Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 05:53

General

  • Target

    e024cfc1df0d529509fee518af6622f1_JaffaCakes118.html

  • Size

    158KB

  • MD5

    e024cfc1df0d529509fee518af6622f1

  • SHA1

    625802e74b3bf47260ce857832d376014760b21a

  • SHA256

    f675b7b0bc76618b54aa04f7f18fefa6755fac88b684933c5eff67b0042a561d

  • SHA512

    eca4d35679c73d566414927a0c6936783651f1f9e5d9439c828d3bc012eb1b8d1ef4c686b529fb6cff2d77185a3e072513002b4cd6fdd194634cab2d0099fe29

  • SSDEEP

    1536:isRTXVRB4X2hEZm45yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:iuuPZm45yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e024cfc1df0d529509fee518af6622f1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1396
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2968
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2444
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:209943 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0191c32ecd0bcd40e5eb44bc953ae048

      SHA1

      7475ef574d5a66165c8b52467329806225ab01a4

      SHA256

      1f686582bb4ab4464785df7f5a335fb80e89b0fecb37f596d41e4de1e42a5a7c

      SHA512

      e2074525d49bf505a21cc179ab414c233a9c2405c3697619f9d94b6f335f9109fd667e9701ca1113cef5a5807020095636a7d25c4db34fac1c25f0afb4af7e3b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      df1310c90108fa25025bdb323eddb63a

      SHA1

      258506db9cd83db7b8f842fe044f65668dca09a3

      SHA256

      d21244bf6314a0609683fdf62ad3fa6eb7840f412c2b19187e2a963fa25800b9

      SHA512

      e9b35382515bc82b40ab057c69a97f18ccfe54d0b417424beaab152e4665eb36a19c374d4f06ade507f91d116aa6180d4d534051c9ea4934e1a3e2b606625f00

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      442fb2f82a2e36a2d8d0b9b9cba54ca9

      SHA1

      1a57c8a6e7978088155dcfd6eebd7d846e733abc

      SHA256

      d46414ca9262a3d34a66e627e27512bd37431db5bb6feab018555513f162736d

      SHA512

      8b867f08ecc779cabac0d7ac1e0aa9d5fae14e6d97723751e596a9ef2282f6e97818d5d40b0d508f38b5b2b59a10c39c4f759afeb23d496b1b7a412a95de7bbc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      87a051ca15b029738bbeb125bab50354

      SHA1

      b410aa0526e9ac966c7ed1143c979a04411e027f

      SHA256

      265cdb08975f2071cad8e12ca981815a96f31b220805a3ab05aaab002da2ee11

      SHA512

      007799ced4db0db0c000fe02cbad7a6e8349785305cac66ac34a75bfa20075cddb1c6c351731ce22b26642bc0867c6da7eaab957be5d6d1f0e997fcc7230f6f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b1f539daa148426a0b46729af6d5b83d

      SHA1

      176e1f0ee39c8aeef57813fc211040439c85d12c

      SHA256

      cbe25cf0480ca4449442b7bcaab269d1e00aebb021ffb02395474ebd997f40f1

      SHA512

      21e9fd86eac487f3ad924cb818dfa221179872f425e9b3fb680b83e5301cae05a79cb8d6a799b8fbcb4228cd3c00017d46ff95ac6713df6d0d99b9c2e8900c77

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d77d9de85ef96130edf7aefce89101be

      SHA1

      5f857b37edc75d5258e66033a0ded57fc10a1dbf

      SHA256

      7cb8f6bffd064d827cf34625bb4984233343fbb3011b78655f7f8e2fb2b6a08b

      SHA512

      7b071d39eb7483c27818d7cdef16098fc3ff2e4eed253b84f25dc6cf5b1a3fc39aa45d38ce7c0a7f475a392bf6f92f1b5c270c826c5c51f593d4fbb68e148228

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6cfdc8339824b5ee44c0b2b97b0d4b22

      SHA1

      7238aa4cc69b2e28a648d0f1bf02dede4bf6705f

      SHA256

      a92e9834ee081371371fec6951f6dc7e0b357323064f91b8f659db23ca66821b

      SHA512

      a017643fe2a1895977aabe7e5599b68e94f3801cefb71c293d9a3ce731eb65865dd80c0ca816aa34c933a5c81632145aace8f5ad2d080771be3dbd85246ee278

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c6954b07c14a235b6cc9bcdd9d7c3209

      SHA1

      957e37215449ec3440fb88ba25bd9929a5fdf824

      SHA256

      9dff893c3e87e98d8e05704a3162aed322221d3628147b092e979d8a8675ec11

      SHA512

      d4b7dc3314697d46c2abff1a7f1e4c78934f64c1029a1a7feddd7e1a400d9ce24a275ca9ab5df94d1e2763370325100bdb0fb18b8ab7675645a483cfbc033ce7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4cc5325507d89d2e874864792d989cba

      SHA1

      5cdb3e50bf7204e39d436ed947c54ca31c7cc97d

      SHA256

      06f2c8a02b57b4286ef7f2620be529d513c1e48ee750c6c1e35dd08ad9823ef9

      SHA512

      2e0a5fd64d7384abc53c25995f678b67a3186bc317f34f0c6a3f39d57c94d2eb80f4a9320b83b4006cb60174c548bbe1b66c7b21fded4def9d7bc104dbaf14bc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0bd4a1872f243383f5819022e68d2c20

      SHA1

      8c6b446b8f5dca4135b821c9a04ab22a145d0233

      SHA256

      34ddb4063ef75d924da63dc6d60252a5b8f3f26f43cc22f4f5831b86e88dfc61

      SHA512

      0051895df29d91f384227db9531e036218d1dc5e56bbce9fe962e34f901dda1cdecc582bbe233dd1159ba444a3505b4c74fc7d852492e69e9ab87f6ae0038d63

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8a72b3244a7101b4ecc8c897dfb9f7c7

      SHA1

      c2de06e1c80764c49685855108947589df1f29de

      SHA256

      8469dd969f187f5b613a38227a8acf12ddef94d321dc1ce7121b55b2461ad285

      SHA512

      1aa803ff314cac187d079baf44b3cbe4e8bf508348b4a3eb37763b50331e47cfea789c7323a22cba1f16000b6579558dd5b86b4d105fb8c103d5fe1c33692c45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      83de5b29d0bf5828c0177612ca77a39a

      SHA1

      10d3177948f2c7c84e9866ebfb8ce9be17564afd

      SHA256

      1abf5772f65a591b51be983ad14b99d6f74c00180202df6e2161f252e251e4e8

      SHA512

      9928954739be9f92348d17b022bd41bda43b574837b6dea404606b11b3e40f5efbc98cbe7d07e31b2a937f7c9548121c61f563abb23e5caa51bb52653abde3e0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d6d5e4887a09b9c181ef1ae973164dc8

      SHA1

      fe5401a01a3d2717d4d2d8680512c25800fbe105

      SHA256

      61820eb3a25b35560847070ff78bb8d4f60579c2e28647150bd3f00dd4154b8b

      SHA512

      4b510e61698d4653002e7eb7b1f075cbbd9d8506358d6dd354b3985031c2008cb47a00539469773bc11648ac38e6b6584ad4d6e60c7c9f84a36eedc74a0ce27f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      91dc42ec0ed254d10fb70f67e5066571

      SHA1

      0efdb0429a846f87ad173b8b42167a591a6adf1e

      SHA256

      08b4315b28838f5ae5a876083de78564b88b1be673c0120993e1dc4981daebcb

      SHA512

      ab61b209298fb64453d0c8660b4e0b6ea00c3b571d88bb18c6b76f900c4fbce2d6993642d8d75bb7228524ff4368be13778f3d4e62d166ab6f538ff663f93481

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fbb8cecba026ee536152f0ba4af27285

      SHA1

      3a0381c2dd15503a3f19b786c220bdb79147413b

      SHA256

      082d38d93b53040b9cd505967a6336788a079c2850f351cfe989f935ce2df585

      SHA512

      906a874792c9fc9a196c89dbf2a73676d0ea0daed46255a3fa10f30311121a2cc645356ec69eeaf5d6199757bb7b952b77083e911de174ff63ef5fb35b54ba6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0f30b3aacf61e7561834dd070ff91e84

      SHA1

      714b73b196e029e469a7738b76c766ad2baa9eff

      SHA256

      b0070403bb328f5206b193f0dfc4e65343b640425867f58897141c6205d24f19

      SHA512

      055bf09e9357df88c48db38167c153f10b1c4001299737e7f854ef5f2952a56cdae23a2790083c44956739d11abe0c141ad7b673a683f16d0f7d29623f4663d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b8a7d2d4afd77a0021ea6d41aad7eae7

      SHA1

      ffc739fc5fc8155b2c18bfd8c0780bf33ac9d753

      SHA256

      4dd95b83a13de1ed1214459cbd608404555910e8210c365c2af2ea7806db4bf7

      SHA512

      98a9c3be2206973a293527d68e4709bf82e86b81b88bd2015de1dae78371d2a2f6df333d5334a978feba17dc54d11e85fbde40811e974b7fa0d3a2855c9a648e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9c33c314a7811ccd3acef92c06e4574b

      SHA1

      c7878e66f1b919a90f01787e6929de049df1926d

      SHA256

      513a2b0608bc73b0b11ee9824d674fb0c2e24ac8e6a759e27bef75b6edccd4c0

      SHA512

      428dc5e87c316851fd4fe40860f8d041e376e1e1259cc9db1b795d8c247666d72e25cb45f84df09a72482dbc16c9c08ace7088c1e1822e80c49078ce2f4d0273

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1256e749492c9a057a70f027cf628db6

      SHA1

      be0140a1adb2c2ff212cac16ae54a07eeda3a55c

      SHA256

      5473d2875ae26b4e8723c500ceec4f8010f657b744c0f5e1734217c0583654a0

      SHA512

      81fd57a915d33805654f7bc0bb6abff4750ceb1b5dd2b6cb473264b552fee70f99126c4719710d3eba075bf0ed83c91bc47517d1689e18ee501e27e117bfbf89

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7db074c7dbbc5cac1f2d48b41b39eef2

      SHA1

      6bfadfd3cb8e6b03707219ec6ccd73b6b621cb10

      SHA256

      9dff6ca4fef0f22ac3d0bbb1d5adc1b15612eee08a882d0b9cb26225e7242b09

      SHA512

      6473f1a3240a10743564a6b303cb99a7b161c97433ca938b7eb16cc803dc6affd6481f2f994aed19669cd2c7d694a703671f373ad132147aebdcc72b9f154ada

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c28fda0a697dec34deaf38ee264395ae

      SHA1

      d807921fa13fdd0439ea1c80ca5b95a99fa81e03

      SHA256

      4f40f85aed052922583c46e501547bcc3fd9892c4a5a4bbcd503c4a98bdfc4d5

      SHA512

      8d0a8b59eb9568f539246fe32181251ed7912267ac413d92d6b6a79a86d4cb9fc5002764908a1497552440c35642c74d82c8b9636c4c4b711639019664892e15

    • C:\Users\Admin\AppData\Local\Temp\Cab8317.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar83B6.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1396-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1396-436-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/1396-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2968-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2968-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2968-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2968-448-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2968-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB