Analysis

  • max time kernel
    132s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 17:02

General

  • Target

    daa42a772c78e9671c6357b7c7246c40_JaffaCakes118.html

  • Size

    159KB

  • MD5

    daa42a772c78e9671c6357b7c7246c40

  • SHA1

    405af5d5f8f3f95ba2a8470bbc9094bd9193ae8c

  • SHA256

    40a12027a9f669ebd9545edf94a189e3bdda61e8c151228bdfe1d3948f43c794

  • SHA512

    4b812b06f00738747a61fe4d9f5c65dadf7be52a021a485ba4bdd64fb97901f78b892ca3fc61bfbf0a2f239ad5d35395d196c490d5db1634b74d57e84863eb4c

  • SSDEEP

    3072:iSgOxGJvshyfkMY+BES09JXAnyrZalI+YQ:iAUEksMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daa42a772c78e9671c6357b7c7246c40_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1500
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275469 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      81d02b0e3d8dacdc272b2ab1c943b6e4

      SHA1

      4a9208b7db899d29f94852207de9bba281544b7f

      SHA256

      6d05b5a8bc5394c3292bbae64c5b20b60efddc9d1e6f46e1a239a9bc93d846c8

      SHA512

      42408b0109e04fff3a0cdb2786bb18bd7a56076205806fdde0901f9c3566169c03dadd4606a43dfffe7cc4da90a36cb3ef9c815cc3cc476fc00530dc7bdcc9e2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      56f8c8a646e8d16523d989baa90415b2

      SHA1

      f37ec193d88ffb229557609f074dc4a784959ba5

      SHA256

      48f21bd87fc664240f78e04cf22866f6d282e90e26b833810f79afd0ecccd2ea

      SHA512

      49701fff0c12a7b0033a617a83506470af3915b736fadc666be2a9656e12e27aca3cf90b493a475d4f0e980ba859257f0b6c2a18eca5136299db83bde18b15c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0c40a30751ec3a302490bcbde67660b7

      SHA1

      24fc2eec3ebcc17a6567324a0b467cb9f40df981

      SHA256

      f17ec21a585bba178b33e9532fab881ce40f41c5831e4a93c7223e298625cf90

      SHA512

      fab59cc52c7628ce1f79bf205c3a49503ee5246c3f046862af791bab4d41c8b27a6372271defa74f95902e3c62715e3d55535f4ed3f93cc1c86131f95acf1a2c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fd04a7727c86db2ff92b53bf95204cf3

      SHA1

      2bbc6622f971f61a2fa8ff5227d2f1a135cd72c3

      SHA256

      491eab35250bea21d0c8d2f270d75428b798f9d60384bb5e041e321bbfe57c93

      SHA512

      59500681e53c3247f9d2a2a51e2a9d974c7136339e0ce9b43b0635d0918ee87288a987650908190d0746f74c246ac8d712a6538588d91f84f71cbb12d3eeca84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      85b53a1e6d96ddc3df031d7c42bfb0e9

      SHA1

      cea1c98ef3fbd37517da237220e14a18719bda16

      SHA256

      9b6249b583f6dcb32ccbd7f29105600c7845adbc12c49e46910f9d4f2f8c692c

      SHA512

      f9cd94520310bb48895ef84bd1fcd4c1aa3010b33b6d8a7758aa863b3dcd28ea357392513a5c2ae6f19caf232f86054172785f0be63e43d15d8ae6647631e892

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c55d3ad1c4f44b7a985e88a361ab1c4a

      SHA1

      b5b91ab3b05c149d228c224d1a080753af6f6e69

      SHA256

      e19a70902f1bcef5fb508368c600311a42451d133fb7dd11ce16a398d8f5571e

      SHA512

      faef07b09580de6bf349158ecebd951adbe57aba9de6164dd3df40e46db6c62b7b9b8ad7a927cd7c605fc42563d82619230e9fc5b84b752c23167d47f6470c42

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      01d5519c9f431c7badffd78df0c49518

      SHA1

      9dedc182e67c17a97a645484ac0daf3239a83a6d

      SHA256

      4264320e9f76068c4d26f45492450fb31fa1b90f2f270c641c60d38f721422f5

      SHA512

      f1bddd3e5c35396e22b9a36871dafcf4d4f500486fbc8525ea62c0de34955c456f01afc56a070b5ae6f06245f656966e1fdada86837c76bd060220324f1577c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f28b164b978abbdd003601aeeeda91ee

      SHA1

      d9d99b1f204a4735a4f1e253e0dbcf5035bc34e4

      SHA256

      6db232299f696eb5b46a14f9864f86dc5b58e8f229cba20452a03e0c670057f6

      SHA512

      63b7a65aa88dbd8eb04d3725fb04cafaac626c74066e8ffbb2931099d94a607002800b35b2dc385e81e4fb198d86e7110772c02bdcb0e2bd2da381aebe5eeacc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dfabb55a31f2bf781a0c61fe82b400c1

      SHA1

      2bdd28c6a7eb0f86602637b655ced9f02c98fd6b

      SHA256

      686be95b6902c03c44b0abfe5d86b41f722a598d1256f07cc30be2f99e3d735d

      SHA512

      2fe7157e86cdb80458c3dd49eb271f7ba2860975bb969ea596cc18865c08742918cfa5fb249b91328d2c11255762a83ae5718f288d3c86b62d1d5ab9765cd416

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9820c54201d74bdd778ce68d529371d5

      SHA1

      518e908ff79fd082a6f233c9b006e2839280bdf4

      SHA256

      e9d2822be23f722e6584f7655ce212e195c870592f56e2392204c851997ccbc8

      SHA512

      2a86bbcb7f22fc486c848f5f7c9ba579df6a1e79d5be24b6f621d75273ab197caa6e3b1aa0ae04865c45f3241a84581b02c5bc4a28864aa27eb68316f37b3083

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      48e112f9143a377f18438576835a5e67

      SHA1

      7bbe12af551e2ed7f9eccb51226da1b4be3dd1af

      SHA256

      b858dfb80c02da9bba0841d0a6fe2ae11f838a94fa1cfd85052761e8f70c68cf

      SHA512

      0e086369032675d77a9830d97953f866fb6319e6edba954d88d5e3e9804473c5739e5751ffe14109c4484fbd0b87251c4e9c24fe7a0bb3e2c0b5d5c9e1ada254

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      37eeb75076d3b192260e9039b64934e9

      SHA1

      0b9a03bd98b807eab263ad8c4fe7a186b38099f0

      SHA256

      09f8de30d8a73af20fedcda8ae6c0330d7664aa73b7442f5e263909c54d4a567

      SHA512

      c80138893ffc4887c3ea452894a5b4c94cc3f8c346230da6f2411c68f7ffabbe69431cf569615b37584c821b626f6244f805a526fd37a93f8e92e10015a415d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d46c788e3ef792093fec6286dda2f709

      SHA1

      48789861adad72d4e3a98cc922742101f322d6b1

      SHA256

      d68c390254a96693a57e84b527b9ac233907b82b840ece9b68e017cc5e2adb7f

      SHA512

      1a71a9ab0fd53f02b947ce6127ca372015a63ded31d0eacd4c0c90a24f910096ca4eec37e35fa5161d188708cffd00418a95b66104f4149f3b0bc069b6607b66

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7052f232b6ed52df6571d5e6e104f0bd

      SHA1

      469639811d440cdff91e11e00ef21d399237c61d

      SHA256

      b948abebf2e5e59e55bdc4678e82376af485b362f771d221f0cf5c3dad17fc41

      SHA512

      5f3fb56333094ffbaf5ad419b4ae2495dda4855acf6dd3d6bb47fb51665521e51cfd779e7fd1f924ec4e9608a5873a7ee54f5cce878f1377e58caacdbf578a89

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a4797c489297a28f779dd5bc2b7cb555

      SHA1

      9ba54c1c493cc6299dcce9329b967f6a5aa7cea6

      SHA256

      58217d6c886fa483af71a980310c8be283ade8d97bec638e80e4fe9a9495ae7c

      SHA512

      3a04b3879deb25657b47034d3206b237d9f6ec32fd46b34e44674ecdac461b684be9df1057d9bfe5ef62f29344e5077002a0eeb1b82f7558adc9296ce5b9408f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      05e1c28bbf64126ec9e84d127ffc8345

      SHA1

      18459b60105c1fb8a42f5a6a53082804096a251a

      SHA256

      d669af79df9e87a0c61d35f49362227c5bd49431b1e9625d3e4f2b76271cc070

      SHA512

      d882f40756480041645e0e3997ed7471bbf5a2abff83a563cdef72f1bf4fffa1899b45d78adeb36e3d4f9b20088131a6d50c0e0367cb8b8418c47a5da060ac34

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f41bbcc18278768fdb1e8d38f90001d0

      SHA1

      32ee63d4ac8221f4ef4c9abeece9434dc9c268c6

      SHA256

      bbf7ec6fd256065601e7ea2109a0536823c369c41ddd8e03c61d072c0963cf5b

      SHA512

      127aa54fb0f6561addb5c138a2b3569f1432b04b1452603578e02502495b4c3336a487f6da05f16b129baa7347a40e40765312042c592e029d4cd17d2fd8ab7c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8af7f17aab3de08448e6e1739f4f0b51

      SHA1

      b4b6e4b0c460d5e0f18296f3c1c61f9f5183a1c1

      SHA256

      eacb59973d5c501366a710054a3f3d4790be916485d04afb95ee6a8789b6d4ea

      SHA512

      0df2478ea7ff4eb03473ef3d209c3ea8734e5118ace88844815597dba8d38337cc110b7cef8d5faedce39060284cf6a769d4c635effe5445d9a0eab0d9125abe

    • C:\Users\Admin\AppData\Local\Temp\Cab9A4D.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar9B1C.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1068-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1068-442-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/1068-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1068-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1388-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1388-447-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1388-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1388-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB