Analysis

  • max time kernel
    132s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 06:55

General

  • Target

    2cced1850ef2fdd8e28fe8a5c7698ca1_JaffaCakes118.html

  • Size

    160KB

  • MD5

    2cced1850ef2fdd8e28fe8a5c7698ca1

  • SHA1

    a531eefb96e0fb34d76474052de7cbdc7226040f

  • SHA256

    3124553a5a6f209f7fa05d5a6a64b08b1a8f8f3c94a0eb81a21d5e393f084bb1

  • SHA512

    f05bfeab34f1f9f71b5dba95ff6d4f2f7d458f372b901f91612222dc7dc9dc364bcaa412bb72c68f0bc8251d3e36ffb71cc2e790f80ebe2d3963028578e34914

  • SSDEEP

    1536:ilRTfoVjSuifmbaiN3nyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:iT2SuJVnyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cced1850ef2fdd8e28fe8a5c7698ca1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:592
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2356
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:406545 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5ea65bcdd9828c52925e0f25132410e2

      SHA1

      5d2b039dcd6bba7d41ae22fa16eb3225ca30defc

      SHA256

      1b3e0b9578471b88d18373ce2c04abb02381157f4e4281f98eba1146060f87f5

      SHA512

      43b5452a36844e2b1ee5dca8dce3246a91923baaf29eaa3b0d7de99a9732cbe9414d7e1af3743d60cd7c0c546aa61a90dc9a15d811682504ecd8b0407517b769

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f8669e5982dc1016c4d2d699576a3b2a

      SHA1

      75e59a9b640d96593b633e27dac4f9cb0f259a16

      SHA256

      5a4051245e2384a399b3a4018938bca75c2473a38403439585abde5f3a5dd726

      SHA512

      cc1bcc2e5fead00a4d2083458fee4a5ccd56a52211f92d6f64673c1fe28b71d71c4d5695f635aa7cd40e11c5e767bb45718391059519f668205d6ec22ccf476a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1d16fab5b6d26a02207a40b175a63d63

      SHA1

      46efd81a44919564a671d9c25d5caf164e90be37

      SHA256

      4c4753b22c7681d0548e734af5f49ece75b35c3c02fbe726a1965ca3a23e05d1

      SHA512

      71f07a5878abdde78b842ff11a428c19d76d77918340643a7d3aff9c9cc9d37483770e09bfd0d56df53f35092fc643c8b4c1919ad8a4365c9081220b42d20053

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5dd38c19f201cdecb51442946227dc79

      SHA1

      92b803dbf02d3bf5709527c52c7058eb2343299d

      SHA256

      4a59f48d1ceb54eb44ceb10c80858f3614d329a3e2eb40657584051de1f8fa2d

      SHA512

      8cf10ace2f7d90cc70c07bb2bdfc561807a2d9bcdb6d841a2755704a63f81f52c06aab710f27bee55ccfad48b2743739ec9c6e965f677ef4deecb9f997aece94

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      58e8add1cf64f32b09e36182e8c76218

      SHA1

      a7fa7e0216175f584ef0efcd88da6f0f8cb3b99a

      SHA256

      f536e05b6fe3f01a84dd1a04b6f641331f7eb8f05478e10c76ae5be09b64d631

      SHA512

      df462aa964b519318ef5736ed6c010b8c88e2c3bf2825d75e6b226d32bd2d04ce12f4bda44bc1c1acf86677076c6e8648db4ad9fdb15bd14491c7861d606d9f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      427b52e6c19a32661e50e727d867a2bd

      SHA1

      664077ee0316115df945f5bf13b358499ace44ad

      SHA256

      f1d8d1e95f1759536c8c20f354e13862659ce3e155919507184b5e91774254b3

      SHA512

      9e89e552d653d87a837f25a755d446f578c80523c6ac42878de3b2d7896ad02cf5a96bbd96500c05a7b69cd4b991a51ed40654fd2d105ed58aed580a32cdc655

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8a046e56f6b8ef36e4dcb8f0ae77deeb

      SHA1

      2e799590e00152754d739726c96160f968789751

      SHA256

      fac5eadf6567881be2c398fd1bbb4403a20df8056f4e212d70b8e621d4d28c44

      SHA512

      9f3ac4b95a643a9e30d212703f253bd7ccecb95fccafd3f2b310ebed2ac1d8320b73a580e7c042af9813905910c616966235115a99e858a47727e8241b749462

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7162f0654a1fcdc064e89285b8d1810c

      SHA1

      4fca673027b5ef8c1f4c92d2db24a86dedfc6cb0

      SHA256

      4c6185f998b59648593a9b14b83472744a393ed89e080e2cabf8729946c68ebd

      SHA512

      127d315966b33813602cec495121e0f0961f04903dc0ba5c1fa4b27c84a9a8ff5e5f95de59a910c95399e315f771ba7efa8b14654813fad6f6f6dc8c5aa30c16

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4a3bceac65c4c13a18c9726317b7262e

      SHA1

      2b5545f0255efa283aa8dad0e4d1cbb12d3e2937

      SHA256

      2a9c30b9ad60ff95aa2ebd2d0fb6d75ddf48d8d0955659426c49f1836fe85b09

      SHA512

      59c3528b6ac314f931c1ba1715ede293c31ab0217247766f5f1dc15dc1376f0398dffe1639dc71f7bd4b658a003af8198a423eb532ddabeeb8f9752d43cedf47

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      47b4061e95326d87f305731ea7c711f2

      SHA1

      e5b97d6c33c6f92c85709a156158caa5a69bb471

      SHA256

      0eeb1a26e316b4269f177e65a412fc0fa9d08c67751527a4be9a5990363bedd3

      SHA512

      fd23ce7ebcd434c8859012e8b0854544a56c820aaa1b966e7d41341109ac20859fd922c8345d1fd7c4a611f48eb60db140500462187003a3a4de873f3ecfec15

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      de62071489ebd835fa1e7f0c94ee5957

      SHA1

      7af08bc9d644427278ea02424d50d854e042e307

      SHA256

      404b5d1bf344c4348ce411fbc56fb0925d627115d7d0733d334b82a311403a16

      SHA512

      a538b1be5cc870a42d290f31d60d8c2944d1944d1174493b1a8788edb8a819e11f0238c56de0eeff307a2dd95979d0a541287fb4f1b805571384ecbeee432a2b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5d5cf63addd657ae5dd63c87f59b6803

      SHA1

      1ad2abf21fa1df5866f279d42fb1fea0225abaaf

      SHA256

      d04101a821971f58680da67699ac6cbabb3566f136f6c80c5108be1db08fcde1

      SHA512

      996d287ea3f17207ef66ddedacc668a4a9f3ce30848de842d08af8091ec2207bfec7e8ac7141870a46ab1186f22158ee7086a5853c6cbddce304d06d76357a18

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2371c3c80516b0d54e512ae7464774ac

      SHA1

      20cbcf8569c9fe33fe0f35ef237d8c439e971bfa

      SHA256

      a598f9596d941a373ae3d62852069e54ee57b00893c6d65ac74b312fe9d48382

      SHA512

      4d04d2b79b5bd8aecaeaa6a4bb04e5ff1b2ea0a102b1b8fff6c193af244a2fff9509e9fab61eacf7f906f74df93e0a4a344b1c66a63e3cf7234e4b9e286bc248

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      deebccfd2363f3482e11fa9f3cfc2edf

      SHA1

      0f81f9554110611c103e6a4c4883a335042a751d

      SHA256

      775a261eb796a2ce74029886b59a2cfb27640e52cc14eb6562cfd3138666876a

      SHA512

      699e1d56946b71230d273ba9229252827eb1d7b65235803ff88490505c568801f2b2067fbea0e0e3f76a7d9465cb5821fd64c36fff232b7e5ae1047a0fb5be85

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d0b88283983d9e3524fa2556fe766207

      SHA1

      1e92d1cbae1b644b5d8366fcea11e3af8ff782dc

      SHA256

      be49f732d522e5b28753e4184cff95ef95978495595441db17f9b5dc6595b315

      SHA512

      471aadaf90b1db85402cdf7ea7070ea2e5885cd8d747e24935d1138ffafc36c1f3041fc3348562745141e2899aae7394b037c207acf856ed867ebc418b7fdd26

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7452b910e8a9425630e2a83a370f501d

      SHA1

      60d09e1215d0d5055a5901bcb3d23ba0c9d80b1e

      SHA256

      868cf735b33b9aa06d68ce0cd4220047c5989263dc507c7bffaf8ff081c882be

      SHA512

      89ef75036ad90c556adc738ee9329a1bc392053767dadeeb2079dfc315833000da3b4f898665d2d219511cf95ab9b1cb9e92041857706e411e7d9f553b47c16b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ee9db0ff903c8cb2dc50a4adb13756e5

      SHA1

      eeec7c227d72bfe09a8a4f24d85e1503578db733

      SHA256

      90128c0ced4befec79cb6a631a4829b5cf4110576138ffd3113c9c6754dcc1f1

      SHA512

      ba0f454e54235d188e78a8aa8a9fd21845f49297b07c3cd43de9011ddf510ea61f99098c33faccdbd3103bd7f0c77c0c6a227cb9588094e6e87c73fef6889070

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6e56c25c2bbacca10138d3e1ddd08217

      SHA1

      e7279c23c258f01c5e5420b8bb43bd6271d185f3

      SHA256

      3af9493baa3db71a47f4d165bc72c201a741b081aa20e8117bb9b2e30f9dbd29

      SHA512

      495a1fcfe50cf25fde9e7a529924943afe406577e1985c0e03853b7d8a6565076a4c240609b8e3e4db51e86ca42e2a3a1cc81e56124dc2378939be04d15d1a6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      173b04a8ff2f03ded99dd097348071bd

      SHA1

      739b03bc5d9b6ded896f2727402ababfec0775f8

      SHA256

      b2d35b8657d3a6c4a8bfd03d35af46379a65d127df3a5f0ce277423bbc6a5d85

      SHA512

      da0753657dc7852801d335e6da30907b8e9b87e70765aacf0327495f8e6a53d2acf614a70bc015a6dbf3cdd4ec5c53e97c5368da6ad8f584f1c14312b4ca0e0f

    • C:\Users\Admin\AppData\Local\Temp\CabC0F1.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC151.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/592-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/592-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2360-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2360-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2360-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2360-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB