Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 16:08

General

  • Target

    4304fa9555628a8c3148069e741a22d2_JaffaCakes118.html

  • Size

    158KB

  • MD5

    4304fa9555628a8c3148069e741a22d2

  • SHA1

    cce2ab9b4bf6d2106fd81c1a38f6e9add864c1e0

  • SHA256

    3d57c8b4289451e1280b35b3b5d8b06b62791f5cd3a79583d531312cd9d278f8

  • SHA512

    72e45d6f7b7c60c3f37a27e62467283a2672e61e1e2dde6ba585b14bb1f96944831df21f0d672fa9567790c2c6ff3df7f55d04b2d52dc75a28a7c2b38f203528

  • SSDEEP

    3072:iecyIXkhYxBsNQyfkMY+BES09JXAnyrZalI+YQ:iec3XkhgBsNNsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4304fa9555628a8c3148069e741a22d2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:268
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1396
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275478 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2464

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      51660fea4f03eafd53c6e64d01f24877

      SHA1

      aec9af48deb11ac68d7298a908cb7d86ce56c8cd

      SHA256

      bdc74eb0bdfebbf906a76efa757df37b775d870a24a9e65837f5545d0567e41e

      SHA512

      1006556d24c0ca5bad495f611651d02f3560daf19fa6a2db01ee7664d1ea677d6e8604369541488aeede79261faad59f93a95d6408cc81874831bfb27bf28f48

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      29a796a65031723770e97ca31e981bab

      SHA1

      e4876a88f83b30ed9a0d7304df44077f78538dff

      SHA256

      78cbcfcea6ade74eb9b9c33a02e08130b5e50c5e7708cfdc1c35bcbf99b48a59

      SHA512

      3a077345ee87014efaa411dadcdf6517afdfec432a9bbeb3440ffe0d1f1700b637461d8a73536dd04de2cb10f7bde7b6d66e8668a9dbd942024a3fb2bdb0c662

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9515d9991be658bf3c6e01e252e52f0c

      SHA1

      6263f1f988715280673e3d19edb83e3e68be1248

      SHA256

      61b61be603de16783c519663809ef645141f7f23a77d9929055d16c3ea0f61b8

      SHA512

      f80d0091b4e510b47b5e7d4ac0b77f8e2a898a66f3784c69b5021a8d0b9e99badac8de0c57916fd816ed9648c435c4015f4004ef48fb54a60c4593d2e41e5717

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ed2a3adffe1547f369ea6da0df95770a

      SHA1

      043be2ee1648a2c7214a6a697e179fc2a4ab3f46

      SHA256

      d3ca5b35c52538156d283708652a53777a534a7c27c6f1ad5784ad0220d2b01b

      SHA512

      bb983f29040c4f3fabdfd871bac3c9626f55f75164e25be9db73d7454652bfca5ce0781a3915eb5aa7ee35785b7c8d22a8fa627802e88fc2c37befaae654cf8a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      281d841db9ee5a8f77c3f0cedaf78abc

      SHA1

      1a5baef5be0ad701d68857fa02698a8fc11ef205

      SHA256

      869e884b46537cbbaa39e0b77ef9761fbe2fb36f3666b9397da81f6e1b5068b3

      SHA512

      2ec076d2112f0abe59ad54a770db8bf3d94f1a4fb64f3358243c3f02e44e353d06e64c25257589ad81d507f25300ad4a8d7907fbbf4abad7bbf6c8fdaa6f6a5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4c9e4fa64c3ffe7844e69421a920e454

      SHA1

      b7b3e7f7292cda9a73233b0789076849e8156bc9

      SHA256

      8c5d7f323200d38cc58ca2828bba96dd564e7aaecf22730ac3232ca3913c3b06

      SHA512

      4f3825ba2dd268c9af9b667b95d2abea54c38e2d8f9cf1a0e53f8f546d940250196b0a6925df34afd0689693a0fb3a7d0887aa723f7e87dd891d79a0dd41dc04

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      31ec49c86d904b710ef1306efbba653c

      SHA1

      cbe0f13090d6b9d017d7cd17e02990f121df096a

      SHA256

      fbe6844563ed1eb5f7c64b52c7125918789bf280d70a43f2ef485401b2139499

      SHA512

      8b8fe42ec379bee2824918b2e82619f4d61e090b69c869b6360099db614aa9c65b38342d06ab57f53cb1a09a7059fdf60258de98a4864d4ce880c3f44026f529

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1a70083882afbaabf8b7613be59afdd2

      SHA1

      81b371365b73b4d2fcdc05e2edb7aa6ccf3ee229

      SHA256

      efe552f7751e4435f80a5bfe4fb4bbc22d7a3bda7268d8ad96a669490730ae4f

      SHA512

      0c9b08a893d30081be843b45da74c822633acb2c13c45e723b8807ac5b3baae3e51d497acd9e10ae4d6ed2429bc988a68753e135eef5d1eb2348847ced35115a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c401766f6f0ad51205f167fe69c25622

      SHA1

      d0ff152d6a714d5d31a125063c07c7804100f63b

      SHA256

      d9a7f9fdff463a32624ffc0b332f293a842f2c4f01e6b91be6a2cdcb2d9a6377

      SHA512

      7a9ff46b3320bac5463cdc065da9f60472b10cc191c71570ea05c0c9ca02603b84d09675c6a2717d1ca5f3c5620b8d6f373037672b01bf3aadade60033ac895c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1be8820ceda26003578fc6413fcc37bd

      SHA1

      c7a2a63c552bb9f4ac4a87f7d7abf17602196f7e

      SHA256

      9022d7ff1351da1bbbd74cdbace2f9e9ed4928cb11f382dc2366332f74f866bb

      SHA512

      645b7ceb39bc691aeeacfc31a50f8e85926a1e5faaf5ccb74aad154355b24bd5e99ba68ea29747bf0d2091a4416db5f5b886d6eb56f4a0d56c7d1000fd939d08

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8536984be438e7456cbec30fadd6bef0

      SHA1

      0a8da9fa01961875fcc54cb8ff8057e03465d25f

      SHA256

      2380138d8371e7b41de9991a5378e84d3ed4e41c72a3f5c1aea74ec46c40aaaa

      SHA512

      db08389de50314e4cb3dd24f7c691cb3a4869b9308de950c0ddcadccd3e1e4b448b8b1c9eac2e55edaeb9211458869fe5450bf9fa697cd761c389fb2f2e18eb2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e273308b8ffa0171a48f7affbf8d8bd3

      SHA1

      45df40017546e37b90bcd1f395ec96c61e5806ca

      SHA256

      313ff321bf4061d2dffd8f88b95a337f61f232503911e635eb4f66bad48ac267

      SHA512

      b0d92985730cda7be937f0c686bdc829127b24037a1443d739ec580ef576a01be7dd1b3885c3a81f91b354640fcc9782e31388b820111efc159dc5ee83880f78

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      038733a74fb5a85aa19f24087a556415

      SHA1

      b9db9fa3b85998d550801cad28c8b7bb4714ebb3

      SHA256

      b9872df4c4bb290ce2dd0a6ef04fa1e2c1120cfc37364d1769b26ead0a981bcf

      SHA512

      9573ff3422c46f82a088f4df1acab587783adfcc81d36f5670d04e4d2960147e3b96be30e19941fcd0f3a565fd51ad98cbfa1f829f7dfa5253fc255f6be8e058

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0081c4a1bfce9ac902d59654a97a236a

      SHA1

      320d2fb7189407ff9830c58be628822c3aeef39e

      SHA256

      969f93790a04ffee426c44f324b7eda6de04f620cf44701cad62816c54e331e6

      SHA512

      b61a4a28b14d1c097599e2f36ac0a257fb3dae37cc3150fdc0174912ef2a77fc1f57fa895303b2e5e2d9541187aed2d36b5a74b19df3779d8232bb1bdd229426

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      017c4728ee87a7178a849007e745a525

      SHA1

      38046f8704bdd94d39aaffde7c79e3f57ece7df4

      SHA256

      ab02382fad2108356e2fff7bdc1cd773cd581557120610cc58524df3bb554a0b

      SHA512

      4136d1e89b320595563d6cd9ceb07d59d02e99e605ff866e5723d47d1214a7e11ef0ca14d591b37c85da5e233ab234ac3e3a3774de5877012b2f9cd22027bb4b

    • C:\Users\Admin\AppData\Local\Temp\CabEDF9.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarEE0C.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/268-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/268-448-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/268-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1716-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1716-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1716-439-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB