Analysis

  • max time kernel
    131s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:14

General

  • Target

    b4f0c48b85a2a47781d14284333f6cdd_JaffaCakes118.html

  • Size

    156KB

  • MD5

    b4f0c48b85a2a47781d14284333f6cdd

  • SHA1

    6b3ae5cef090000635e97c375ac8e8473cd1a9ad

  • SHA256

    4876273d87ff59b5ca6c9d7a14cd77c6e86e07c2f2e61219d295395fa43b9edd

  • SHA512

    c6cacd669a118ac3c00533f3bfb706bfb90209372184632dd52c69c43b8007d1910f1615f6cadb086d141dba7fbfb28cc02fdc32cf5aec34a82b186f930d404e

  • SSDEEP

    1536:ifRTBtz2Wp8mr6yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:ixp6yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f0c48b85a2a47781d14284333f6cdd_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2924
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:472074 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d016df17aa8cc84fa08826d64c3c2870

      SHA1

      1b8657f9270d502ccee2cc9d55770b26160814f1

      SHA256

      c0109346e3a0da546be144779c7619c2e01516e67318ba87c440e266e3396087

      SHA512

      a15175ba7148c2dd3e8cae3bc54595c764a22020d3ce0aa74d36867b9000746620a070ac5dd4424a1c9865d522def4adad768549f184d59030c73a61132b559a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3f5f60b0f03ece9ccd7b6c85a8a961fa

      SHA1

      af733aaf35e042335717fc12c2a1a416b9d1714e

      SHA256

      51313157a63c1ba78bf00f12ba29f6f3d51469698564c2f4c1981cdcb5e5a161

      SHA512

      eddf71d194f17d223ff03d28aaae175988f1af55ce0b437e52c0b04a7e8bfd4096c07f3570e74dc1ae0a14b363c59727dd94464a10cd1cea7d09bfa6166d5c74

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fbf3353e8e43fa60c62cb74190ef6c51

      SHA1

      4dcfe6daf4aec3d65b4d357d807cd0b80d47814e

      SHA256

      c7a8818f26fe3aa65c2ed49d1242030ed75e98d863db29782925821fbbc52ed9

      SHA512

      3e70daf23816c397814258de6dbc0aeea943d9c17c819bbbdd37b5e97aaf58e63beda317ea0040ae72d368dc1dfdc1a11589872e63a7078f7be6f5626b10313b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1a131108fdfd23e43fddc4407346d772

      SHA1

      39529ea307fae103654001a5f8a12f63fc30aa9d

      SHA256

      55bb0dd0e432a893d533e1aa93277171835ba4a5b94e6c08fc671c9e8538274a

      SHA512

      07e29f2991df983d7411e16cb1fcd937324b8ac99054108784f8afc23c8e66c4e9a8fff3e06583d1181ce1fb16efdee9ac7829150a0858005a510265f89fdcd9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0f1dc5839cde17964e7df3e441300652

      SHA1

      70eab4bb3a45a71206ff954739e4e7d68dbab96a

      SHA256

      3f1469c9f7266fbeffc9aa74e7497eb00ae333221b7c31ffd8abf42ef8874521

      SHA512

      a06bcaae48b3929b5f476d313f710f850d1d1cace0a3f389054e26156f1225a03a5f763c58ae047a8a8f16d76196bb910e1862916e97296605ec2b2dc4053ef8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      32a63016813fea9ebfe86e87699aa678

      SHA1

      349de140894e55ed1cdb4727d1d4362f0da43c06

      SHA256

      89f9ad6b5be2436c20535391e841d88953db5160fad5411425e92396f6f46c81

      SHA512

      37182bd71e899a5d33090a78c109d2aade65d6d6713d87054b72511fb3218feb8f8c89db5741a0870800e2f2d17621aa62d17bc70f5aeeef391de99d59c82277

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4865f874b9bd49d4c80c19e33799398c

      SHA1

      70d3fa83333def91aa8c33670ce77f4771ce9251

      SHA256

      902e745df80ef304cd98e0653e03d65eac9bbcd788ee663602faa5a065c17971

      SHA512

      0f94285365b315ea8fadc9cce40644493c870ebdca2267805c4d8daaa3cb65920f3c6f916d845652c10550d225fb8772d6681dc4ad30273c272fc390462e7c18

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      02f46d6372fceec692a2fe467fe82350

      SHA1

      aeaba1c21a96523c0fc28c1095e5464ba0f6da95

      SHA256

      3dc3de40288f3e3846f79a4954029393ae9a3c4e9ea781697672567577c5ce72

      SHA512

      3f25c2dd039bb6421f2979c4bdd7124aa2d81a1d869646a03a20849ff284e8861e731a0d146aa60efc5eeeea50ce33b206aa194a7bc1dfa5fe0db3a5b5390674

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      869f8fb1217d34b3bb8ce51b6f38069a

      SHA1

      bcc7d70ff385200409394af38cb4dcafc47d6de2

      SHA256

      c1d84840e0cc77dec577da8543edada7beeb50010ebef2664f949b277f482a39

      SHA512

      c9756d7db06641370f3baa709e77cdbb9e139e5625a6bddee1ee9456e62628573bacdee5781941c5623c2f58850ff85e932afb4665b9effb0dfe035c711d4041

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ca7d1f0ab0880283c0579bdd208d873c

      SHA1

      6910af34bf0309388a9825b424c1c8bada236eb7

      SHA256

      64172c1e69a6f8a472b72726472385e50b5c3a6e77e28f4e9f3e2fb0f30f16e9

      SHA512

      6ed91903490ee9a332074fc8206e50cbef6f8bed327c05c694f9338e2a70088ae055d370b4eac0e6c50c934ccc67b2dc042dcaf669f91ff5bcb930ffe32726aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8b50eae1855105255571369164207e26

      SHA1

      0286cbaad86240c55cdbbeace6a4cc121841b205

      SHA256

      636a64425a1cf796aa33d9e34c79f447bf262ffdf84fa0ecfb834cc9d24d4e54

      SHA512

      a8786ad660b638df6d0774161845769ac2a6e5dea3773313bdbd6be934d69407dd3bc7297b8a6bc4b78de8e4b8df1987b9bb308da7bb6f4b5923971299917be8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bf9af4241724dc25ea44d9a5eed39c7b

      SHA1

      b51e623a5da50396f2e6ffd5d4786213c3ad44a3

      SHA256

      114e1838d801957ccae9fde87a98eda72b2ace469ab986eeca9ad5319ca58b4a

      SHA512

      3b55e488852d8cdb6bc19bd26e1b51c9361fc637ffa1926191a5e92b5e8226d87eedc77f1584c08fafb56899fa7bdff930a69c9570ba2bf81148c3dbcc8d573c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4c4e19f43ca12721f9f0c16d671e88e3

      SHA1

      d261becf4bdecc2fd08d7ebd0cd8928b2dc30130

      SHA256

      1148e988caf991cf633c931142b98cb8af3331ab1a207d7b1197263bd33cf983

      SHA512

      15e705cd67b795b7764c1496a753fef0c3b3d693a0e7a4a08216358797d579e0e08c6c77f54f1c44084a2aed5cce9b67e7c49edf1a73a73d1b98d63861f4d43c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a173342b477b6f600dd6d1f09971e9f9

      SHA1

      191926583413f6820788a6e6be3c218d09d5efd4

      SHA256

      781fd232463b5a4795afaa84c2be014159a8e799fbb34dd0536cdd7d3dc69370

      SHA512

      de88528e7204ac629caa1dc2ac0c092796cbb5d2502035b1f084080e83e72f7940ed76d6334ad970eb4d106424bb300973aa8f636d687b5e6e5030dbad4418e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      056f018632a4475ed95885a05a59386c

      SHA1

      22210ecdc0105732864f3c9960f9c0bcf620c1c9

      SHA256

      313c3d4816c282d8c63d8b0f7a15747a608f719552f085f23729dc1293d6927a

      SHA512

      5cce97d41bb18ac4fb1c9a3bee041e28b64e0a9b41b0d581ee6b1298ea97baccf7df9dc5547526b9690a83e4243fd3275ae3c335a4ea31aa3a52a8ace57ddf9f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8308fb612ad6dad53df550476cd7c7f2

      SHA1

      5158da3560cffd972c8549a54803166a1398b4b9

      SHA256

      7f3132d5e40536f6507beeb0f48c4aac6e804edf4d133d58608af1e71b049d12

      SHA512

      a8f1baeb59886f4b48580b47f12e3b3c213b83d55e2514e0971cc60d02054e70740cecc48ddfbd24f81e7155616d1ce0fabe9e6d5fff618707260a8ec3b65438

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e3198a87b6cbe4c91435ab8b45af9250

      SHA1

      8e362f680932920b3d21c728d4ff34e1c495ad99

      SHA256

      696bc7bf0486154b4fd3d452bc5dd96f25ee0dd1ade9ca7eec8aac71708c435b

      SHA512

      9f58bdc6d3031b28d8ad01d252c187d71e62e7b88c18e14c76c6b1d2241d3a3b214532c792d5cd3bc7c3c4e2cbe6dd4f883e14337e01e76e1b7b62adb96f42d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dbbc88fd40c8a3234a0b94df1d63f65c

      SHA1

      ceaa59e21f7d450ed864529c792dbd0ec4e98c49

      SHA256

      d73882f4623959b44725edb4bb4b771a07c8b6df83f5cce2b00509825cfcbc32

      SHA512

      2bc39e60aa3e515d020b5ca5d602e263be7edfd0f8add2a59291ab3717b79cc9a5ca70dd394d901413f341574a58f6af07fb3af81f18f3bcd15d28a2d641b4e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      90105948a7a6c9081ad485779db0709d

      SHA1

      afd2f9c83fd41adba64e9a476e94f9c6f773ec4b

      SHA256

      7001c21cd84b83af57639de1082d2de925b8d03cc5d9aa8917b8951147e3c1ca

      SHA512

      3f324b7cd3c4c94aa9583c5c65d15b6e3985c7a13cd70b37eeddfa8deffa664ffe4e810c5effe661316cdebb7c4c0bbb87e047b3bdb3e88990169298fb6f4c61

    • C:\Users\Admin\AppData\Local\Temp\Cab4CDA.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar4D8B.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1760-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1760-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1760-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2516-441-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/2516-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2516-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2516-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB