Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 03:30

General

  • Target

    dfb8bc1abf1cfc279299d7663c187934_JaffaCakes118.html

  • Size

    158KB

  • MD5

    dfb8bc1abf1cfc279299d7663c187934

  • SHA1

    31a4921fe539087e1193675732468806b8b5d99a

  • SHA256

    26d1969419639ac98525dd5e7b8e724d3f1dc9cab5f55983475551b426d036b0

  • SHA512

    d5e7b7f771597c367859b280bc0e1f0c7154b11dbaa8c6a05fcee183d43ce761272522fe6b32246ab92b5b692dd02a83e1bc1278f18a43330d492de6921f9449

  • SSDEEP

    1536:iuRT/nq1Pk99I3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:ikUPUa3yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfb8bc1abf1cfc279299d7663c187934_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1220
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:900
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:209937 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dbaf7cde2d39b36fa9ddcaca55005c15

      SHA1

      216f8105c261132bbb3ee9dcac13a9469481c8ef

      SHA256

      eb54ba2e99d86406bcfc05b9f7a15fb6e85c4152893fb8ce6e574ba437b3ce56

      SHA512

      7aacaa81cba5741f0b674734c3c878f8744ab2620e6877a776137da38173fc71d18c97a0a6105ce96be4fef802757337186ae658aa67b8efc0a5b592fddac1ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      36a1095bc00a16e5f059c4a5b6981d5e

      SHA1

      5ac89e5cb95eeb447b7bec1ec107760a6a37ed2f

      SHA256

      a480ed2ae67e4569530bb72de9f9e5964b22c8939e19ba0b32f88404df22ddef

      SHA512

      54fde655459d4f5033cb1fa3308688a5fcab84f94d4c66e4a1ee5b6d3930862b2926abc635f2398ef8ed115c3456deae7c3449ee30f62b602ee93b83fa6a8847

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      712bca286fb481d0a7fd6808190f34d5

      SHA1

      c71decefe17cdc6c46bb684becc63951d8b1f2b8

      SHA256

      3ad68608b954b2d33e076b1936998172d3318f52ce9b9fabd509712e9ca0f35e

      SHA512

      d29ec83f11c94772591b177e8ff58af50a27bfc667c2c4e055810b3825ca587aedaac1759b549d59d6b3118a6f9cf458096d3eadc20ce3437e52ab900675490e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8d8b1cc17b104b86a4857691376a4990

      SHA1

      27c189262c12f932ca6471eca2324fbf345cd8d3

      SHA256

      10ff52779d44ac0c854be6ae4f08586f8332f3a48f20dcae4664d0152406c70f

      SHA512

      e5cc8ab7991bd25b41110cfe5246a75a2235efb8f9787f8769b114c0e42ffcff31b9fc41a05383cfa759dad46481b68b6025dfaf2cf4585fb8a86824630affab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      35d28b5826ba4e42f085ae9f370a0b8d

      SHA1

      b4010e302d7dd7a1c3c8244a8790332f9323e1bc

      SHA256

      49d3a7a746e889ceed55fb3d5512612d93f1513d59d9d1694c9534c2ad5eaf55

      SHA512

      cbc9dce7362261053a49e9e5050bc481bcc4a1cc06a12661bad77a4df4668fe4df6cd7ec0e49909b8f13813152ead1456c78580438dfbd70cb9cf5cf239c0119

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ee9f82a560e28959cc50c6329e51eac6

      SHA1

      a93ee7c46e02c3b4f5a07f4ff8e6fa083ce71c2c

      SHA256

      c64a6421f52f52c09a72664f0491c8f96568b6da83e3284c94046b4037759d27

      SHA512

      f8e548e6729c795281ae17d10978f443d47ecbf3003807a61f7f28cd8b7ea1bc85861b1972e1ec2d6f4d745b1be7231c9907a21e91d603ff129b1051ee1245b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      91390c01656d638cee73e2f5737ceb2b

      SHA1

      22980307a1ecd9c47c638b1e170b33e5b899f39b

      SHA256

      f815f2fc36b08bcf5726a956d92289f0fa7f4de194a5ebbdeff66490c7ab99dd

      SHA512

      4cefe42099c7167f7c31ef48db9ce9c97f382239086ac14617ad4c165312ac65bdb89535441ffded9ac3d4e17655ab4636c8cdb51c753c3ce312c4d0d832610e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d13c42f6603e6b9fb847ae40662a9b8e

      SHA1

      1b9f5a5888c1fa62af1d2b08bae42f8e61fd54df

      SHA256

      7cf62e53f419c7ac9caf73807c212b7ca225ccf7268d545889ebd5defcce428c

      SHA512

      5db48e318fc9d0309887fd3e1e6c52e5158cee57bc80b3280d866e97c05443905b991754f35245e76f753eea7ad9af3a2e168e0d5f4dfa2fb922d2b34cc38e39

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eac2d1ea8d57ceac794bd26d613fb3f3

      SHA1

      80cef19e4aaae7ef31fc256336577a966a70b140

      SHA256

      6226730357ecc206aea790afe5740dfcd17dfbfcb40c58b20043d427e6739dd9

      SHA512

      1a4aed782d39ab3c82f0dbc4cb5b1055620fa7ee7b2c0b7e89092bb9db6c77de7c48f9d1a87e0ec5b5342d16b2e4f3a73981b86af78560fefb21939ae212aaa7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      af9d848bcdfc952b644f4565c7c8e2b5

      SHA1

      20980187d48984e6e51775b8cb866fc1a2ef7ded

      SHA256

      96c9e6d1ca2191367aef931eb46c6a4c0773839c752c7a507084065dd21e1c57

      SHA512

      0cb48e251a9a6fb28c55643e54e5df014d0cfa8592f855f961a5399cc1daeee377d4472a9c407c1ac286beb362d2332b30d8c77449952efa0d094be2873e06ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      27b7281cd34ce435bc31c575c409581e

      SHA1

      4420e97e518674fcfa535bf2a4a86b414331862d

      SHA256

      2fa718154e4294d1087c45ebf5bd52231188983878f2d20cf602b9b0730b08c8

      SHA512

      b5b5399adc396537854659c30c89571b5cd5405b2f3e93105dd245b7cfb6556d876d5f174e5962341982b599e3b9ebb740c50ab35653af0a9e40044376b0617e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      95da4ae8ac5c2002ddb070756c0c53c9

      SHA1

      763c3ba3b0d62d74b44f42ffd2a257ad5dc052c5

      SHA256

      5923382f0a736fa4421a33ff6a7da4e3529c8c4da39a628b2648eb049d883c1f

      SHA512

      5ab81587ae23fa65ff6a16e6695c2567d15f62f0b62f67494fed6e9249badf93d3d2dc0bb6a8e8da2d1305092a129326c7e2ad651c9cdabe1dfd4df2b55eb3eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3fbfc50a66ee8186712f60a534108577

      SHA1

      e421d66b9d47b94abd31256248c3261f182ffb94

      SHA256

      0343da9bf1475d4d57c6b488a7b017d21fd1cb89855edc6dab10b623d4391ee9

      SHA512

      7e1d04ea341021926e7e8fb7c99450d44f98276dbaa5324b4beadca0775b4526df9d710263a3f0c1a3cbf865f3246287ba7fa7630cd1f2a860a9859b9c756a66

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bd74a56d699add8da619cf6f3e0618ac

      SHA1

      81de22731b570199905953663433afe6125c51bc

      SHA256

      fa027d904c04c3abe29dbd0aa5abbf243787343d67fd8eed4e305fcd96c30722

      SHA512

      b5ed771d38062a8ae804ea5c7a010983cc6746b541b3e6407dde5c47866fe119b63c61f7d4a41fb04d0cca255a50f6e93d35ea4b2686cfbdd004138a01f85ea2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      57dc0e9719590fdefaf5ab036f08e1a8

      SHA1

      5652e0ff25c0c9b6f06ad1b59cad16be3334145c

      SHA256

      64319a3c5319f5250503c2f2b2859e8c893cf3fb93978d8115f78bda5e02d3d0

      SHA512

      e20e0b6146638ace0e5017229fb75ab9224fd0bd842d573359e75f7fb9894a622e895b34c6f5deac7c09c8601411ebba5cde0deb6cb53804ff807ff2cfde1fa0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f6201522a34dad651e0ccee494ac3c51

      SHA1

      126a1afbbd84c8e9d3b9d18706fbda38c7dbb619

      SHA256

      07fced3a1f5740c775fbfdd20e7228fd52a3e224fad86cdc945ded72f49e679e

      SHA512

      117061e68784f1f448c85ad8575ef8daf1019d0bca4364d149246eb594d22aebf3b9015a119035a465874b7e05198255ebf082033439f8306de20e44fa7a3a0f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3d26838686355d7a665e3ec068aa266c

      SHA1

      ba8111a5a6c535ca16e7da7a04375256405e0874

      SHA256

      596433a5bc883de04b10e5e7d9086e81fc5435b386fa76c60e0c60a4910d2474

      SHA512

      b68fe1d1fffada3589f2daf02dede55cd34f12fbab9ae89aa42187e73d44ac1e1f251877e5048c472c6a8a5966139c61cf69b5f7d83a07fbf5430198ad25e9af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      44e81fb70dd6c1722d854ceb2afcd60a

      SHA1

      a7a460b8c3e7729131b27bebb7481b81cdb3e595

      SHA256

      5a8f044901dd3da111adc7854fc27ca97b597e4ef9d3ea651ea97b5fe7c7a02a

      SHA512

      2983cf6c4a31323ab5786d5cf6461cb281a3e645ea683e15101b1c1c009e60d44375d4bab748e01c823c6a1a44e4533b78fab621aa9dd3a687b063949c7ac248

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9fc935204c6f4964b3fe13e946959a49

      SHA1

      1f7333de9fbda461763bb9060a516c7f219011a7

      SHA256

      842ddac9fa326b9b6eca343e0dac67a019389064ede36e223add455377954d45

      SHA512

      fcae220a2cf6406b889933984f9568b91a46f9b909878a5edd014ccce7511401bd11ff828d44dc2b405459f687b35cfb5b02f3f7fff4bf35bd15625805b54515

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5e282ab08f6cb2c3a5968768c96c30d3

      SHA1

      ddef9012756d744f0eb92064ff0fa1675c5e3b19

      SHA256

      8e381d4b8aa7bd364626b0cb61fc2206b71417fec8cabaafbeccfaf8f31d918b

      SHA512

      b0906330768186309716031818f419f67d358f44ccd731dfd207b50835465d2f557da25b7da4e82222a9a4d03da0a0bab6b1104229876ddf9044943af66cc21c

    • C:\Users\Admin\AppData\Local\Temp\Cab7C33.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar7CB4.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1220-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1220-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1220-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1220-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1220-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1832-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1832-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB