Analysis

  • max time kernel
    132s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 20:56

General

  • Target

    e83e34b204e77abc4d113c5fc64c63fb_JaffaCakes118.html

  • Size

    158KB

  • MD5

    e83e34b204e77abc4d113c5fc64c63fb

  • SHA1

    3b08b44d3e46894f09abaca32cabb096d962bf91

  • SHA256

    8449880c56f8edb1b1e56f6a027390c08d50652b3bafe21f6790ae9a69da4a06

  • SHA512

    34d68be02f9755d6cac359684bcf631d02c8849518c2304d8bdd4dc634e6920a074e5f56ef9f45c726a5ce8fb29df52b39e6e292687a24e7fe3bafaaee5019ad

  • SSDEEP

    1536:iERT550LwRlOB0TxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:i2G5uxyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e83e34b204e77abc4d113c5fc64c63fb_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2240
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:996
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1848
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:603146 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8f3b52895df7e1ffd5ea24842a00254a

      SHA1

      08acd79a44a4c325a4f41e6f63d6d6bda02eb468

      SHA256

      2f84eeb6d6ced8c6499bce73aca21955d587f84a0ccfce556b807853cc1c52e3

      SHA512

      4860094299a6ced5376c733126dc1235d7b17d6b406e0da9e0be607e733e43e2a9963d2d700287ca86561b814cc37931e130395615e02f1692140486844ce5c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      99da65c2474d5078d541cb1853d6a1c4

      SHA1

      6d12c77904a0d03cce9df1065df57deb45d82600

      SHA256

      78f018093fc54ac4381f64d35b5a2fd56b39268e852ae6ae9757b2c3b7f2a4d6

      SHA512

      f95c0d1bb30b9d634de5abfb5f100f2ca27b4a59e2dde1c1892f54223380569f3e7ee5e4073ad79ce9d2210b13e3cfe493a780682b01758f43acc68056c94dd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ef84f070bd140ba827d857e24e35c961

      SHA1

      2026e9a60d640d67aa7be5620ac5931b0ec33e14

      SHA256

      73bbf65b93e4b553925fce173201e41564b883f97fb2d6b71727eaf606b09b49

      SHA512

      34ea3174b8bae92699795a5c15f6e937f60c838685d85bd8bb71ba24c5aa2d9e03fed53f00946bf1c78c6644ac61e258fe6c2a3556080891526574692b871e83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      695220e5901a6c79b1815f3a67d3c504

      SHA1

      e8917cf2238f8f69331e31ca32a4c8554d365625

      SHA256

      3256c925be450b9284b4f5bff49539b541c07dc8b4271c8d471a4e41b6153e4e

      SHA512

      bc2330143987f59452ce41029d5b6520665a79c5abbfbefed2d68a5cd38c9251f6ab895ea94815e618a7344d1c2c60b64b4e7c86fbdf16233ce630e09dcb9d4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      26d0a331750392999bc103770bc4e1cf

      SHA1

      bded943b5ba86be0ed975182f5f4e5736e82a933

      SHA256

      dcfba8c5edd38bf9a1360f4b6aa1f02115b35af5242f6eb1e54040a034c80ec0

      SHA512

      893c5c8981b52eb6dc0a4cffb52151d64a2a94ae898ec60528fae9dcecc783aef1a3733300de1feb1762d0d431ce99db856ce3e87af4d21409c90c38326f043c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ef2c5f5e096bd039280194a634748e48

      SHA1

      571e6fbec14dd990e16774626d5f9ee8c023da04

      SHA256

      b635f86e3a191314af94f6c8d784315bb27639627b82a89d82fe6f1ea5f438a0

      SHA512

      5d3f4ed6d175ccbac54a7a292dce43606ca6dfbaf0f2de134fa9293e1a9f7ff51d7f27e8648a9790ab49330ec8d4584108bc2a0a0074325d365a04e15f824140

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      943372340c15bb7fe456105cb350b689

      SHA1

      e2fe33d509e4e63dea7acec3dfc14caec8c7ec60

      SHA256

      a113db4d95cc008a9df43b3b987ad02f6e95bb1b357c6b40e818fecb88f69e1e

      SHA512

      525fbc83445e11b7408f23853b7b33983ab9750cd528a4d97c9d2ebb853136894c819996cec1a890bec86357d729bfa3a2ec8a8fd21a91ad1f074e56023af50f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bbe3707be68d8366d9ed4f5f8594adcf

      SHA1

      b6507c3d979763d44db28f223051a7e0db472810

      SHA256

      69a21d1aab3e4ee2fc7339e6eca6ab4fc7245e10abaf91e34c6c99ef83bca993

      SHA512

      1dfb52992abd51c3263705a3d30caec3da467715d8b02d0b9555b038226afd4a8a769e4dd31f053e6179921f906499c9ebdf14df1cfe61bf56ddb42b20a52654

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      38b422d395bc0357d5678f436742cef7

      SHA1

      e79da3c00d6f144b30a1f4ae214a9dc34cd74d8c

      SHA256

      b17a19d71cf7f4565c77663756cd3ff51282449250dc7cf14727b5c658e2f783

      SHA512

      7818f93b6dad5f0d996bfcac19592cd08a3e05206121a632b35a3546bbaa596d404f14938a164e18c646bfa68047bb04a6d6449a2593837e12fd4cafadbaba9a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dd212e10efca74f9a7f053c754f735e4

      SHA1

      44047e40b697d33a2c68d2627998ef4dce304899

      SHA256

      9fa5e94b65b74e6b6550932d84c82086a888c57a6d6a780456b428fe16062dfe

      SHA512

      871e6331232a89a8e0cabf0ab85600b337fccf98034d4c9b5d82c8fa47c9fc5415f2f0ff15b8a11311a6a37aaada5414f6ce808abf9d9878dc290863af942a2f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9111cc11e3957b4c00184a53f827c625

      SHA1

      3fa9855086554e3a884d25e8b3654a8090c0023a

      SHA256

      33b3164fedf3802a744ef18f62de115f36d11ee15edef624696f7e78f9ea2e57

      SHA512

      8d3a48e70676af8fa726d9741d2d47709b2c2660556d81b87051d37af0c1d6556b7149cb75b73d580f03ab0a3801cf948f60d9319e1105247728763ad5dfdf66

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e2f186e7c2b23c10f99a5c20120afc80

      SHA1

      983a207bcbf72b1f1dd5c065bce6486ce9a1c94a

      SHA256

      4df632f7a0ddf73fdb0f8f2aca79b31039f8552baa7336c2873b7526a30a1f19

      SHA512

      daa78d90cfefc0303ce9d76a9c573bc6fb68cfc57e4b6887702c7efa962e142dea4d184ca0db6d8f11868cbcd6b70b94fef26109253c5e39a3563b0a98253000

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      12d4cab5c4ceb0cd5ccf36af66fa6400

      SHA1

      4f6d0c1329bfeba6a0c291ff5ab8b48c6faee80f

      SHA256

      5e4e49108c4525b0c3975885dd53a3266697d4ee76e24c4b90241380243c7f7c

      SHA512

      961a7dacf7c42ea6eaa2da44a48f8b9418f952b329e0d2dce44c83a65b84f945092451892cb43c3162ef61fdd4c9d8b4684037861b2b0d23033b4096b5993e21

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f80bd923ae426ab54e97408722e71170

      SHA1

      e498054ebb7c1574ed76602c9b466ac134218b84

      SHA256

      480fa20ea3884f8516c2865f22a417f457e9abae381118c6df9e1482146dbfa8

      SHA512

      405173473e88946e6d67ab5613868619b78a22bfd0d8ad5afcbe05149d49120bd33f1abb63d89db164a7bd5c4162acfcfa3002a98e78731be4f90f11f5c8789c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      46df45ea35996f91227d21871806cba6

      SHA1

      e9a7d7999afe2b7fa2ddd785644b17e2a909d8f7

      SHA256

      c3ebe49694295950439d483184ec11e07c3812c39a11c163ae2839f391b13eb8

      SHA512

      21584fcbedd779946c484f710f6fc4c1dfe4271cf2d3e443b2d594bcbfaa5809dfccf429696a4595d80f4ba7da5e7b2f8591ef48d3549a0052de071aed2c8547

    • C:\Users\Admin\AppData\Local\Temp\CabBFB9.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC077.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/996-452-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/996-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/996-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/996-449-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/996-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2240-441-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/2240-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2240-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2240-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2240-435-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB