Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 00:04

General

  • Target

    91716f55df52b4abff3e7b1f0999c510_JaffaCakes118.html

  • Size

    158KB

  • MD5

    91716f55df52b4abff3e7b1f0999c510

  • SHA1

    aaaa17188a78f66089bef1efd22b0c9cfc2ec276

  • SHA256

    88691d1ff06f716d8165dabec44053951d821dab0735bda315930270cbb6735b

  • SHA512

    e883de62fa157221e0073a2b597508c0e37d1b382d834507938f2df5665236aec14eb053314f2b137c58d097bdee82520786f76904074a39aeca6d85540cd577

  • SSDEEP

    3072:i1D6W8anrLyfkMY+BES09JXAnyrZalI+YQ:i16W8anrusMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91716f55df52b4abff3e7b1f0999c510_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1036 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2376
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2396
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1672
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1036 CREDAT:537615 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      32391165fbc0da49099ff5c424d751cf

      SHA1

      9fbdf926be9ad619e9bf4bbfdbaf9c5bcb12404a

      SHA256

      f9fc07c0387c17b0f58ddf066f4ec18680747e7f6471ba848dbf6a6925ac062a

      SHA512

      4d5663cd90eef8b7165def3ad8acd9f1bd53b816aec814adb8ed7033d8be9c5641351fa28a441685af08b07e44e39626f28aa6ceadc2c421a56c125f2f407a3a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5017804b9486fe79f85f227dc01abd1f

      SHA1

      11ceeff36e504410c1a396e8636d83ca8610151d

      SHA256

      7d751a48049c72d55252fe18bef82bbeb984ce404f6cf3e072d9c293c52ebf08

      SHA512

      5a1aff46e6fa9577cb2bb1bb1d960364f6ff884be595f14fbea8536f8955e255488baf263a1d268814ef7435f3b6072399052cd92cefc5dbac9d66024bc2b300

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      02ba9f4c22694cf64e49af0a0c919d4a

      SHA1

      cc81d0b6e5ecae16ccd11f5f0ab26a843415ef66

      SHA256

      709fdfa9902801470b9e68221be7dc011c8403b7763761f57207eeb0adac769c

      SHA512

      e2be79a75a275bdd191f142dc57f39c39086287a01715966935b401e91a32dabe2b437d895dba3c6caf30747ecc8d064f48ec9dbf3709f9d8414e0213bb5987b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2a72135b892c873a2847671bac0956f1

      SHA1

      e1837246d40014752b5b307db9edbc84732c48ec

      SHA256

      37f046bc96db1d0282af74f02a83f5d3ca2d393ff7f68c7a3b89c1e8fdac19cb

      SHA512

      338df478b84322c891cbf071187ac0d0fd748594adcc42634eee5a6523375b42db8b12ef7253e8f52bf3f6925b4b24a3ef71f889db5ef66226099502118a0d51

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      58029c4d91a215f386b94c666aba876c

      SHA1

      6780b204084c2b6dba625b0e69f197ac78bb5b17

      SHA256

      177ebe2cb866bfaca9b0ecfa13e6615d8c2dea6055dd5749614a0a9ea5abce2a

      SHA512

      aa3d8da0b714d5b4d0590bd4124328e5c6dfe8ef56951c0c4b96fdf383fe1509be7611f76b0986a09ef0271c2465c606bcef001a9e1cd0b0db78d8fbd71687b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      89d65da64bce6da4eb54dc5d944aebbf

      SHA1

      cc87a30996889277b4898a6bc4f77676464c62ab

      SHA256

      61483f98a0f05e65ed5185329016e02a8a8401cb3c1d91b350ad963970750100

      SHA512

      6712e5f21f12cb9a8f884e35e16036006286f1c513cd2fc0a7ad96a58b87ed8809465572f0133d1086cdeea17a21e64f050cd06e78cea3998f19275588f581b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9d4f1863a150beba564efab2e2468088

      SHA1

      f622835671ea9e2543d58170925e4ef206225e2a

      SHA256

      6a7b57e7fdcfd5c5712f3feaae476ad79b5c9962ff09e23c5ffebc660b298946

      SHA512

      a14125c374302d4eb9744f9e3bb241afbfe630b04c4dbd6833b031d3220edb86fe8e14c78e43837c94bea0bac164b7a1f260426c668ef91f808da7535742fe7e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fe51b1af3d6cce2782375dd245d407af

      SHA1

      2ffea56683453c70cbb4be22eb2977eb38041e90

      SHA256

      c439d8fd545fc3cf5a589d4a61fe01006d08e6e2722fe41f6ae99a955d628dba

      SHA512

      78cd21d0f9ee5a1d68811b46c0f09a8673ec843fedabc8cb067bd4e91429b2f424d083dce2f3fdcba81a9978a34cd01e946a986fe13ab74fa921dd03bdbd9ad4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      678eccfc631d72b016c01a34e8de3fae

      SHA1

      931367ab14ed33b59e11085c45a66dc26010deed

      SHA256

      13ca2bc360eb3074d3e5c0799994929e99549afea4949d5f89c9bc31cc89f9b5

      SHA512

      a59e17f2a47174bfcd7b9ebaf1219de815374d0ee0f8d19ffdeade0fbfa283cacb3a975fe712202456cb6a727f866ace90d58b6c6de60dd9889b66e333182df7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bdf8bd9af126b1dc9443e496b9977b79

      SHA1

      1e6d81378a83160f4d04500cd1a6b2420cb5bce0

      SHA256

      1868750833e8db260692c625953e166dcaceb6524e586a8c0abb0c6759cf2f38

      SHA512

      6346f17592c8ebd5f850fd28086be926379a3fc09710b28291d86e49ed98f22f693ab253c7712843a2da0f0dd140bc3f1d59ac70880d6254e9de3923303b06d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      79598ad528f3ef9af6ccdd31b2b9bfe4

      SHA1

      e9ae5eccb41459f939ed85c17b3245115e768d48

      SHA256

      a99e71be3021f3ddb9efc7c0d9d697279857f31ea65b529ed4b48592b9e4487a

      SHA512

      4a3c5eee2f20abe384316d2a4d25f09ccfd798f30264506057d7e49fbb5dc97a4402c24eda8a5acdc3b6434d40cb63da304c0720d9c3efe34f2415ed22807d3f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      67e94b4253b6a96620159694bdeb6ea8

      SHA1

      eb0323abd69d45732258ad4c3ef6e3f608381e01

      SHA256

      afa478904e1cec7a475f8201ff65f6527afc2e90b88909839b1641c579325670

      SHA512

      505229cc5bf400f6512e12be3575bbc0dd7c1e32fc5746f2702caca4b733e2b04a739e4b95405b3e03edbb97d2af9e7c2deb9ea9bf5c5b89f15d2e076745eb28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7215a4c19b7b8596dd023fb521a2b6e0

      SHA1

      4a6f7d57d802b04f7763e5060e43845ad86de4d2

      SHA256

      7e9a0a726c3eb551aa39ccdce1683657f305f8f0a03d59fb6ef0af4907bd1f4f

      SHA512

      97bcc93066bbe7ab65481d8996c2f54f4da121bebfa0040f2c4007e2fc44c754263a47464896a369ce56f833e2ab5eefce18d0201a0754bc5080e6237f326a7e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c6841821210ddeaad712ef6ee14bb2b6

      SHA1

      24dc8070ad8a55f4a1ada54def66a40dcf63fba1

      SHA256

      71df12867a6d322461eab7422ed6e947592cf13f9cdb62f60c4b945a710f79bf

      SHA512

      9e9b2adc5db0df7bf0e74ecdbf7d131b4337f782c749fb7f4f9e09eacc5ece21608ff824103eeff36e3c6614744d1e23a1a3ba53e8ae9afce8707e7078948dad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7891e26217e106caaf33108787ff3008

      SHA1

      d2949b28aa700ec98829b0717608a4d8b445b452

      SHA256

      d569390d50b85edcacabc4c968fd2771b8889e2be5b70db4ad32f6507a063b5f

      SHA512

      c14f6f3dc9cc84ab5b836d7eb43efbf6255ceab864f9a1a8a5edebc88241ad43fb32f56f011f4fc1ae32ed326373182ab6c88e29e6fab47383002ad15743067c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3df8edfc4b5e93c0b375baa0a659f925

      SHA1

      4f45a7d87d1199eb62295f363348bda9acb6e803

      SHA256

      7064b8f8449d3085978cbddf422ec3fac2e94d56b353021dc2e958248aa66db0

      SHA512

      8bb4959c7188d282bb86bfc2dcf5a86e114ba4bb42f838eee87f4fedf2b11b51d02c749216fd9dfa6344246281ce1a4b2e9e5a412cca46dda935d4b311763c7b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3a8ea7b7abd264ed47fb42e487fa73dd

      SHA1

      d6fc3c4449a3d372e1bb193d0b21f2548be1a266

      SHA256

      597c442021927b8a269495a6bce3e4e54e5e71bcbdc820743120f04267677430

      SHA512

      7a0c6889209cefc678a185a5817cdb39a8b6a0dc70f8be5f53a2edb06912fc10fb7ab342f4ce04df448c9968eaef82f96955e81ff36ed0aebe6f4010675f248b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      86ca82c098991f2f7a2c9c1ac45ec2ea

      SHA1

      35eae78700ef946f056ebd376806ac46899b8069

      SHA256

      561b38792025fcffff30c8e98afec4464ee4c804a56e1007b6f08e150909684b

      SHA512

      811d0de108d15d8ebe6abc0f2932efef924dd383ef1f64972007f23b4ccb9910c904718f4a58c58892e39a9a8308efd39a82b174b72804eab03615484bbc647e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5c982ad535848b229c9f19b2a33a1bde

      SHA1

      42e62d81520d190efa42012614887c2cc17f7d7f

      SHA256

      478b73681dd7f7b120028229b6cb0b35d28f8b48e92d3bef4866b11d745e741a

      SHA512

      cb1b3f0267b5a21b56c8e64f4e33fb575a865c9fd4ab315f32e54de389920f1f432d8599c898b9927824e7ab543859c98e4280b16d179c6365d7fec57c0f9ba7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      14b323cc06b3f1210167b930faa162dd

      SHA1

      12c9b88696300d71e19a4f5e3e0e3f37b9fbdde4

      SHA256

      3b1d770f1375eed0b2004ef5f1a59c90694905160784b0a80e3750179f94beff

      SHA512

      fa23c0824560d5aa25f89371bdee79c26beffb7c484127abed99d2a15329c509c5dca2a417ae3e07f29922fa51ef83f5534833521bf8f4d1a7c4b3c5731acfc4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e794e7452b8f5c36c18446c128cb704f

      SHA1

      6acab56ba10e3262d23f616f310edb91cba5824b

      SHA256

      64ed6db99be2b95dd2d19878a8ab515d2583915bcbb5831601edf246268f00fc

      SHA512

      dd87193ef520c34a663c0a6464a1a25aeb4a3c02896237313451a0eba72a5814482f7e574240c5f24ffa7170b53545fe277e010af9a425a64ebfb54014ac3727

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      650f5178022b8e76a67e0f57ee0e511c

      SHA1

      2178d8147b7630c2f17b8b9b808e84db42da1fe7

      SHA256

      f809f4e5662931dbb107ba1bda2c4ae7dae0a357c0a32cf4942ecbfd69c16ef1

      SHA512

      d5dfdd2dc1c93a6736fe3af0697fe4e7b075f67bffc0f93d0492e425ef029cd16bca8d15ea07e2edc0377b951d34b30c90580ac52b916ac984324861a00425ca

    • C:\Users\Admin\AppData\Local\Temp\CabEB0B.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarEB8C.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2376-435-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2376-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2396-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2396-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2396-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2396-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2396-447-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2396-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB