981534b8693558cdc933a0e8c224

    SHA512

    385df77e8359f3c74dd77929c9c81da350de24d92dec6c3eca6d8f8650667acef8267f2bbb63f5b2d41a87d646a87b48e4b2055b8a6e1d500851b54d9573447c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d3216ab708923c0d56f892dfde21257

    SHA1

    831659b9d744829cc2cfa7176ffbbc5a65a098fa

    SHA256

    8794c664ddf8c91b699caf28aa4211209bc5049d0508938e68ffce17659d942b

    SHA512

    e28045c4278f5577c70ed1ef34ad2f0cdaca1f3298de83e54641cc4960dda21a91c117afb67ecbff19daabd28cc4b0faace95157fb2d8692848fa0b212e98a36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0cfa96af0dbd374f6c65ae825ec3f9a

    SHA1

    13043b6f79b740b136188b2d08770aeefcd3d388

    SHA256

    65c0b184653ae4bf68c15bc32fccf4790263198fb61f6681c2392144d972d455

    SHA512

    8c8eb0422ae11a7dd46f82a47cec3296a671303a520ccc7efd5324c83a3480bcbec13645f9fffcbfac800917e637b3c3c45c1565f20da76afe30bcc587e44d07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4cf55a86a6de999f878607de2b2bd26b

    SHA1

    774c10b1bace5f7e5fdff15096d8feee4f6e1690

    SHA256

    7ee83fd50bfc5e0cf80c83dcd1e75da1aebd9f5d7bbcebc6857c3bdb92bb10d5

    SHA512

    b08de05df0bf3e7a42c1c75300bf09d478890041235e3f455009711fc0c79a1d48961fdb1fb16901ca3656b9ac4bfdee9cae48311d46d42dc75ab49248273931

  • C:\Users\Admin\AppData\Local\Temp\CabD9A0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDA4E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/340-2-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/340-9-0x000000007764F000-0x0000000077650000-memory.dmp

    Filesize

    4KB

  • memory/340-6-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/340-3-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/340-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/340-8-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/340-7-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/340-5-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/340-4-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/340-1-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/340-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB