Analysis

  • max time kernel
    132s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 11:09

General

  • Target

    571bb759a2c2001664164c6e58821597_JaffaCakes118.html

  • Size

    530KB

  • MD5

    571bb759a2c2001664164c6e58821597

  • SHA1

    75ea77eb34d5aedf4d1b62a9ec87ee597d2f5d3b

  • SHA256

    c99f3b18187acf5824c4b6aff898c9943efe78c6a36119f0fdfafefa599be1d0

  • SHA512

    4669c39475acc73c96fe0ef39e0e9e713725feae6d1d24dfddc6b2369192239fa3968fb09f0d025b387754e4903060c5e9b6568bc53a3506afdbb275aa63ced6

  • SSDEEP

    6144:S5sMYod+X3oI+Y7meFek2sMYod+X3oI+Y7meFeklsMYod+X3oI+Y7meFekw:g5d+X30eA5d+X30el5d+X30eE

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:380
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:472
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:596
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                4⤵
                  PID:1312
                • C:\Windows\system32\wbem\wmiprvse.exe
                  C:\Windows\system32\wbem\wmiprvse.exe
                  4⤵
                    PID:1744
                  • C:\Windows\system32\wbem\wmiprvse.exe
                    C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                    4⤵
                      PID:2284
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k RPCSS
                    3⤵
                      PID:672
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                      3⤵
                        PID:744
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                        3⤵
                          PID:820
                          • C:\Windows\system32\Dwm.exe
                            "C:\Windows\system32\Dwm.exe"
                            4⤵
                              PID:1164
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs
                            3⤵
                              PID:864
                              • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
                                wmiadap.exe /F /T /R
                                4⤵
                                  PID:2228
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService
                                3⤵
                                  PID:972
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k NetworkService
                                  3⤵
                                    PID:236
                                  • C:\Windows\System32\spoolsv.exe
                                    C:\Windows\System32\spoolsv.exe
                                    3⤵
                                      PID:344
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                      3⤵
                                        PID:1064
                                      • C:\Windows\system32\taskhost.exe
                                        "taskhost.exe"
                                        3⤵
                                          PID:1104
                                        • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                          "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                          3⤵
                                            PID:1612
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                            3⤵
                                              PID:2156
                                            • C:\Windows\system32\sppsvc.exe
                                              C:\Windows\system32\sppsvc.exe
                                              3⤵
                                                PID:2472
                                            • C:\Windows\system32\lsass.exe
                                              C:\Windows\system32\lsass.exe
                                              2⤵
                                                PID:488
                                              • C:\Windows\system32\lsm.exe
                                                C:\Windows\system32\lsm.exe
                                                2⤵
                                                  PID:496
                                              • C:\Windows\system32\csrss.exe
                                                %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                                1⤵
                                                  PID:392
                                                • C:\Windows\system32\winlogon.exe
                                                  winlogon.exe
                                                  1⤵
                                                    PID:428
                                                  • C:\Windows\Explorer.EXE
                                                    C:\Windows\Explorer.EXE
                                                    1⤵
                                                      PID:1192
                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\571bb759a2c2001664164c6e58821597_JaffaCakes118.html
                                                        2⤵
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SetWindowsHookEx
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2532
                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:2
                                                          3⤵
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies Internet Explorer settings
                                                          • Suspicious use of SetWindowsHookEx
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2352
                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Drops file in Program Files directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious behavior: MapViewOfSection
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2888
                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:340994 /prefetch:2
                                                          3⤵
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies Internet Explorer settings
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:944
                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Drops file in Program Files directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious behavior: MapViewOfSection
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2500
                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275470 /prefetch:2
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies Internet Explorer settings
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1804
                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:209935 /prefetch:2
                                                          3⤵
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies Internet Explorer settings
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2748
                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Drops file in Program Files directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious behavior: MapViewOfSection
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2640
                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:406535 /prefetch:2
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies Internet Explorer settings
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2976

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      342B

                                                      MD5

                                                      9ace647e9d882b0501b357dfdf0d0bd6

                                                      SHA1

                                                      3aebfce474ba70eb8714763176b45f1ac3b4ac29

                                                      SHA256

                                                      d7c18e77e09163034aa9bfe5778e9171305b344cf956d6e394de49f9c606eb14

                                                      SHA512

                                                      fe10c7f47a5294b780fd5f6a067e5804f063678d95cf1f220fd5874f98d2a1dd5613f6f1ffeab52e9e29710b066c378120109542049fd1ed222d5c8f48812ae8

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      342B

                                                      MD5

                                                      a5f3c0e70a915190455d2d239a66e5ba

                                                      SHA1

                                                      b231ff38be741545ced4a338d919bc9fa9bd3ec0

                                                      SHA256

                                                      dca6673a23ae9fd8f623f875ef34d9ed7c70eef489f2bc100fee6577a996fd01

                                                      SHA512

                                                      a91749530bc04c6793286586a61f405779f7c6e906a16791e534574c11d01fd59b023f41e0492b9147e7e6ec84cb803766854378f48c70ceb68f68fc706ddd6e

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      342B

                                                      MD5

                                                      25799ef850789aad9df5b75883969151

                                                      SHA1

                                                      61131ff0e5c616fb988b43a398ec3e4dc79d9db5

                                                      SHA256

                                                      c5f5a758bace5213c303e3de4eaff9c42ff45ee4e37fa1d54206fc9844ebdd53

                                                      SHA512

                                                      6eb1315d7db3846be6f5ae1efacb498230823d4da06001d6830ad2cd4e2cb4fb0acd162d2ae570662bed81becb974562103126bfaf32348a70d5350d9a86eeac

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      342B

                                                      MD5

                                                      f8843327976b4a1260bda5541483718a

                                                      SHA1

                                                      dbb1490651ea93648e882a9d9cd7a1451a86517e

                                                      SHA256

                                                      b19e83d20d0c4a8c93ed40f6954e193add2a02079741e2d51b2dec1da0585ed2

                                                      SHA512

                                                      1b7a1927dc45ed6d15946d7a66e6634062f51dfb874c2c1f659bd6fdaa4f085f8cd7292e2561326375cff02f75f7a274f0123a9904bcb6cd29adf9b96068ab57

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      342B

                                                      MD5

                                                      f781fc91602ec83f92ce48ce2be13283

                                                      SHA1

                                                      a3f6a96d6740eb5c2a85d6d396a3b019bcd7e9a6

                                                      SHA256

                                                      6b65ab02799c1230bd2170e019f3292cec27caba0cc40828d22416e1acd61e9b

                                                      SHA512

                                                      ff60355a102ea410d27543d21d4774ab902e0fc08def15811ee7895430939ce731789582084091f455ed2a2a71a26e57b898f8be8d3323c6d081d901c119c007

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      342B

                                                      MD5

                                                      b2a72e02c49e1390ddfecf851dba965e

                                                      SHA1

                                                      0cf8bcd729b57b045e51c4f7e61659e08b62d273

                                                      SHA256

                                                      33194bbe332cb8c5a85a2885cff985da42cd6ce842af58e748a7d6a72244c28b

                                                      SHA512

                                                      46bdbcf46a2cbff9dc06075f9921f8028645b87e768a3c223a664fc0b852de466f545309930b9e40a43d0a786d58ad9ebff45299c398f8ebe8925eb6401f20c5

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      342B

                                                      MD5

                                                      292f2b802822d67a030d4bbd3314098d

                                                      SHA1

                                                      4ad2607afb6c28f4017c362972798177e60b9558

                                                      SHA256

                                                      f77325b5cded76ef7108436c782b7acd534cc471c0dd07b4df7409be1775a0d9

                                                      SHA512

                                                      5f659ac9f843cca11645c26e52e75870ba99b4768632399401a30c122cd2afd92ac0f020e377ffdcb57bd40f8ca9ee22bc5037fb401f4743057c3ac407b6a05b

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      342B

                                                      MD5

                                                      560fb54be7cf5128224038ba04332a7a

                                                      SHA1

                                                      3831467b1f22856ddb5a1df71c28a6803061054c

                                                      SHA256

                                                      19f4d9f85c66312f40bbe995b3b15e3a8432cf288e0077049b41f508e670c630

                                                      SHA512

                                                      ed61ed90734175069491543252c3747fa589361eb59884db39478b8f27fee78893cb4149d7f590a790ea906a00d7f3db2b252463162680bc59969e1604bb7b82

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\index_20[1].jpg

                                                      Filesize

                                                      17KB

                                                      MD5

                                                      ecfe9fb573b900bcc1a2eafe37a184af

                                                      SHA1

                                                      eade61e73958b0174af89a4079bbaeffbc810e18

                                                      SHA256

                                                      4076f5cf538dee912bf3bd62a5c8769f2a1f5c9a2805ea13bd0160ef0e9ad30d

                                                      SHA512

                                                      7b3d3ac28faeb3f06e2e2e861a3bccc9fc7c79f1f15afdb175a741d0e3b82bdf63f37aaa57f0b16b10d035c08dd15fc94400c72e0c86aebfd00a2300396d8598

                                                    • C:\Users\Admin\AppData\Local\Temp\CabCE86.tmp

                                                      Filesize

                                                      70KB

                                                      MD5

                                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                                      SHA1

                                                      1723be06719828dda65ad804298d0431f6aff976

                                                      SHA256

                                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                      SHA512

                                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                    • C:\Users\Admin\AppData\Local\Temp\TarCF36.tmp

                                                      Filesize

                                                      181KB

                                                      MD5

                                                      4ea6026cf93ec6338144661bf1202cd1

                                                      SHA1

                                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                                      SHA256

                                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                      SHA512

                                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                    • C:\Users\Admin\AppData\Local\Temp\~DFEA7DA01FB331F3DC.TMP

                                                      Filesize

                                                      16KB

                                                      MD5

                                                      54612e3857d38bbc60c5320485b93116

                                                      SHA1

                                                      15a31e7bd6bf03f6b040a37d48e58f5f72b338f7

                                                      SHA256

                                                      621305af4d30aac249483d27fe64905288e641eca33d0ebf9959f01f68d1205f

                                                      SHA512

                                                      864cbc60bf6d356a44d3f61e9d0b703a2a9ab20e7818b53b5375a0040246b6697c17395d9c23df56d1ac68c5ab204dcfbd1124fdf5465cefa6bf95c4ea42548a

                                                    • \Users\Admin\AppData\Local\Temp\svchost.exe

                                                      Filesize

                                                      84KB

                                                      MD5

                                                      bee6f1f011766a1f40f0318adc585640

                                                      SHA1

                                                      f9452d74dad86e1dd38108965e40585ff8ef7951

                                                      SHA256

                                                      c8f1baab39b7c77de4504ce7f758ef46c0659e01f6af6922d1a4518687aa6ec9

                                                      SHA512

                                                      13714e5ab6d7da1ab4faa85b4c9801866ffa89f5b39aa053a03aeb13d4adbad4d9bc518f5586a18bb0bc7723f0e6168940ed70d7d6cf71d82120135fe0d51bd3

                                                    • memory/2888-6-0x0000000000400000-0x0000000000436000-memory.dmp

                                                      Filesize

                                                      216KB

                                                    • memory/2888-8-0x000000007713F000-0x0000000077140000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2888-9-0x0000000077140000-0x0000000077141000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2888-13-0x0000000000400000-0x0000000000436000-memory.dmp

                                                      Filesize

                                                      216KB

                                                    • memory/2888-10-0x0000000000280000-0x000000000028F000-memory.dmp

                                                      Filesize

                                                      60KB