Analysis

  • max time kernel
    129s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 23:56

General

  • Target

    ed4dc478100348dc78b9c1ee4df560af_JaffaCakes118.html

  • Size

    164KB

  • MD5

    ed4dc478100348dc78b9c1ee4df560af

  • SHA1

    e0a100c649c350a1544281fffecd25e90088ee2d

  • SHA256

    85ba65ce3855951ae484e63eb9696b90772b69eae6f32385c6bdd03511f46b08

  • SHA512

    cd71b90058084927ba7416297b8ade25f87fd3ee5deb56c664f83f8b7817da2b340c296652571ba3fe6e506bd1c8dfa48957bf81835e516c7846ce96191b5bd8

  • SSDEEP

    3072:ipEWK4gumPyfkMY+BES09JXAnyrZalI+YQ:i+g7masMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ed4dc478100348dc78b9c1ee4df560af_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:908
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2244
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275474 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3ab1cf842aa836a9333f32683e151a6f

      SHA1

      25287aebca54585ba963936f7aede656e2bafb82

      SHA256

      98c8177d062713c1431400ad83729ee1f4f4ad7d5c77b16d804e57c48ed3f9b5

      SHA512

      c6069072dad8d0481ee9f8e571136ecc4cc3ce557945df09fb08b5fec745f476879945b156cee8c4072079f4c4386a86010382091f0bbcd71abe9982d2da02d2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dc0cb6425ab0b22420b960cf72c36e80

      SHA1

      dad6d4de705405b852fc23e713aa258f8e42d265

      SHA256

      cce695a16bbd339c735ccb4cb22e85cbe6e5c768c52e0fca674a299069e34539

      SHA512

      c00b09ebc5e9189af2211280ea4ab0b57839e91bb84ccbd570b25116e2bbee2aca7f1720c25fc3067090203a9ac888faf35009166829952150c201ff015af076

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6c35ed2d5cf19476bba00f9c2dd8e7d3

      SHA1

      4ee05f2f3ad9750497dfaca91a6204010b78e7cb

      SHA256

      523ab31d250c5e0fade8a0735c308942561e013ea8289415fefc99f713da6d82

      SHA512

      63082778ed6c2e36f36598ae234573d7949d535d9a7444f7519c0894388f643c9879807c1caa3a5ede0d098431f82a1a34b81228cbe17522123d8fc5e525cc12

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ddbf28dd1d30449af2617797e5f37c1b

      SHA1

      0b531715a224928c6ce2e5459e407c42287acece

      SHA256

      11c590f2bd7a174a3eadb63f337ec4ccf132f20d207eeaef36b38cc75de5123b

      SHA512

      5367f797e555e1bbd1df7e9705b5e968352835c2a610743aa4f24c026de356fbf70f86c86b185b6d5b8bdb5b01f6cd5d53c70859b98d9dd3bf7f738b2394edc9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7e2ca882baab197ede5257cff233e4f2

      SHA1

      1a2bc8c6f752970ff9397a99c969fd77e4f4e4e1

      SHA256

      36eef459df368693d9a47d3c2bd792828bb2cda015696b93b4f4d4d86d5b339b

      SHA512

      e132a5c5332a10ba5b4e59d734759856abaf6b36f15cafb4a24af0c32b959c911b35f790cf71e0ca2166ce7c7bde613c7a46a7d95c0257c67b8d64f19fbe68d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      da17269f2b99b064406523fa0f27f416

      SHA1

      d700ab1df582db881ed447cdb82c4b40d87ff355

      SHA256

      8e9de59c2a814df458353a0f1f460f81bbd4b81512b3b47416791600dc8de700

      SHA512

      c7e3ed5104cb3a4490a9baf5c1573fffcea9c16d3a0f22d5fae0526ca13c94b8cd206ddd73724a889499968fa0daa106fa433e234c096b94ae871bfcdda68749

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dc8a85dd948152691a5efe6fede1a608

      SHA1

      53c8e51f99c45bc0755e814ee6b1fc90dc7dceef

      SHA256

      e844b8a5e22b9461f26d37bb7f2fdbb7419a5e4a7539ca47eee40e7328259d47

      SHA512

      22cc6205798a282d0a22b09459735c4cd3723212b91c7ce9ffc814139bf2bf58dfd96a018be4ee039f1cd26cd7fac245cee63b9e94c2a82e1e7a937969f6f1d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      edce2184170418465b6a1cfb36eb8507

      SHA1

      1fa3c66315e79298c998cc007fe3825d61e2b9d2

      SHA256

      6384ab59f14c835be49509b8d15bd83f9f7d2ad4b459dd63228722731a9c1c81

      SHA512

      ec5279d09834b19698edb72ea18e6eca914e518a8dd5a8569c7d7703655d49b43a414a8d2049bde5c935a2a70c7a305bb165784e2808ba1786be8a3f993afecb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      afd48cc3f89814ddfcb62d4e657bc1e8

      SHA1

      7df477e2028cfa22eeac17db39d21a49ceefdf2a

      SHA256

      4261849793c69a35864571271513a416ad75ac5bee807557bb707bab356a1eb2

      SHA512

      bbe77e91c1ef494388dcc3aac18af351c41e956556cf3cc9749488e06f5cdce46de311279d05f9f25d4381f72224b7608f45c2f562d4b3152ab87ea6b0ad228d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b5b661c7543b84cef62612e8ead6af47

      SHA1

      92126d1aa30d0f834bac3b0585ca84b122a86e3c

      SHA256

      6d5bd41e92da1ad30cc8e297cd3a6030376cfc866b113e30aca18c25e4651cfa

      SHA512

      dd950251cad017d407e0dc71e5b352d1704f656d8da7536f8930a8d1cfad9e7b47c92de1765ec915e0257532e64e37de1a92c30c720c0a6b414f06a3d3fda643

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d25e914e1e22fec6f950be315224d889

      SHA1

      7b1b82cfa6d5092d6f92a8db070a02f7914c2dac

      SHA256

      62e3e629f6fe81a1a5d30ef287ddf91b0202eee795c3fa24f1400abe748aa314

      SHA512

      25fa842201cef61ee9e0039979dccc0824902e29fa8d25962439ee32fe2e0df5204efd68acbb2eae119cb6a42e297a244dea0f26449044481b9c6a1e421de344

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7ac5677bcfb7daeb44e10f56059edf91

      SHA1

      3f89f8a71ababd87e88459ee2c3070ad7fe17f3a

      SHA256

      e7cf91c3f66cee3b7921c397bce3c6a561ea34d8ae62808f7180d0308c53bd4b

      SHA512

      3288a4eaf35cf9665a2f64c7a46078db69c43d5fbc4b46676964e5885441d17c3ad569aa88e0a71de7c745ed77225acec094ea10fffdce5376a09bdbc30e683a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2572b8ce1082befdead41788e73b4d9d

      SHA1

      c468468ade40d515ce1fc68d4a6df58ca2971292

      SHA256

      81a342a5f17624b99de525b886958f1ca9dfc05f288f2de368a149ebeee667b4

      SHA512

      ac4a6989451365479d998e1cfb23aed8502a1f2cb106827a2abacc9da5d762c45e31d6b945e17e8edfd6d0ce61bc91dcccbe57443f8aafd98792d758349065ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8dee943724e2d02f841f5e460a0d7440

      SHA1

      1a988bbe4ad80116ccb7358373bab366303134a9

      SHA256

      afe346a72c29b976b9705a7c72632985a986e1fd84b630089fc994e5c7a8a82b

      SHA512

      5c9f4ad3ecf70f8c6d2f8cdd26f8b36f31287fd7bcf0f6b9653d885bd124ecdc288ce94b30702825f9b8624c7c91aac391bb16f7c566f19fb9194a38e9d3cb12

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4e2bc76bbed09a82806d900b439b8f52

      SHA1

      d117bc7f81590172d7ca30b25718a06d6402b617

      SHA256

      aa7a509d0c108a9e91da99cde85f891d2984da1d3d8f3a969a75a8b730235bf7

      SHA512

      8d195848382f51c63693dbfca155896883c1225e47eded27776c396e6122e4419cf12912c39055c38082e0daeaa9fd3daec7dac81a3abb61f38745c88d1f206d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0819a06d500563c1a09cf3e3d3219de7

      SHA1

      23ad808d0a3893d959e72f5914403df816e83af2

      SHA256

      846ac16e34d4bc7f7274cbdbd71e6cfe94b8a07fa3ecfd9e9cfc974ed4f76dfb

      SHA512

      524e811102bf744c49b86c377f9c318872088103648c3d391f35368e6ba4d6173520540a63a674ae6c297ef7ce79547a01d7866e883a678e63aa90ca6eb86ffe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f56fe9f5f03b9e6cdbc72d286c3bcb0f

      SHA1

      c1a2d5fef7bbbec215becd36d7e74fe98de86eac

      SHA256

      ca696637fd0e88ea3224805c996d4d89e8cdb34e02bf520e496350c0e21673ae

      SHA512

      b3724d0b70214ec25a55e1bf253085a059c130f4b766ba299a4a415301bf2a467199fae24b9ecb3861dcd067fc6308c2bf1102f4dc728bf44e43dc20066b4cb3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a1a3ad4f00553be256485cefd83ec8a8

      SHA1

      91c57c0cab715b1539c66ddecbbf11432e3925c0

      SHA256

      98417f70ea9c7fb6c3973372eb7bc7fc84a04601e7b19b1508784b138fbcfdba

      SHA512

      dd7acd5d8fcd567eb190a366decbab5e0765511f55c32f3c48500d07e25943c38ad3c742689e74532c3cb1adba8eb03d94486d2df605ee433a03b7d94fa89004

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      288ffd8d65083637730e1aba18eb1a47

      SHA1

      a9c0b7ae64c9492fbef13287da5506a0e6380c54

      SHA256

      805b3bcdfc0a1106b089666f8161fe2cebcdb3d38f3863dddd412b7d7e3cc986

      SHA512

      eb46c744598de95d110e2426934e363fc7a5f42a0be710232f5ad8f7d59e6f14751e2513a8e5cda60d68f68ba98f2526ac3b98b9b302cdcc6061eaf6ab82194b

    • C:\Users\Admin\AppData\Local\Temp\CabF614.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarF684.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/908-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/908-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/908-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/908-443-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/1608-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1608-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB