Analysis

  • max time kernel
    135s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 07:41

General

  • Target

    5639a6862bee4bfd08d5d70c559a0f7e_JaffaCakes118.html

  • Size

    160KB

  • MD5

    5639a6862bee4bfd08d5d70c559a0f7e

  • SHA1

    b7bd233adc07049740d850333bc5e8492c71b01d

  • SHA256

    18a5b8f37cfedfe63dbfbd7369d8ea0b8eb5ab51a341dcacba79cab67797090d

  • SHA512

    3a1f7e731d857a3c8b485b691cc466a7de6c04f37af4739ed81383c503a65d182a2a3003081b59b95d290cdb0e08f2a223bfba81d76b8db7c9c4989a7dfe2139

  • SSDEEP

    3072:iqxNxzX/4yfkMY+BES09JXAnyrZalI+YQ:i23zX/1sMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5639a6862bee4bfd08d5d70c559a0f7e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:820
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:406539 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      54b606ac6ddf8ae4e964cd7bee468f88

      SHA1

      9ff441898f2eca07dca09c64fc882cd84b00edb2

      SHA256

      9c45a1ad3b81caf198b84273d4a5235a1dab641a23e8728d8427a21e7a0fc5e4

      SHA512

      adbeaa3ff83407fc2e06907c1d8a58b3f76acad9b382b56f02e0f25e7728e18d92beec59d3662ef8d3ce88c61d6958a4f75a3bd8ac40ac32a51b0f5c0ace4a0e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b6b76a2b2479ef2b15e0a58cafe140af

      SHA1

      f266c73b711fc90489d5b409a791619aa9f55a88

      SHA256

      3db512031b3219aac8a446ad395f6369fbd8cb406f196fa54f39ae3cb9e4bf6a

      SHA512

      5c692b4127eea0db39350f9ee2073e505a0122a092af6e9cc62ed9f1f9ef8d3dee42ff89fdc639337ef5aaff36214f03147821cb9c348e0a8f5af4515b2a1d85

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b969459ae8aaf3683af8be85f545432f

      SHA1

      5917f9b35e2dcdc912cc06f90aa05998d3a74d9d

      SHA256

      ff0252aa5447f4aa732b6c5c0c2dac71664861115d8cb62a9dec1caee95c1254

      SHA512

      f4be26486e5700f0314a0e53dd02c06f5d1673f83fff0e1dffff0a8348ac72dcf03bcede2706f937d6ee347a9d26f68b04a5d4c8b734a2e8599d6b53bada354d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d15c6ca1b2051519b446e6a0cb4d98ea

      SHA1

      d720f3a57e254c9afe011466b8a12bc8db7e73a6

      SHA256

      64d6bc9fa7f64d12a07927d563889b23ca351ff781c0b3597fbdd0f3b84e087f

      SHA512

      9e51fbc635c6021bddb30ade409abc8d354498cf527bc2aa95052f0c7e09af0a15552fa6a635078c59ab8ddcab3d7125917b9ab2757c89f87915973841b17b1e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5df5d8bc6776863167db94678a2aa256

      SHA1

      6dff0b3141f10308930335d1e060eeb06e4e47e8

      SHA256

      117b6d999c319616dfb5f18c8a402f0d34dca8b514d1656cdf94fea878819124

      SHA512

      2561b58b0665f9cb6297da7e589808402b9238dcf3ea6dd1bf72ed8b67fc8959fce12f766e5891fd1868d49c8640e59bd1f8eb1553dfbe96778585f1dd2ca591

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7f0c618652f76cade83226b27d93869a

      SHA1

      dd5e5a4043d861ff811b8e9768394fd2fa342e92

      SHA256

      d00cffc5263ba45e94b13fd307cb3d80e5fa905c72606640964b4c69fabcd850

      SHA512

      aebde89a998005786c3b7f0278e9fb7a524ed7a9a9676dbe175a7da82e6ddf66c88a60f590cab063ba28d4de0021120647b5db49adb0fd54361cdf582104a5a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a646ad9920d63e3921c74e0509ed9504

      SHA1

      e4db19cfcf839a8065d5f1ae9ec5857477584bf2

      SHA256

      c680d328b230b912542b7ffd287dcbe63ace5240d5ccaf05353dd60d0255ef37

      SHA512

      5c38445dd9fee7851352672255d84b1f81698f4844af50ac87aa644a16855a0e14d35e3a50afb9bd1f0f00cdb1035c1b00d4217a5548633a5a7883d36ae55542

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8c5b17f09b23ba722447f9f516512664

      SHA1

      4d2df267a570b8aa2f062b8ccca783424ca19add

      SHA256

      517c4595c144da815d7b44bd886cb9b25e6b1c49c9fc9266e17ffb5b94eaa12f

      SHA512

      4c20ea11e753f3d0ba555265ec3f18febf5e2ac59dbd6c72c1bc0b6fb2974ce62730a606b19823698df46ebd39f3f02c38c8886ae19e58d6a1614aa5ca759d57

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      66e301fe7ce5fc81af71e8661db98f53

      SHA1

      659f3bb295980d562e4ab332ebac5be4682153d5

      SHA256

      bfe32b2b93cdfa2f510b18933253d49f31c0ac21e5761d4da1ff1e0631a597f4

      SHA512

      518fb7643208bcd64331c4f5776e34a55fdd65646686a98889c82d1bb9119405ef8364b7d1bfd6c0dca3d1bc4aa59947f1ede8f2165f73740e21589e6ec50e4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      36355a4166660e8b10e965c482828783

      SHA1

      e97bdc39f6e410ebe2701ede69714f633746e008

      SHA256

      e1ecc671700b5bdba4ad934487399065a143b5f75cabffe19511c8dbeeab594d

      SHA512

      0c5aab2338f9dc8bbb9499b8c0e8769b57604dabfbdbe23609602bfe669f6f5bedff8bff6632a2cd53629aaa96ee8e3aba4651dc34a14888ad167e2f068b058a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      254ed4914c027837a60fdd6dbdd24c5a

      SHA1

      aaa40e8135c99fcc7cf4fcea67351a3a5a5c3fe6

      SHA256

      e094e8f461990a7e33530c181338cdc0e5ac11ed507053fbb477415768e74088

      SHA512

      6bbcfc784b8c3d151f727b07c9c87319d4665269adcc68e6067d5fd3b246076249480e28abde65fe3d216086eb050c41212f85524bb16e33c62aa28f6ef5b764

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      36b2fec71f3f6b51c6897f19990e91f7

      SHA1

      21f35fb84d98976d58894a6ab7bb4da4512f4e59

      SHA256

      30ca05b2c5c5fa5e209cccae7f71d63fa711e733cd90a165fd0b35de8667dcaa

      SHA512

      a8de1ba985372a3018342e5359d7e2389ee6b348f5e2795e022fad81a3010f1e141f6764ebd804b6760e59c20d0e8e5661395cc0936852c1cd2e9b8d7f8bfaca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      35677702ca7c4f294d0e0cbdb47716cd

      SHA1

      2b2294e7439c21c4f493b53ba15952277a93d244

      SHA256

      11a1fde01b3a88772edffcfaf9d185b2f59d92784742ba4850a42bdeab97bbe5

      SHA512

      5e4e6b7c327908f6352e98ddfbb7319423ed58a70cc8b97fa7e52a347b13ecf129d65b78563f86734028be3e476c326e15d8b6feebc6eccdfecd8681b73f04e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b0996ab9820af6039907c149f4e9b612

      SHA1

      d22f10867087da40256da49bdd29ff5f0362e78a

      SHA256

      602a10924fa3ec3aa5bdabd5e944d0bf8f133b2133ee03a02621f3ef58a174c7

      SHA512

      1ed93153d8f46faa2319c528a2f38e7c5c7e95dbd6c36cbb48463f0f5b41acd359748f593d3ae71d78116f54982172b0a501feec6d5dcc450c48ca0255ee1144

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      350ba9da351537ecd25cd586e365c21b

      SHA1

      cb5c1d23e442011250ba2cd4fde66fc9fb3716f9

      SHA256

      e53c08ea60757aa1b82618ea50c4534764a6036076e89936d6ddb865f773fd5e

      SHA512

      55f8776c1b3a3e50d3b1dbda2e8ee87ca1957133afe92d5d5b7f4499329ccad15bca7211ae1d3534ee12d00876f81391078b7b108405cdcc61078c41136f75cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8d90becb22cc20b9d5eaea06c8f7d369

      SHA1

      87322769638dd32a1001d06f19d166249b2e7b2a

      SHA256

      b4ede8218b8dd21625c58d414cbbf1f189e9a62d415a51e0095da95b4b07c9bf

      SHA512

      f39f9e60c79375cd1af3e21990350b8a424210a08bdfbd620b6e314c8f6b9b56ac609f17a6e67b6f3a9a85ada42ce55b09bb03f87dd28ae2c1ede6913a67149c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b8b01e29e8fd856a4216544e20cb760a

      SHA1

      81a2631992fbbde8c10dd4b1ebe5130186bb73e0

      SHA256

      d4d9d40e5dafe725723c334a14a449c92d99f3abd9ea8849c41992b58c9c144e

      SHA512

      f55f1d54ad03e7cededf07d72a26579f37d61bccfdfab9458bc0b7007f177649d4dc20df3a2b82022fb46fe7faa735eb8fd11637d215ff440cb4b40fd61d208f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b17697cbcd1dcc668f0a73a5f99bb448

      SHA1

      812eee94b3d57993fff49d8a6d68072f26727b29

      SHA256

      cfe3fd37f8e7179e5bc122d7aa90758c6ab859f34986c4dd7b9513e4e7b39af8

      SHA512

      391f835ee0d2e4d7071a1c30375f30d721f99c6e0d61c98c403aa84918261ca07415a8bc43ae5899b94496102f7881e45bf764f7507147597888a849cf50a19c

    • C:\Users\Admin\AppData\Local\Temp\CabD0C9.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarD197.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2436-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2436-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2436-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2540-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2540-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2540-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2540-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2540-448-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB