Analysis

  • max time kernel
    132s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 05:32

General

  • Target

    d57b7a74da49268dcf3331e94bd15943_JaffaCakes118.html

  • Size

    159KB

  • MD5

    d57b7a74da49268dcf3331e94bd15943

  • SHA1

    701e95b16cd7f641a6c515d0bb6d44980c1ab099

  • SHA256

    70ce45da205b872917854b6fa59fb0677e2525a12349b1412acd605418bf0be8

  • SHA512

    7c489269792fa6540431cb4d5ba9ba3a9d944ae9096e16d95352f953ba625d4fe806e9e2d6f08d189514275443bb5a31ef8aff769849f55d549e963258bfa8aa

  • SSDEEP

    1536:iFRTwonpjY+vT62gFJwj8yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:izBL58yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d57b7a74da49268dcf3331e94bd15943_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2160
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:537613 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      29ec2c0eb638515544e34456745a4a3e

      SHA1

      d220377d2967e4a30d6d1760b39177b70de86547

      SHA256

      b1aa8be48db26413a21c352658407fafbc21823b7a82b033b0ec95670a314a76

      SHA512

      dcfbe07002df8f185b3074a811a471f08930d4487a4a1b9cbcf07347038d3807453dbcdb8e34ce8ce64ac9125f4bb6475154199c9e80a1e471e799b4d468535e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4a26c4d895ff626d0d27d114101595e5

      SHA1

      f17f61d1c68af945df351b9829480df553eb4e66

      SHA256

      26dc611008268ca3a479151a8f7c7e23e286e6ca3041bc97dacbfe460406c13d

      SHA512

      6f32df7adb0bf8eb1057cf280901fb0f00646d3fba743ca6b342bf3c5b64ed13a1227b411f5e404f55957bcba5def7945f0958b35ff3af552ba47e3ce4992053

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b63fb806d18ca985c9a34d5e947eb633

      SHA1

      29b50b5d7ab5a7f991b35156c44df63ea14cad77

      SHA256

      4a1899f60142b2675bddb7449d8667441a2b9d831dbc9a726893ac5abb207ea9

      SHA512

      0ba7b0f1f4192012ffb750af2230f9280e8a370f4c6dd1feb7d9b0c44e458e17739590014bdc9022252840b91701eeb0d14d4a68cea41a351043f33b6a446ddd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a6605f5afc8249fa21cd2ae37f6e124d

      SHA1

      556a9a96c44b9e78bce8866ba22befc4b28c3737

      SHA256

      3e2ece5e16806ab8505952ff72d9d9eeab1e62f12ac3bb468a5fa77832066f81

      SHA512

      5bf372121342ee3f3a86a01027459d4405ce50c3d389182ff4720592c6c385d3306e95b6c318e0ac571c0f49c46c3547621c6817b20a45f948da993ae259503c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b540defff138cee442281f6a4bd47863

      SHA1

      1e39a902489131a9bd46c0bab5852ea1bc04a625

      SHA256

      f98fb5f6cec9ace50d39bea85837979bade9baea5167d30f28aaff3b7d06d763

      SHA512

      b9b697c69ebf25bbfa225a724566bcb0ff3f69719cf9a941fea9107487059a3c644fa862a7a64941152e10ae1a38ba78d39cc42f100eef3258582aae5221ef41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      17701d26519d20998bf8b102482c8492

      SHA1

      ad50c4cff04511a347832f6db49f5ccda8466c0a

      SHA256

      81167538ad5f28a405f43abeaadec9faba2e06f8d3e8fc2efa86768d1057c54c

      SHA512

      4aa59801828d4ae9bc4a8b93578fd202ce605cb54d2293c8a0dd275c05accb0806c62f8862978c2db099c1b9c90074aebedb447b1430854cf54cb3ab59f0d238

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      99700ad4369265312b19316a4d56de1b

      SHA1

      0e9fa5654d3c8206ea7a490ce621c78b7f8d8901

      SHA256

      d03e74b688045ebea2d44884d902bafba56f202f343a2fbeeaac5427855434e8

      SHA512

      5ae06942f157407947fe13abbbd067bb721e97f9b69d648d34fbda8ce6991417ebae554d3dc834050e387b9d08691de482f0f1806ce39153d97b613cbe749e0f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      77860f837c4a2d623abc25da1fcae408

      SHA1

      5f2fa16f279d8542ba064b919f3d9fed9c4565a2

      SHA256

      630d895599726110eacfe2f4d571fac760145430234dc0bb3ca5857068b5d0a8

      SHA512

      311d6b98468ae487cca54bba6e5feeede15b14aa63043460e82a76b4b0f05952ef431a0a516885a6466ec67e5bd78039daf1487842c581523bf6a33bb7e1fb51

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c9dfebf6365979973812292e834dbd09

      SHA1

      0028d9cda0bce37e64ca4e8b395ac83022867d55

      SHA256

      63992d2fab7a29b556103d6e8a24327fb382643e5f881408bff61f9682713666

      SHA512

      79fc84dfcacc1445303b0caebb7550794565ff3c803352a94cf7cfa1e5f3566dcb9973d9dda06966ee1c4e5cead8059a81ca7a47ff76bef6f0646f7a4671501c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1fb29d8cd99242a7d29b05605c796e09

      SHA1

      9a7543915bd6f18e364ad15d05ca641d9b7df4ef

      SHA256

      f7378ab6924fc88dbce92ce9486b956fbf36f62cc184f7d7b5e023b61907ae6c

      SHA512

      38f5c0ffb0c7f5b107835b139b4db66bc5d8835e0626328c7bd232c8b9b8053963f1094baae00f2c121fd43cb9f8587ea34d3236c3dd779316a5b7a973e5db9f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b73763bab6e490c2d84b3b2370a717d5

      SHA1

      47f2f411b43b5f163cf3ac9b4f284313dca2722c

      SHA256

      aa7e94ac0404be81833d28baa574827508d1a57e49e3a268213462adae9dfe1f

      SHA512

      253d8df9788b82248d77216466e6d1773beecacc3adf7882e0ae02418180a9824566e91effebd7f29643cf6476de602e86c8ef274c87ee50750fcadf72d6a443

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d873cb192a324b07e48ba2acd62f2bee

      SHA1

      b922bb8f8087e4ce185b3af18ec72d38fb4bf88e

      SHA256

      61a28b7a874717870dc0830f28c12f75acf4974e13afb301b959228874efa17b

      SHA512

      eacc561fb7f0e021edfd97cfdde6d33b330a9257042ff388882039c068cf30b1e9eee23923adf1b24c323fcfa93ea579213e2f989eacd9a349a3e87f5671ee46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      11d599d56869939be3ad7a454023c045

      SHA1

      df9fb9f032ff902b98f6e69e4eed83627fc26026

      SHA256

      53513cf3845944a3acf0632dd86df064f0bb13fcb859acbdce68c0287031758c

      SHA512

      a1bb3062d1b54f1cfcc4ec7a4b35e3cbf0d36a42fc07381a380357dccd3e23959dd394ee8e40a8cc917f4bc5d5493d2c37f3ed0e88449c0a43baad80765eb44b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b768025d929da353310195119eaee767

      SHA1

      e8fbcfbef4b1930a987543fd1bcaeb501298d64c

      SHA256

      47852be4e536377835fcc776dfce877fcde88ecdbacd217d339817549fccc2a5

      SHA512

      de27b6b28b3d2aa0a8254a2635dd28f7c5c0eee80b180756448c3697cddd5ebe1b9cbf3bad3803ce982e2c047ee19123eab7f00e7e294c3cb6712d6b46ecfb76

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d1f75cbe293f8d4bb10559b49c483731

      SHA1

      9ef8df896f209f33e119d8c3339e8c2821fd8cd5

      SHA256

      097f75a4b6e29c1c4287fc389ec1aaf14efc44c484fc947ced8a7a750ee4a106

      SHA512

      c4a75a1a4841b578e0ff32647d8db96a84d331020b3a58bc6268a9919e813314793317a3760ddb33cd6f1fe4be7058f84861d622bc68326e425e66fed58a1860

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      890e66384a65136b316781a950a6b966

      SHA1

      079513aa92bf04c3cf69cf8f3c71dc9e6bd7a1c2

      SHA256

      cdc6bf9b599e67abe29a0af6dc771b1972b4324653a7d770dbd1a5e6278bf293

      SHA512

      6d4cb8f4b07a6d3afdeddf6714f5fa88a5aeeaa8aa362ff497d85d919b94c8846863932cb2ed578a0fddac8df332aec435cb15715c5f02d1fb7e467b5a282058

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8f40d69156b9a2998b5adf0a7914adb8

      SHA1

      1147d19838aea3822a2894e3257f9240de02eb2a

      SHA256

      28c40c6732b77c7d9ff02687f0c758463585644006f1fad919ea7e516ce2b1fc

      SHA512

      19af3125ccde6af734d52c39057a6f588e757f21ac7e88aa1b73c373c75704addeb87c09dbaa4edaea9941b0bdac3624694aabdbcac6b5b3c215545734ed27de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      031e893667071d48d01482822472d841

      SHA1

      106efcc89b5bde1df1e877a501b1b3f1f4667e6c

      SHA256

      f7ada923c6924d225984d867af4dbef946a6e3877fdae92af5b7c34a2cfa8a24

      SHA512

      3c6c61eb02cb3608612659e8c9a6fca68b0861ac1eac0ae1da42abc295adf0debb99e984d72495d5de58d9974484ccf0c75069957729b8c070d6889cea539128

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c3691c7be675c4c8a4f1c55bca8c0337

      SHA1

      7e1c2ce1e8166d05d949b53c5278faecc94b8ec3

      SHA256

      4bba0d116303ff635a737c068932539002a370ebaf009040da063d22c35416a8

      SHA512

      39d421562ffc8d8205c400ed9306d616c9f0e0735cf2f015a45f49655174b8da9e48e6559ba4c35edeae2ce5614187ae7fc3a29e7a1e374a3936966ee127ce9a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c8520e64c27b2aabab0584dc1a1c4e18

      SHA1

      3024f489077ee223f4d13e4002782fab6d8bd929

      SHA256

      d00c596983bbeaae6bea605106cbc9aacec8ca5bff66c03b5061e3740b83507a

      SHA512

      52962ccf5490970a7e72a41a8e5b97a84261b81d34353579f38b012c79858687aafc02ec9dfe5d0ea4b602a9d0b737f7a535ad75257db04e3e9b079eece55a43

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      811096a4818288998c46a942146f5aa7

      SHA1

      0c8ab5ae98781898cb7ef791307d3c699cde1f05

      SHA256

      ff4c5f1277cb9f2450210e57030e0d91ce9751f5b32601696172649904bfe42a

      SHA512

      b2c3cee02312bed765822422fa7689ecf7406910bf804fe9fc3a3c77a7e535d09c8db49211b33875a0bec5da6b148747ca03587e9d0f4020d6a0aaa5f439b4cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      94a0463092215bfe18bb066077cc68ba

      SHA1

      518cfd741e487214195fbe29019f6db87e8504ab

      SHA256

      19cb8324fa10be782b2aa8bac8fabec6931f17d0dc0b9144a102c29360d1c6ea

      SHA512

      0e582a904eb06bc0ebbf2213db4c1f5851e8f30caed508c35cd3516fa0c25257bbcc7071c4fa277d42f907d47c15fd84653ce100b7262d04736d8279b0875101

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2cbb93c2a2034624e3ab178c43769edd

      SHA1

      fc2e4f0305f0ab11618ac938b2af6e71f1246e19

      SHA256

      8bff32df25fb33ec59f0c38891a8bc728b54993d50ae48909a6c1d2a1e164e9a

      SHA512

      cf17dc514c4e5b3fd79eea183aa60b61caeb159638482b4ca9db205a739becfa5156408778590a7e094b0cbfc501260e931687dc10b2a0b8e82ef3d65785f55c

    • C:\Users\Admin\AppData\Local\Temp\CabB231.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB2D0.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Program Files (x86)\Microsoft\DesktopLayer.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1780-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1780-435-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2208-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2208-446-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2208-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2208-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB