Analysis

  • max time kernel
    129s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 22:18

General

  • Target

    deb6f9bb8bc77338e64fd047810bc6ef_JaffaCakes118.html

  • Size

    156KB

  • MD5

    deb6f9bb8bc77338e64fd047810bc6ef

  • SHA1

    9c7654a5c91e03afb2a405f5f93297c3623f9f63

  • SHA256

    e9954a919c990df2408f026b71516a8edc277167b30b7bffbdfd90700fcd731d

  • SHA512

    17a5aea96d20f8ad5c644cc11be03f18114486d25d10fac67f40589df1fdb9aca2f19d76f2f163b058f2c87e8fdcc7bdabb3523a0240824c3a25a51765ac4764

  • SSDEEP

    1536:igRTITj/4xj3vr2ZIyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:iKZvwIyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\deb6f9bb8bc77338e64fd047810bc6ef_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:640 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1224
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1800
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1736
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:640 CREDAT:275476 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2324

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a5bf16d72acf01e71b13a277e6cd5f0a

      SHA1

      2fbce79bd56429d04ef353956cc11c75f2bd2b31

      SHA256

      1e5b8ba446bfdc53684a9f47c19c1951573184fdbab88a92396283fafb2e7549

      SHA512

      2423075f63d0b2be0a521b8e493de68c8c33fc4107b6bb21d4c86342c7954abc2244b773df56400bfe7ba7ed5e2664c1360684cdcc840d5fdfa1e2aa795f0f45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9496c815aa3214279b1563dcc2eedd3f

      SHA1

      721d8a59cf1a395e281c17f9c45fd7d3078d232a

      SHA256

      ab957489fa653333636c2899ed76e307b4608cdf1adba75742929cecbb5a52ba

      SHA512

      40083503cd70658acafe868f7eb9f22f9cddfa7214f5fb59203fba47c0f4e8d678fbeb245ea0cb5499cd99930d2daea846541b5850a3286c748529cc6a96dce3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ba622618c0138ad47fa58baf4803e0eb

      SHA1

      4a4cdc6832c0d2cd3eea00f36e4d2e1cb962d67a

      SHA256

      404ef0ec01fa169a901804eb9f8993eb1428724ae00503bd7c018d23f42acdd5

      SHA512

      171b7e2726e87733728b7dba6e24830e71fd81faab0235aff8ddbb6b8f2f119daddfa92aab9cab981b9fc7c6a4e5564584f4460f2c9637260140e3767c181444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b02fbeb3310084372bb9f706998bc3d1

      SHA1

      31641ca09285e360c1fc178ddac74fcb548c63ab

      SHA256

      d573dd7fbab73a623765cc06e0b8b4a21f395be60d7939ada30464b7a7aeed12

      SHA512

      b21b42d8f8888681f4cc424bb7dc7e751c7bc5a0826def1bc7729f95179f513f58411a4a70d2c930c7c221cf1ebc0517082b15a495d5ae6ccfdb334a86e193f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1ad1c757b84f4a1ad4a121214e0a22aa

      SHA1

      b35283e1d24f4922001d99655989a286cfbad4a2

      SHA256

      4957788b49df8e5525dec6f04ef1fab83dc3254d45c7b4317c27130c51322716

      SHA512

      179d2da391f8e782fd72c0785f146cb2cc0b175d888750fc09fbf5d8a283ab9ca609c38139da1e8f0cffc79d3de6f8c0bb799c4fe7728e65247195a1f530c417

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8e85ce9c7ced3a8acdf8f45883701e0d

      SHA1

      d67e122b9060d331fbba0da0bc659c4812463674

      SHA256

      8d12796578dfbd591d0ac3d1a7c3723d9608249dbf99565edc9766d72e330e5b

      SHA512

      c52ed79b9c98a1ab5725571950c8bf3815ee1a293cfcf67d6627833e985e4ecdf99ef8cbae1565acb770b21c3442cb6b4994263585641e96c96f826fc4c2c455

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9ab7c2a9ac2c61dfe2b33cc7eb303f7c

      SHA1

      8e5a3c682466e7626dac6a0c06d392c4fcf8083d

      SHA256

      28864d40820ba331111c8a503333816b04a07a498ffb2556e0509c8d465ca2b7

      SHA512

      e0282d155170891d958b3ef90febb0bea56838a08df34b161e8a81a3221f5da10c72b2ad9fdca710d0f01d20b9a0667b938046a2d6e47d363e4828515ff949a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      366d9876a8c497fb8768efebf1cfbee6

      SHA1

      f9ced066f847008f8e27fea7df194f3ec9fbf3a4

      SHA256

      ab36292ec502e8aede54c1fb76c5d07515f2da089da3064e507f5043c2581fe5

      SHA512

      63c3a43fe8d3d89c3f8fcb63fbefd45d9cb8b34979e190159f0c5b4c66285dad44dbcf728cb45313228b4206b1308cdb2bc8afeaee62243ffbb9e02a7adf63b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6cb6e515c96c757f69ac8506fc1471c1

      SHA1

      4af32daef638d4b0974f63dc8bc3111d0c5d1473

      SHA256

      48acaaaa137e7e7b78dba3d1299229ac7b11d74862554b793c3ba7d37b1b0f53

      SHA512

      668f7a3a8f55485a576a7a5581508b61f9a64546f89019a1b32b81904928b1367744a8af7295e13c0d3fa2300c3fa33b84a2760636d23f18818de0637e25678d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4bd2ddce9950b0d313861e3cfb53f8bb

      SHA1

      2e656c40200747800be0427d82f656e7b09c34fe

      SHA256

      28854af491c65221f146b03d65f73642242ca59a4b94c3152d99f568d80cbb8d

      SHA512

      a2c87c8e2607802833e0612082afda96f1b7faca5d6c2c83bd944b80b065480a0424dfcea0e8a9d758350464d7de4243a75716699619605df88536f596d72e6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1a05734f81172dc58aa302cf883bfe55

      SHA1

      9c3884a8c6d2195a71c23e242939fee72f6ac5f5

      SHA256

      aed2bbcf93c3a7a65ba04c6dcafa860bf4b5e409336d89218c0fbb0cf4df0ca6

      SHA512

      2980c9b40ff290d44a226e2e875a589095253c0f5907e1288acdf675db95cebd8ee911bd85b1f9e2386364b0871e0ef768f174f907407c7ceab0457a38bdeb3f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9cb8f190d9dfeff21c703fc5ba863d79

      SHA1

      228f48af456e0627d3e0dc3ec7282b15850dff67

      SHA256

      e48babfae3fcdf8a17e28be7afdacc456f3052b96ebffbb060d7f4049766857c

      SHA512

      c9e1a95f701cdb96dd8a6de8de68bf2ef2952732db6e9c6c7ec76b05f3251843ee56039ab86ab161a895d28b7b20b3fd5b44ad28e18aadb8873cabf4e8c88e5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      963bf274c0d620ae59b81222390e396e

      SHA1

      def906dd0eb2732056f1bd1e6285b5a0869ff755

      SHA256

      3873485f40d7a0a9dbdd90d2a9630cd252cc9111875c6280390e1f629499626b

      SHA512

      d8aefa3506142677a824ea73942d61424890536b6bdfbd7245241089502d2010d6a87f45edd2b9082e6e21de80f535665a2863ef3fade16fd994b4077e47f1fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0cd776650236badbecb684e5fd1031dd

      SHA1

      66dca9f1c076e69011634e0cb9e6d5f83100718b

      SHA256

      01c6e1dc9503f876e99f4cbc87a246b094fde9dbfba87b4dc75fd84b183cb00e

      SHA512

      29ed5172f5b47313df1a30372438abc8ed7cf1004067e29e359cadaf29cc25375c98f0229292978987ef26a835196307cc4043027ae95ed6342b1eee29faedc9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dbe740e744d51152dba607336ea6c4ba

      SHA1

      a196ab48618fa8453bdabf04e538cbbe6af56116

      SHA256

      3d285c8e9cca22a90ee86d52193f85edff9653152ec0505ab0c832dd1ede7b53

      SHA512

      605a4251ddec6da78ec63f50433d33689f8ae4f7359f4e0ae0d0dd5fff3c905cf53cf984cb82c64cb6a6ec5caabc45adb7001830ed14c7c12c1c000e109d9bd3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b4f888a7108d60e22fdd543c9141e585

      SHA1

      6ea46551b0a71716bc96dfd49459a7c0271a94f6

      SHA256

      c314771d55968d204746be416855ffe37b83c9ec2e789f986279edd5b39a60c9

      SHA512

      e8277b7ebd78bb11815c1b8d30baf560a954ad9af3782c2142ad2eb005d8b44673ec2f40ac37d236b37d25d30e35b9cb541bdc2e2f8b142b6322e1c2f01c54ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6bd51386d28acbfd1c2f426a4cb0d67e

      SHA1

      ec37e2573c96aaeadd9e2bd04dcf830b118fdb37

      SHA256

      9d5f4b343ca479bd2e05406dcb15f443265a5ea59549d27fbc800bf07ae5cfce

      SHA512

      77d2465f5a059937bf9277acb82ddc97eee33a7cc67601a4c4c31dfd7ad85c467e41b80fd7e8603bd50c5a28bffff5182eaaeb4ab418dfa8c9d1623cd8575f5d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d1eae02d841bee6d87f78e7b5f5834eb

      SHA1

      7a537c1e12a15da63eb6d9df5892bc478e0b16e6

      SHA256

      61e8bf4f939f35b9530ce6a7217e90d8d2f55de550c4985277a6ebb6000e59b8

      SHA512

      311aaf1377ae0bb0f526558c7a9f5d1b8bb0dfd3f62411fbace7c75f01f717e402b34117e1214361c4605986a4ff4128755f85b7a82cd275e54e65bb4c427a83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5e6facff37b66d498708e9d69c995197

      SHA1

      6ff9308e8b9f03ff16de9030b1f2450a2b9043c7

      SHA256

      0a9cb2b2e97700c7b9c0c1a746c3690089ab6a0ee3d9b7f98139fc36e4238d1f

      SHA512

      b354394204159aa9d6b7eac1b0450897e07169dd8ab57f1ceadf483e6c73c99fef3285674aa33e835cc82225f5e49c3722c0f5c76cd9968162350b0c96ec8506

    • C:\Users\Admin\AppData\Local\Temp\CabE0EE.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarE16F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1224-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1224-435-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1800-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1800-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1800-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1800-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1800-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB