Analysis

  • max time kernel
    129s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 19:32

General

  • Target

    41ad3e97afef8fddeefc91c975ba3b5d_JaffaCakes118.html

  • Size

    158KB

  • MD5

    41ad3e97afef8fddeefc91c975ba3b5d

  • SHA1

    85b9bb28601ab055381afee416ba2239f59e238a

  • SHA256

    58484846dcd4255b6525daaaa205d0e7eb43f45497adc4dfeb1ae3ce1c5db35b

  • SHA512

    90fd313c909d652b371cf842bef2d6056c1644b12ea0578fbc4b8bc73c1d4bc1d72350d6a51eb022f1afce92383ee22b6827704915d61288312568d80619db66

  • SSDEEP

    1536:ijRTSYgVb/Ehm0yIyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:iNDhnyIyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41ad3e97afef8fddeefc91c975ba3b5d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:272
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1004
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:603146 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a6f19c490590c7e029b6790be391d7b7

      SHA1

      36ab0359b5e859c7e3a8bd63af97c62a32c26bf2

      SHA256

      0597302b64081eae499b9dfee777d17b9b03caea134658691e9bed01076c1fc3

      SHA512

      a9b455c93300893eda75ef08ca47effe73878365d4fa7b1665f5a41d92df300e179c43962d3f646165b3a8f1c3d326a90a1b45cd449c75c8be296cf0c45d31f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b51d5790e9f76c0d6d9780d1c055008e

      SHA1

      57250bfe44c930faa63cc94b1758755bb32555d8

      SHA256

      092ad10d3a63e5f1ebf0fbd7be900e4895bc9b6a4ac8eca35f04c523011ac63e

      SHA512

      392907300d0f675ec9bdc476d1df431834ee75aed91883f4e0372a0ee72048eb915b1902be733210c7de75f74ab53ae327e21e83664c475f8d5ecc787d25d11f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3098031482c6b144db261f2ee66f4190

      SHA1

      005d0ed89ce1ee16b1c026edd83b3823de828eec

      SHA256

      e5fa64dca52d2b401a4fdd25bf6c473b5f4a1820ea4aff399988831c9cfeb2ea

      SHA512

      9854434605a3e04e93dc6275b3711572cd12838b83c02c737564b91609177391432b6852b738569662313b5287acff5cb2cf1852d62646adecfda2dca4e06dcb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a59599796bbaad388cb436de35605c73

      SHA1

      a7829175fa2364e15913db4d9d7e98844676586a

      SHA256

      639e1fef7aa5fd32b56e521f2e3999d7683074e2d5b5c44c8dfe50a73db2f8af

      SHA512

      23a435ae56d69601c4f574bd3e938f50b60a03c0e25627b4804def3db35b888aedcedaba68fa5925a0aaf728e43862f7b383c6f94c3c009cec0050c4575d322a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2b028b43303af9a3fbe56391d3900383

      SHA1

      3a7fcd3cae62167108973a050aa904e0dcd9450e

      SHA256

      130a35da043e85cd6d588d3ebecc47d25372d4d9f6e59f03fb13d87ffbbcf6b4

      SHA512

      21307a2e846bc8ebacab603b0ed1c2f1ef78d243dc10fca89d6ebb94f41280ce1a9b35c78846c20d288fbbff9d31086f45aff142378f8c7dacb7b2a434551bc0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7410569699981bded164d164552e20ae

      SHA1

      20a03e4b84d03254cc2f68c019741078baa3e958

      SHA256

      a98b31628450e7e28571b3385564ba1435194ff08e4b0ebf29872b936a8278d4

      SHA512

      a37b2b5048c91eef882c4752133b16cb9c2cd233128ac23f6cff7688e6df06f708f85f2fa393d86f94b467070ae24c69743e22f28b77d0c2fc2e19cd0aed99c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3fcd3d5f616a7c23e38e0fbe496e2a97

      SHA1

      b19c472ee991ecb66b43ce7ed05e46bf5177b6e9

      SHA256

      9a525ffecf72c401c5659c22f3aecb1b565092e399ae0392d9ffb3cf6fc36396

      SHA512

      2a5e385a07d793a7eb00db46cbcbc4a632b956967915aaf2bcbcf8c358c180e365d54d164fb4f9ddcde3c863783b27c3566afe259ef5945b5d57d04d65817081

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8593166d80581788abcf1e0ac807af71

      SHA1

      b3aeccefb312149b1f4ee69f81721b7a3a39e17c

      SHA256

      9f0bf7622b24724b7c02e030bdd20cd8d7381ba91965accd9e0cbec6dbf6c48b

      SHA512

      932f31dd3d29d8ded1207a44fa92512ed5900fc1bf2001301a5ce590ff2161426037afd265240c474dd13854eb90a0b180a4358b0da9b5bd7109ba05dac2f583

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ad5adc6ba2047706c593549ea284de0b

      SHA1

      f9a27a1c62ed5844e70bec34a8a5704548d48aad

      SHA256

      03d63b0e4f9f9205444ff7eb8f9cbce65892b6b92901db48d28dcfa7d0ace192

      SHA512

      64372dcc1e569690de846305ddef9ed020d1a383ab71b3a1c0a9ed3d49f2227cda9f7854455f8c9eee094ada74cf33a55c45eb34f451312ae4a4b34cb9ef0960

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      55c6cd579f7a21a79e7cdf2b4fea5a05

      SHA1

      7cae0ce065499a9523fc36a893e06bcc939a4d2e

      SHA256

      b6352ce72c97df73bd6460c3353f2c148b3896c4d2fb8137d65a6a8571737f7c

      SHA512

      c5268447abca788088b84d7d999b039ef918ffbf2120123e443022127b8ddd0b7d66b3db289525c3928b8bb3157bca22da102a1af9dde219dd65bbd359a4d7f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0d4b53c8a65756cd102144fb168b1ccd

      SHA1

      1502632751794f35029c492ac9f2c2a63a031de0

      SHA256

      6663bf1bd1ca940f36e61eaf742731ae2040c4d7eca22c1cd17e207d1a20652e

      SHA512

      12686562a74327329f8f1adb066a922c4610a14a253b3321ee2f66078928f4f62530c9a8fff735fd90e2d15b1c5e764280c3cbac69df259fa69233011082914b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1fce161500aec5ce9118a75c26c3dc4c

      SHA1

      ec2c5d84041d583267be604d08dc2eebaf314817

      SHA256

      d469c59a3eb4d518fd2fcd92dfb4165ffc23b26af88ee9f747f203c213d3df80

      SHA512

      42b07736b6c37edb4251c263695ccfdc262dbb634d5a3fba1678ba2a91995f3f42c7bd470a3405a6c73148719fbfffe0e08d2fcaa27a3d24e3e863d54b5900ff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7efa21bfd1ff05f73c83be598dd0856a

      SHA1

      159faccf0aeb2c99447aa7390ac1bc84dcb06948

      SHA256

      5c07f641e0b67f5f444cf224f14d0af75983cde6cbaa22719eadc79c89dead88

      SHA512

      f66d2bc5a19015b00dbd31592c66a837e3a0ab340e620da5dc4a27cba2f16ba8b5be28fbb067052e08842590567965e71e4dcb7188aa8761259c8a1235c4c2d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b532293ace6059cef7ed8f8f1df175c3

      SHA1

      b381bf0bbee6c802c77c938c8c4841d2b6545c2d

      SHA256

      ed69f7bf64386b26217403f3b86722dd679e43f431d01c2464b15848be782c00

      SHA512

      2aeecfe09e7a82242ae2d51948266601adaaac93425b2dc03330dd38311e620a0f93acd7ee0224d16080563e4f9d41934d8047b35b78726822cdc6f0d2933b24

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      146d3924f10dd60feae3655134676bc2

      SHA1

      071895577aea3ce25c048d2ef442f6d85ed9189d

      SHA256

      5220ba541cea7f7678d26ff7a5ac2efa9fbeb215c43f7e2220ff1b36da6c6e0e

      SHA512

      e5788a9660abc3a1df3291601bcd3b7fc68bf286fa1eaa9a3e4ec69b59580436d3467c844e5b9b481a66dd4b2dcec0bc1360625a3ab885decee3caf85342b202

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      61f742f357961e66b2c1a0cce95d311d

      SHA1

      2f37ab626e1ca0709eb8985def9985f13f943976

      SHA256

      a239134573a0cd9dfd45877ab2c7fa439d5856c96d2b661f43875e4f72813b42

      SHA512

      9cfe0dc3269c4155a898ace45dc558aa0f30838d465c83ce09e4844878f61e513d31b303563576ff8fb8271e71fabc901b50ca5fd075e0928e9daae2a626ac58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eac9bbcb61eccd90207c7834a8d0da41

      SHA1

      ff80d9f5657c911a1cb39d5c81b0937831333a16

      SHA256

      a55261b4bff11fbc895487626d291606d915aa455d8e07aec242f8f2f0ed3c9d

      SHA512

      2f583e037094ab8c79859dca34eca02e8a3641989274aea8c814dcf22a103839cb75a2240ef59904d665fa1f9aaa472d4bfba32d6b9a8bbf7dfd6ff1ff570385

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9ccf8826863daf4ac4d801c2bf532d12

      SHA1

      9e3c7cf62c46ab042d25e5d595607a7515a998de

      SHA256

      0082c36f3c957fa1ec2d58fcc7bc91e5ac2ce98e54c7c4dc2f7395fb1ccc4e91

      SHA512

      81e55c3176d1c9c6c053e9e5704910be2379bb4e48f8937446a560b5d10fc94eb9d704bf951b31c6040bc6601a675f74ac032d21f569c64c21614c1a2df33ced

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fb56c9174d5b856ef7bb30e19f5282a2

      SHA1

      d0036a22d2818145bc9c64e6c81f232232bcc927

      SHA256

      e2bd30dff91cba5491372cc2c95e0425238cd67efeb08bd28acf1507800e1e38

      SHA512

      60a2e0f5c1d192d9dfa313e702649582253ed4ed010ccbed1b3e5c9e4d740cf4bdeef22387645a3b2a2e208753ca70d95fd6400fdb13cbc63c8afc1de871cc50

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      474dde952ad8e11d4ad5473f4de798ae

      SHA1

      94a8b891742da8794af363b6b2d6e08160ba664c

      SHA256

      2141311e4f79a81544e7c2da5859ff2d9fcd68553ef6b8d49511b8d7605c965e

      SHA512

      34175971695d96f1bf724f0d58d80cfbae113801fc0f14dbe1003070209d74d990e431e356e97b841f7e79329253fed57857895033905e4b8576ac6999dcd306

    • C:\Users\Admin\AppData\Local\Temp\Cab5CA2.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar5D04.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/272-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/272-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/272-437-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2012-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2012-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2012-446-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/2012-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2012-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB