Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 21:07

General

  • Target

    90a9cc28c721d5e69e56efb0cf2cf587_JaffaCakes118.html

  • Size

    159KB

  • MD5

    90a9cc28c721d5e69e56efb0cf2cf587

  • SHA1

    4c6b7af6d827edd43c9f586559c46f6461fad3e5

  • SHA256

    a6f7a494f2eca69b21123ab0f1fcfce65706b7548115b7887f7c857024e5c5ce

  • SHA512

    45041d7516a785fb0a6103f730e2fb53da555519fd6a2630fb11a375296998100d9e9a6d58317ffcc39ed6db9bd2f128f55d8f70da4cb56441527626c73cecd7

  • SSDEEP

    1536:i4RT3Ov61X0S9yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iyd1X9yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90a9cc28c721d5e69e56efb0cf2cf587_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1248
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:603144 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2320

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cc1ae998c5b0a8dece5b6a196eb3986a

      SHA1

      aca440c631402ae9cc3917cc89e0381504ff6724

      SHA256

      9212c2c50dcee1b54f12d6016b3ee978650e887aa5ba73f6b864e1b1467839ed

      SHA512

      19ea96ddd9e51688b083bacfa53199213d88632fe0123a0e9fe2c285498a273a28c1bab1f65f745b4036df2415b7369b7238d53038d056435feb0cd201d448cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4ad4e9e8745b83a9a1859019effbb633

      SHA1

      4bbcb7ec1ef614b1c6e61357be7871bcb260fe78

      SHA256

      a860d1133ac6054338171bb1bf96da2881499500d8ba1f70cf0be8d5539d4a50

      SHA512

      c39a9e37faab9af7dccafd41bc9036b01f75b1688590d03ddc9f39c63cb5bf04e6d7c474ec2b27de34352da2739ca5338613741a21ba2ecc6f4f6d30bd29ba83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      da56ff8e3d29bb81093f17ab7758b5c6

      SHA1

      4ee61c8dca23895079f4f8c42ac2e515694c93f6

      SHA256

      9ce8128f170601a76ec65165f70cee3c94f91f3c6a354c905c3b4a7b636f81a0

      SHA512

      730e8e78f5d7302b2fdf47742f6138319bb8d7c6619e85c5275a309edf47df264ee5238443f25e8b8572b0754e904588f829f76acb6370258ba3e61abe4f5b8f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c1dd41947b5dbdfaf712005031ff4e4

      SHA1

      e61e1a1823558f64278e2e52ad78df4ba091bb79

      SHA256

      84b0ddcaf226c87a0bdd35df830cdfbddce6d9bf78ea3c536c168d834af53a76

      SHA512

      20a124ee910d2c560d3181cffadc3212c0f3ba65c47e0f175882cb4ea008f22e82fc75f46c3a6b02331cdd09a3ac0a6e7418603127e2f4674bdfc3cbd92c068c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      110bb31d36191228c01771843ca12cbb

      SHA1

      29c38870927ef174876c744e97cf0309014c070a

      SHA256

      4d7d6dfce7bf5c38785bab6cfd0f13339915d7cfa28c3e7dff56d42ff3fa6aaa

      SHA512

      cbfb367564f40c8ede0fbc534bd75c7d2700ef29c734cb310767e5a09a76f671aae461de8ef37bdda93a87b9231a89abb0382ff6d2c2acf8076e5963312285e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ec654af34012ed5e698d8007f92ead1d

      SHA1

      e907e3889e896d84fc373947d24e5fde79cb68fd

      SHA256

      7daccd338098c20070264232e0d8370f7505d35e79e9c16ac570875552e9ea5c

      SHA512

      7cc7dcca53deac4a772868519398e3af1599285d4c7c581f8053d6479dd4a351089ae386bd02de85f9c81398873be31fe64b3f186a9e12cb8091e5d73ff91d6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      299636badc9d31d70a630583c00dafa1

      SHA1

      69dbf757f1ac1d14715387510405c19ba402ab11

      SHA256

      d1d28d1b546b9820bafae725caed299f76f434e1f76627e93d5dca78f7461a77

      SHA512

      a41096c1e47d06e8602ece971074cdc478980b19ac0cae9a94fbe4aaa381bcbaece46bdaadbabb5a394501bf4d9e87a15fee11de75cecae17e797bb8ded85e42

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5284b6e9f38ee17363e3b60a1257251d

      SHA1

      902f2a13fd19f4192c863f16f1374bc90eba8b3f

      SHA256

      6aa4c8be6c023e060bb3f8b034b41c2dcf3eef6f62f485e779c9cfdf42e021cd

      SHA512

      6979f1297b0a8ced105caeffa067420422154dda5deea9ebfb025917c4b0d5925c8f589fb0658afba8441f53958dfe58b20d9ec6eb6b82943439456d13a21fe5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f2a226476d54c56717bc1a4cbf7d5e11

      SHA1

      aa06aac6b476544d1b3511b1c99c402efdbd50ac

      SHA256

      1037f0b5953497bba9375e552b367a82ddcf022bdab051e8a710561e99f6b158

      SHA512

      e804f74417f7ca6c0acd0dec27f6551d0be612ef15af8dc4bdaa3d64b6f742945426c5619787d70b8e89d8d9dbedc60474fd24de24f74236f8b56ad21280671a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      422c5198524f7b5aabb49ec810d9ccf5

      SHA1

      c29148c95d8bc799cb6de77bb7a7acfcc209833a

      SHA256

      e5e198b7b78f37c9deb55d2732377a2ad23daae8fc87fbbd50361c10551c08b1

      SHA512

      b8184ec74d22e8677da03affcd4a06859045232f7675e707304e28b0fe3454caaf9d2903231b7d428092a47272f3156059a83647197d98e8932f5b2525e74bb3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      571d56c23ffe6f4b0474800442b087c0

      SHA1

      adfe8812f18e795aba3bbd972c908a56592415b4

      SHA256

      86c3c0b266a5195a232d746ad0d4ab394b1f55f2d7f37c69ea23fad58046cfad

      SHA512

      f3302c0c146aeed98ae9de305098be6139eb5ed152b6348d14b7e5cae22e5747331099acfccfb16e706eded080eee2d5c81648a4e511cd7485be019d1d19d4e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      807c314663b32dfae47472229fe045a5

      SHA1

      65011151d5dd44e0c18b1e8b8fd84305db6a7f65

      SHA256

      9e024455d481575e88eb80877d1a82f02bfdc35cb1fa98d76300380254e196c7

      SHA512

      566d3930e429202d20f9cca08c0c1dee6731365add4e787c402f5235449d4654d49a5de38effcc6d38f409a52a4841be98eab07b87b5d35290539a850abe7c3f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      222a070ebf921818f0cff59d12b79b2c

      SHA1

      df3410966b0720fbd7e08fde7fd181fce3d5ab14

      SHA256

      f3951411f56fa8e72be08d9c212dbbc11adc46b19f601744b09a90fddba0f89f

      SHA512

      c5ff0cfffe7794faedcbb24aa101c7f83648cbd35a2ae1907c36c41c6044f8f0ae8be77f31908bdd1e34b9232c834c7a605a0f949f1f4c245b689251b0a6008f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5be2f6df42dc93f848605a9eea81024d

      SHA1

      552d7bf89829a89e6c7b62297fe6b15ada851662

      SHA256

      67210b2e5abd28d65894073c0cfb6addb275526d70d09c7b245d29972dc5ba98

      SHA512

      388eb61dfb6e741bf6f08f5183c34c501866fd56c650172e2aeb3e5d1d6bcb7a119a6fd622f6352b9521425431bebb3cd4dd010b71abfc08194c9ee1ae425192

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      738e646a8d32b34f17e90c2c8886cfe1

      SHA1

      558a3837c8e67cee849e01d1413901c4bc164a45

      SHA256

      6aac7c571db9d12c53010ec1273f3f9af45daf034c16a4f565873c669b6a709d

      SHA512

      b7ad78036c26d10d39b4b87a3553afd54739941b615c8c7d44a08703105175e8aeba99132e25f2b2290913ad98adc00539d8af653d791eb75825fa072ce80ef7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3e3dfbdcbaa43b61fb0715f9c7fbbe33

      SHA1

      bb4aafb07f581208eaf828e6f166f9d04764b142

      SHA256

      1998b80fad252d0d86fb0182e864b0c1907a9444022c0e3712f33c867f1578e6

      SHA512

      171d90c6d6ef60e0c572e7e172642be48d1fe6cf5ec00b4d040fc1d0a05efc935cc041819f7597c6d6124e63cc6cb43bcd57ee8d03ce48f0f906b05d99a4743e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      25d2f1079e4303bc8f2a58d876edba3a

      SHA1

      38ecee22d9073ab40ce9926bc5ae3f610c328f30

      SHA256

      f1ae55591d3c0e69df3425e289446de75c2b5f033858cb40db15835c473a8caf

      SHA512

      1829636f4c077041a655c4069445dbc9118730d98bdc29589a9eedd4033939265b0055a1cf025fb3044b871cdae00735cdd070ed5a9313c74e68deff4410a19f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b810004ce676ea410c8f0ec542483778

      SHA1

      48c66adfc266bef2974d80b4ee5b1a39f94c0946

      SHA256

      18f76986ea61d58f61161160906b54383cc124d23c152f855ed1a7b0ed83159d

      SHA512

      89930564e5f53ae0fa5692a3c46c6032add748e5f18349e44e7a79b0e2597e38ff7ca8cd3fffe6d73c21c0986b616c28e0badbac0692a42232ee2063454ef2c9

    • C:\Users\Admin\AppData\Local\Temp\Cab55C0.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar568E.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1248-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1248-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1248-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1248-446-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/1248-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3064-435-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3064-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB