Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 19:43

General

  • Target

    96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    96d16b762b7e4756b2f247d17bb7ca75

  • SHA1

    729e1b50f0553ff9561d2d1f371a8098f608ff7f

  • SHA256

    cf2e5eeb77c12e52ad4002ac3c8a1818ebffc33905fe35d478dc3763998af19e

  • SHA512

    7c94acce6b4f89d633ab6ac14608eaa3a78d555988f0ae42f2a83590994a30c166e6bd8f3e3919b822043c6d05bafc10a1f212d8925a9251b779e5f75552c887

  • SSDEEP

    1536:1sR4bLpomzU97oIG9LGchbTbuxskRgepLN9I4BtChf/d:wiomzU97eSc1TbsscgmZ9J4hf

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe
      C:\Users\Admin\AppData\Local\Temp\96d16b762b7e4756b2f247d17bb7ca75_JaffaCakes118Srv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0b210e03de1447eb1fb1a412bca4438

    SHA1

    f79d8a8a3809c53d72d8d7193ee13a2f4949ee6d

    SHA256

    b22e0efdcced52c44782042e9acd94fe0632ab4f035e8b68bde0c645c5796953

    SHA512

    c50b9fa8a0b43e4b71909ed9ed5bb8c9e0bc145e5b2bc1a15da4ff70b6a2b02085c9a618b3a67c16c9e3e114838bb5d4fe3c66f59901fa223163a092320398c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f5664b3d35a5cb613882e8f44ce35ad

    SHA1

    be0d181970cd036ac08436d59348e7da70fa0eac

    SHA256

    73c6dab050731add615a18cbf8740d969acae0a99c197ba8feb3fe0399df7e33

    SHA512

    47eb1327d380ba6d59d09284227c38654796ca0d06aad8f90ec2247dae936ed1116766e4b83c876e7900c271ae41fb4432a26a35397c89bbdc918c20df8b0897

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edeaabea65e606cc50be07b31c0735d0

    SHA1

    125e1e71568c579f6cd7f4ecc1b7dc36b9e93d9f

    SHA256

    b7354a6e7cdb7637f928199c5f193019d8b7f394fc187d724f97c996ee7d0c2b

    SHA512

    919f009ec3074c1e5a74881d6e3640c9324a4b0edfeb69149a49911b77ab5b11fedbab10287deb0df79adb6288aed3e20f87fb953c6bff94a3d6b4a14b8da420

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e1600878980d690c7f70c66f372e001

    SHA1

    993936f2f3e813a38c02026f310864705722a542

    SHA256

    6b7e55c9505b1e7c5abf210c24b4e36587db6a5c66f8c9b1df127444f1441f09

    SHA512

    178407150ba59bb599efe6140f72c4576f81a8af2a24c1da28d25df36e54a5c6378c605810f89ca59278679948ab80a5851763054d6b689e9f02c7a56e5e3dc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f528cac18e082a38d742d53f99971af1

    SHA1

    44c06c25c4d160a41c9d5ca71017da0514fdf3f8

    SHA256

    3f58cea029ba640b8a52fcbf901245b4f5e161641f3203627c56f146554b5315

    SHA512

    2c9292f53ee3d3e644fb5632409022916a9f0067e95f16951a9818db860079945533708cf1e58e9bb20963fc1ecb99b0aa07cb7d50cce7db14ac2f4919f6d48e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e3ca685f38f5de135a3794997affdc8

    SHA1

    ffc077d3863f68a4b759dad4cf499b68db4fc73c

    SHA256

    392df52635ce87624abfea20ff54a899653dc49e671bc95238cfa53b8f354843

    SHA512

    cab6a88708c6b9897eff6d743858877f46c2bc8b84503106ce8143d0c3de53c9b0531c7abf38642ca7b2d18e965b5f3f3d51aef3f22c13af0c40a1225f6f77c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40a49ac69bc47f8dd56c568dea19f558

    SHA1

    2a1a2c536347df3c619054a18f8a4bf3e2eb886d

    SHA256

    8d5998548d01562e205d2d2351565abb3ca2459c4f303782c7f0978a2dba3be2

    SHA512

    2037f29590fa7fc06f859c3aacbfe6442542f33aacdf8399240554a545147980039be7b91da7e12d42ba85c7075b76670e48a1e719db16b929afe7b66b47446f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    018f0ea921b4747130ac34dd3249e650

    SHA1

    f47010316bb60fd395755597a207796fcf7a306f

    SHA256

    555213fd0978ba430183363294cf01f0f6e94284b9c32b9ebbf4d3d3f4eb8378

    SHA512

    f845c4f23f1219b73d6fa7a1e3d588eb58339189ea25607b27e103de1e50bc0fa0866c73281aab7914f5ba29d77a7aa2a3638ebe1c4e49659c54b89eef875d9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad414ba5f923d830b0b235b5022b40f3

    SHA1

    ef80efcf1506f4f55ae5b0ba34bf91e24d62d5ec

    SHA256

    3713060270282d9dd0a91d5160b986e9cc379907e15ee6dc9d601046a86dc6d9

    SHA512

    1afc794dad8572a7bd1c87c678ae6f7732156f444bc85413d2ffaf8c630b061420ac27ae666e309f30f3de183284f0626e29635e6a88cbd87886a5021fcb6a27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b38bb5442341c355fc1aedd5676ec5a7

    SHA1

    f2eed0bd4e25c8921cb51ee3e60594a0e0f219bf

    SHA256

    f38474a12e1f266db756e85f22f6631a93d825cf5719e7636e2ec18ae0414a25

    SHA512

    9d3ef477b87a13536f136158f94f0c63e893675210402ee7d614a45b325566180414488904e685aeb7dbfe856c66ffbb02ba6c03af39f9daf99ee39592a46385

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b43fdb05dc1cb7341b49c01a322fa039

    SHA1

    78619101e0d0e80535e3f42362f01f327926da54

    SHA256

    18cb2ef22e215d90e5b0a37d40c5e668df0d02ee8d9c4bb4056b47fd8759fd63

    SHA512

    ce6312aad8f9ca0bc1ab846dd9f277551eabf98838888f05edb43deeb5940119065b9be80dc87eeef32869108cb946a0c75220a410e19f045785ad5e819ab6ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1391456ab59792125b0715a64e3aa82

    SHA1

    d9915757ca7cc719ba646f173613536a04ccb049

    SHA256

    a33377be7c5d9197895ae968c89d43443214606bebbcfcd1fa1b3c832c11d52f

    SHA512

    476ce088b5bf3d0a00861d485c43dd0b5939f5a0ac81e82df151015410e064903922eb634719208adc2bd12f88f95c0a1c95cef468d95f1b5e4fa1e08d4b8d75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89616f8afd370f18fdd5d62a118aa684

    SHA1

    203e2c6ab38a4d52f66fbb8ddcc3f85c8bf48867

    SHA256

    1c549a838e6fc7a9bdd849649fead2b18a438693da9ccb91404b4818195954c9

    SHA512

    dc05f544528363f37686f5b7e7905908e9189afe191bf60c7f0a8e73bd62bfb34e0fd9e51da8b61187a5b52b3283a63a31c1b1e621348f5c6fd79d2374a752bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    373756ee7ce370bccd955fe05d91c147

    SHA1

    1c12d96a2ebf6e52a2b3dbd21c86469d6d299714

    SHA256

    ecb2e107784945d94577a37d77f1a9179cc18a9f87fc0c44c5daa4379aea0b0a

    SHA512

    017f52f6a9f697b9463311d8453ee3275f13a4abb28d855aa83a31f9f5feb9b8ae0244b3fd6677a1b60ffad1e09880624cd70c047e785341230efdb84bde4346

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6914b8f397415403140c639a73bc1e1

    SHA1

    054082a967598d541004c50d6087500b22bcc33f

    SHA256

    edd0e7a0c0c7d51f49fc4bb81d08fcfedf8f797399dfeeac5dc90f22e0325bfc

    SHA512

    d3ee31d643de946d26762412769f480ccc555ca203e1e7cd67c61f3da5822cf9d7a6d81d5d098999e6eb6da7c2bd7ce60c21dbfba4c2b89f6eecb74623f45b0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44fb49dadd96c600fdf29c353f8ce9ac

    SHA1

    6413f49975cabfb07ee166477ffdf44878d5c4ff

    SHA256

    4a3bf19a3fcde2c587ab7c70ee740a92fdb0d8e4603bd7fc304d2c616972ec0b

    SHA512

    3612f8084a0e3dacf07ea3f1baa0d66b96ad694efdcf5732b3adf29fc0d8f226bf142d170f51ab18bca4eb9dfe89bb7d5b200fa4f2c0a6f820c957c8c7532a78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7994e61daca32b883ceaf6d50f933116

    SHA1

    b7690c5a36512e8603bda75c8ba09f47a73e26bd

    SHA256

    e61b7a62bee0c2ce00ca135361bb066630b53c533de3ae6408dc94559b8fb2b6

    SHA512

    682f0255da54519fc675ff89efe2071502608ae0b14078298c81d9ade4d5112d38d4ff00081dc8dd2c09d01e3c8019b5a2adf11ebb0afdba7ab7c894ac685e2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e2c9cc3159ac664b6bac47fe8c77eb1

    SHA1

    dc540acdc1a4684ab1af2b0611a812961eb6bbbf

    SHA256

    88b053dbdf4eddd734dd69cbbc56bf1cd93944f793b4a383dc0eea609ef860d2

    SHA512

    9ab14c47b8655f7b8d0ac483a88c27fba8147c79b44444b3f59a21a5e62a3af34dca1320f7d6be42e6f5cfc4b6a2e3c72c405903cd20cd13e5b4a83c4fa628c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    329896ad8bde5763585bcaf12ae31079

    SHA1

    cfc275592f81b59d05c133c22f6f491bbe647476

    SHA256

    1df07e454898220c91c7896ef6cd618029a358d2f736f014ab6d8cf5434b7f74

    SHA512

    99991a17674828624684afcfd8148de662e826e764c87c8653547f1d4ab0f7b4e6608cdaef305ea35211361ac1621b356a7d02863d24aeedca4cc8110c42b18a

  • C:\Users\Admin\AppData\Local\Temp\CabDA3B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDB09.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1240-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1240-10-0x00000000001C0000-0x00000000001CF000-memory.dmp

    Filesize

    60KB

  • memory/1240-16-0x0000000000270000-0x000000000029E000-memory.dmp

    Filesize

    184KB

  • memory/1796-23-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1796-20-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1796-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1796-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2408-5-0x0000000000220000-0x000000000024E000-memory.dmp

    Filesize

    184KB

  • memory/2408-6-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2408-1-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB