Analysis

  • max time kernel
    132s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 01:31

General

  • Target

    e41766502d9d8d6ec86aea0c82e6663a_JaffaCakes118.html

  • Size

    158KB

  • MD5

    e41766502d9d8d6ec86aea0c82e6663a

  • SHA1

    2447840016a375895cdf3e812a65dd1bcf7ac979

  • SHA256

    12607e51f9b408e8339d68834943a9a25cb3824391841143d38086650e4c1cb9

  • SHA512

    259d301fd828c772601874b15d4e5eea40f633381c7622ba73127c0b9ae052f3f31482c43e34255db20cd4b4ce478505fb9ed95c8b7bfffb9e7f2c77fb99299e

  • SSDEEP

    3072:iw/FWMQJwyfkMY+BES09JXAnyrZalI+YQ:iCH8tsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e41766502d9d8d6ec86aea0c82e6663a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2280
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1720
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:472080 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3fe88165d00c586fbd506b9804ed0e40

      SHA1

      2fb79fc4a9dbed34338e187e84ebcb7d7db9cc33

      SHA256

      aa907a5f8b29ee8edfbc46a439e581cc2df1139498b5047714269bfc390cdfc9

      SHA512

      460652d344ffbe606580beaef0160d0691bef7362fdbd15562c96d9c4279b8db2f874e599807e1ceda1f94e01aa9bb058ca5db46f921263b93d30b80a59f8637

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2cdac42cd55434d4fb47a36cdf43ecaa

      SHA1

      fe134dfd5667dbe199c6f91fecc585330621ef94

      SHA256

      0c7ea95bbb52cb704b98d44ba0696a8187d96e7d4959248d4116497ea6b3834f

      SHA512

      0fb6ba4b680b9fc9eb2510fdbb17cc8bb711e7e2431c8262147639b40df1acc84ae23270e56eba9a5feb948c9566f3938999ddb0bbe83901d1490d4be7f51ac3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d37107939534e6b00234ecc3fb6a4b7b

      SHA1

      bc2c92de6a4c91c91aa1fd15e39ab49b2b805f78

      SHA256

      109822778324348042a29a11ddcb5c103861eb25d79bfd54ca54b68f7392ec6d

      SHA512

      ce0766bab6f6aaac3fb1da2f3ae30e428a15ed088cede3ca23956dfb1403d4c2e0b92f686ffacb9f49cd3e9ce8ff1f2e7f65ef7bdc8cc8540777d775fe3f2bcf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7cdfd2f1d1911fe3be113dabced9c8a3

      SHA1

      9f365a1bdf08c2c758d6ffad69daa0cda1bd3bef

      SHA256

      3098f3a911c2001a2a456561ab102ac6de1136c9b10fabf6a55d833d449f0b6a

      SHA512

      53350ae5f4b313f708468df28eb2a34d9302739b6574d151fd45030902d0ead81516a41d438c40010c5001926d7da4c9755a1933573844ea590c5258531c2c56

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bf8d5f21fb5cbcc7104ffeae84dd2ff4

      SHA1

      3f0c7b987a63269fc34596e6ad0d1afdcf495faa

      SHA256

      b6f179358b60e0beac0ded8f0b15f28d8741a8591186df6dc049ed8e3a1c1cf3

      SHA512

      94bbbc5c275c1b8e375c3b4f266e4e57719704881a93ec3a8ebe3974c1c48499942dbdcbe28826cecdc455eba4bb96a380f19821b81ba4dd019fd1f77e44210f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d68aa3899fe54a7de38bde5f5235dddc

      SHA1

      df6ea71c62161bf455e93725dcd087097e7cf51f

      SHA256

      a0f270516c848b18116d5d5923a231e7a02de890e4518d23b2ad249bc8ae5063

      SHA512

      bdd51e633cce9cfdc1561d4150f9f23b24cb006f396f2a7dbdaf873e04b4010b3fb7ad40806115e58e68b0683a7f1aeefa211029853b30c89c906e930e6fe9ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      610045550e074ea61a807ceb3913e131

      SHA1

      d0176848ec4b01f6889e8e4b5477c1a2682c8ddf

      SHA256

      3c4c80b51c6a41004f0d158515f6bfafe44658e8bc8accd020bc4388eb535cbc

      SHA512

      4f9678c522d6d892a7b94cc06043f457463c5293b495764164dc9aefc80fc43ed2917a4f28b277bdd17c6f0c763c7b76fbc30c3bcb1c60ed87d220a082e5e7b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      62ed50a959187078471fd7308bfe09af

      SHA1

      7150ee4c0ed71818a77defb11bb35f08daf0f0e0

      SHA256

      c6ceee856c664c4ca5f4237d2403fb754dcc330c6369f8ec092361f28311e1e4

      SHA512

      6c90dfd4966e51409bd1827be966bba36f7c0ae7d58630091a471e1ea36fbf0d4f2c28ff538c8081d9f060f54c26d74629bcd659e8d6c099967c2191a336e3c2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      934b929e8c0fda8eaa0194aa97fab4e0

      SHA1

      608e4398915f61cb74452a1c43f79e591eebf592

      SHA256

      74493700eac037e8e2f73791c04979d6dadb5292e6ce1ceaba545628e31e8a1c

      SHA512

      0ba3d798d356e7aa5ae44db5ce65f72453b6ea6b03bce525f5c3fd52e320409729bbdc92e2604021189ba1315e1b09fb8a9bd82ce7df4c3c440d524e983fe5dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4fed0b9aa8ecacd692e3622882460d12

      SHA1

      979f2f58509b497b334cfa8c7dec0dad01d1ed9d

      SHA256

      b21a4ba3b63c08d2b7873a31c4f0432ad5723a1f6fd97f2f309dfb52d5b8ab6a

      SHA512

      3c2808ad091106db584843df013d681c334ff181aca06ae302c6f15ca99a3b242fc0806ef968ff3cffc0c1dbdc7bbcdc094313693a6eba074c96d0352740fec0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0603445dc7602ee34bbf2f0e4df7912f

      SHA1

      1561c4b94a6770f1ceb9c90fe588e5567a24d931

      SHA256

      d9a881901c7f669423c32b7389fc08c726cf143f6fe460e03ef2ac68a4a9379b

      SHA512

      5392e7b6d11ab48b7ee82748f3f1143e194d639a2948d754c9c8cef46df13e639ac83c93c29f023c1ade4602eed764739fec138ddfda05f38a1d100a2efe1433

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      36f84bb7e0e847a8a8b92d4db8dc5a96

      SHA1

      6c786ef73b8b83e0604b9abdadaa5fe6389ded29

      SHA256

      62c794c073b1b89732bcb7d8d0a92fd0792b3900a9c74bbce1d52c39145fc138

      SHA512

      e532f4e524c97c012407cb4d37c0bdd98c614641ab277b472c13ff6913e71f5830ac9be0b1955866edcb9ce9619b1bd5d6a7f615153191ccde6fcd0764939ddb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0a3beb151de9e55c35499078857534d5

      SHA1

      35f6e2662ab7c02826805d5bfd7a163d81f21355

      SHA256

      1473ea63a886f2defc67f522c57455dae32fb21549019f8b67d4726d048a606d

      SHA512

      44823d4840e1695fc5425d609a45abac0e7d75d19f61737d3fd8a4fe1f9bbb82a092d23b11ddd976e943923190692832b9486fc010c078c254c3f60772f9f94b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bae5313c712a90504937f8f25c19811b

      SHA1

      a79cfa5ee692bdf51bc19ebb543be785965a8e05

      SHA256

      ff2634108217a2214f6d5786081b443131ec4c15c6bb81deda2630bda95a257a

      SHA512

      c86399f0248d915e97b665f5f9a9987763f1e80e47af730ed0e608e6b4027f3d58e94447405e7f401a493b59b50249d24620bda1fecdb617d7065dcd187df1e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      753b306aa104a14fa39599abf01521e0

      SHA1

      f532c9a862d58b5d742346f776e8225ca5e5b0c0

      SHA256

      5b4c9a5f814d07ce7221f3608a093d5b9897de09703d9a84f96b3fd49ede6554

      SHA512

      7f295856765ee489c08abe870a5ba2bd768a9075ff6106c9ab3eb5dcfa9b07730ea3440103662c1b5f757e8727c842585d2c36c8a2bbc7f2c9dd00f1c446676a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      44cdf5f1cda97ad8e432c70b4152e3a7

      SHA1

      af6c828da211a6d24ce3013d56eafdcd3204c6b7

      SHA256

      2ea57685022e891f2b1ce62695c214520cd129ce4b178b1f86143ef1a1eaf8a6

      SHA512

      6d70ec6bf7c2cf717af9581bc5ae02a0a7607076158186f59c91d839081208f88f08ffb853f09576fae4e845d3580958283ab861e82c027b5397adb9a9b7addd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3f5c4ad178f893cbef4f2780a9935649

      SHA1

      78fd0ff20ec1a254cece20f9192ae0c06014b93c

      SHA256

      20146f7f73c1beaa1d02137e62438bf5c7b027f2931b72987c7ed6595ed98a7e

      SHA512

      780b3f2e7d69849fae7ae5f4b1a4333ef0642e7b20461d1a0e380da3c4a3b37cc3287d67a946702bbf542293eaf6563f25b70f8f710e272a0027bdf91a4bd5d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      534af147119f44721c660437b35b050a

      SHA1

      6eeab7b6616cf3e7fc05e9ba1a8720de40b38d84

      SHA256

      dc8aaf9d4f4a3f5957602623558ea38c93cc992e5486bbf60f15f8432acc8cc3

      SHA512

      ed9ef00feb4f9d38e7539bff89004bbd5e67700b216112c803c1ee4f1e4ab7ca19644b117952c64a014ab5b74511ecb3d5575295bc3bd866f37c7f9aa9596506

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a9fe31e050a3eccef829bc2b361b881c

      SHA1

      9f87862e42f93f7bc626444d69b3d41bb9c8650f

      SHA256

      416f610a7f78a15e30b4fd16b0f52ddc5f95492ca602fb18747b026ed856a45b

      SHA512

      244f4169e4b877e9a5c4d02e813ca177d9a3469c6043b7d3687c4c360fc1803d5ee552ca2e7f9f07ab6678fab33a55e8c3a76b6d2d98103257ac0b98099c429e

    • C:\Users\Admin\AppData\Local\Temp\CabC6E9.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC798.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2280-447-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2280-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2280-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2280-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2280-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2288-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2288-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2288-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB