Analysis

  • max time kernel
    131s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 11:37

General

  • Target

    eb521838ddc9ccdb7e77f37e53e59a98_JaffaCakes118.html

  • Size

    155KB

  • MD5

    eb521838ddc9ccdb7e77f37e53e59a98

  • SHA1

    2ddb944aeea49d9844f61544065e99e6609efc00

  • SHA256

    74497d188d65dca09c3e6605992f234d62d0d381b30fae72f2d3cc9f4571ad1f

  • SHA512

    3e3c5a63b753c63b62f56fa9a6d4c02eb215bb6fbd879d35cf363ef4b3b8100beed16e25b06cc69f2a98de29d1e9051800344a0f2aa9f139f5409e3fed952038

  • SSDEEP

    1536:iXRTNAeZJ1YDknS7yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:i5LMp7yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb521838ddc9ccdb7e77f37e53e59a98_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:908
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:3048
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275479 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e49e24a929e84b80e37be8b6c2f71821

      SHA1

      6abda53a64f79daef4f38a3f200b5dbc16ec73ce

      SHA256

      8f925596444ca586f029973bb8c02b70ee2dd03e7f8277cb8ca1f83d89c64748

      SHA512

      85b147513fe22ec67b2a8f07cd40282bd03a46970485d7795c29c0d03f4bc9a99b487b1b09b6ff024a29c638fbbbf399f825431865436ef2b370767ea1071caa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      68b2c98507711cb457999018b5d26def

      SHA1

      4ee3c92af9272fddd2f83579d9171c04b3bd6d63

      SHA256

      399ddf760b7d2f42a34fb52c970fb1c5536d60f8f6d60d19e2ed19343bb59acc

      SHA512

      0a213a091a0f69409b845fb771139ed7260c6400da2b285031c37750e7572fb32225828028a1983a989e47df0d9a2325007246e5a0692352c4c06374246b0b45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7a7f4bfb56a72f47e3132fdd15bbbcda

      SHA1

      c7a31d003d17f321f3ca8be9384c099703a3e9d3

      SHA256

      b75ada39a88e02ef048c0d485be9fe8edca75e6f848adcdeac2e3e23aed50889

      SHA512

      d5cfe45b6e09faa6f15bbadb429b25b288141de985438f2a1b5e1ca1095e4c461792e53a94b2a2e785a1c24d9279c5b37055f6083c8d3c591a326ba0c88cd8b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b3f3256acac8b31f65af30145266e238

      SHA1

      dc29e406d23b913b9005c58c1c8f2d2143d67a65

      SHA256

      387bd582d36e1e66b7d2f5a1534fc2ca4bf5859645c65e0697c3aaafe5c6d917

      SHA512

      9d3b48e2b25f90605f513ec9e2b05b679cd5bbcf70454f2c43c641c1ebf01efc42c7cc31ff6b3717769c7d9acece9d72a2cd0971d0191d6e8234e103a0ed836a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5b69b2ea142c1a29c851acda64d50317

      SHA1

      0ff55257c898beff4b9ad9a5436bf6afcfcbb4e1

      SHA256

      bb19567d343831b9d1230aeb47b39e15932d08b3f40fc6a8a883ad499e2ec54d

      SHA512

      b6fa14ce453147e407958441e71ba02e5f934f44b80f7f1d18ab4938bbdaeff305c73cbc75926ae5a7e7111c32ab6b388d95a9eb3559f063ed8511fbf094dd99

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a60bea29fbbdf21e264444e9248dcc91

      SHA1

      861ccac9e828fe46e098a46b580eb85f8411e20f

      SHA256

      0207b344ad44b538c8877f284c2b67782fdd553ed12ec8f17c229f442ab49f78

      SHA512

      e3a568e90bb8540f891c2187e66cbec206c7c05612f33109fb97c340643db220c3e2880bf2e123bc87d48c7b43664feb36bfec56379c0359888542fc56ce8cc2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      aa4155fc501efcb696a01e3d8b70f5cc

      SHA1

      18b5a8b5c53e73bed56ccfc4f97cc32291c5ca7d

      SHA256

      0d688b9d8cfec0bf8748c4c5c839dd86161a1be30d4c1ad32c9d38f8ddc09fde

      SHA512

      dcd01604677468f4849cc8a75bc3121903dacd540033692442e43b6bc13f9015015764ed4945dccecc801fef8e14d129c1efbbb8a82fa906ed8143f34de9fab8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cd7639735c71f17bb2d31123944cff83

      SHA1

      6299774307e41d79bbae02a7588eee24198d3355

      SHA256

      d9b7f9830ac8f752874326d06843a5fd179ff3c0013243590b9b8d042060816a

      SHA512

      9ebe190c5521eee4bb2f552dc5942350159cd79e6ac1c49f9a3ecaac7f78cff9cfd781915779ac433711edd5d322a7c37685d9cc588cae4a4ddb513a70949314

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8b48d1a5a5bf6eb255bd323d3cc3ec18

      SHA1

      ea0e81a22f90e3ff0a48bbaeb176403c9c712c01

      SHA256

      309ff2d2cda5093cdab7ecff98919a0cab828a0ec5492b9ff94f4edcf633f4df

      SHA512

      9be5d7d3efa0b12d3abcd52c29ad56382b9dfd5f41fd1306bca65d4d2af1b431a60312d446517aea11a9602545a25cc254696aa00ccd5913b92427e3c2f66a19

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c72bcc6ba6e40f9ca28de8dbe9ba44b9

      SHA1

      58b0af86de299c854336c5abd37caf53aa5d566b

      SHA256

      dbd6b8f0827936106f38f99cadbb5b20759bc7d6f943ae1b039f69583e7a842f

      SHA512

      e718bbc38ddf33f00953af1828d5918484a99ce3d16aeb0df2f8e5f620747b0038f309862810fac9d5792d1510096d6087aa795f743f718364fbe55585511691

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cee4a0b1e8d3a494d354aad8e1640909

      SHA1

      8ce8d93b15a2eb13221074e3708d4d2e615b8d6d

      SHA256

      c6db7794c5abb5bdf1acb5ed13fd8620cd997eb630a68756887b61b083775354

      SHA512

      3f29ed375683e31b453ea23a18a6dc4e78c10c6e3958df16d244ac47e60be60834a12515216b5a2142705e809739ae8c49808c6a9437d5c039c5a8021442c801

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b05aad1b31a3cd8afc370cc7541c0dba

      SHA1

      60fdec824f318449b8046963284881cc08eb015f

      SHA256

      0adc437510481efe7d9cf6ea088561bae25798b8768a1df22c96131f3fa79a19

      SHA512

      de435e6889f8b507fa9b0703c5ea05ed37b85d6838d1d7902a9fd976b647a1e6fa4db565d70f7d7abd0a546dc6b7ac5554f8e4f1b2cdfaab39fdd36aa1be3ff3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7933da381367e870d2febff8a3881bbc

      SHA1

      9d2f0b931b0b3cb3bcbecb48d49c21b272663dec

      SHA256

      c648c3dfbe88987aad2769fa004fbf4336c48bdca3e1301ac602c57d83dbb90c

      SHA512

      90a061ff084b45f3caf14a08a4c434262a6e9bde2ad819ff0c501ffb08bec66c37abb53a7736c4b44b52c110d9447401e59d25937be98c08a113ec98d9e7d3b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a619f3391ab1e8748adb8adb4a5901fd

      SHA1

      0df76860c72fb55b98aecc30b6a21afbdf07ae43

      SHA256

      1a32f0aed76813969a32d17245a7821df5263313f179481bbbfcfa655e66f57e

      SHA512

      b9b95f61ffb01d57ac71a1710cd39cd8f9640ec79c32d01b1c2f2aa0eefeb8bf633d02717899f1dae22d43e697cac175b33216eac79cbefe05aa7adbc8933188

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1b34da82ca60fd81138d3e4786915f50

      SHA1

      ff67815a3c0a7382fc244e9f27016bde4657cfb2

      SHA256

      0353081ab75610c0777be7a4f5bc7d14e4b02656c0ed458b45299faca8e2e4fe

      SHA512

      1a5ce64605391b89041e23dc65cbcb077bdc1cf284c00941f9ad038756053ce5ba805dd25cfca29bd5b6ff4588083defad4d587a8f1058c7e94279a8b76d9cfa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cba0301a0264ec9cfef5f79933714864

      SHA1

      472e7d6c018c02b54a40fb6aa9bd0a783c025c61

      SHA256

      61afc600be997c8fab9db6424338d9ec1949cd45ca1a67fb1883531a67686e9a

      SHA512

      f39db927076933d1e1d8357077c222c28771319b3123099e8671eb37aec975ca5bddc4fa92804fff10da301955201b4d1f89e4f408add43a2daaa4f7a21d0ffb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      01992a7517551ea565549db75c4138c3

      SHA1

      6838449fe4964a984281b1d08225c9db167fb8de

      SHA256

      02e5e2d9816ee2fbb1e38d2a9ff9b12a1b4a8b38ea20a752093a58f67c60c514

      SHA512

      034f01cb4d3eb7597c5e810294bbf441e7bdac4488e37bc86d5eeea6b795f9c4f19a8851da8a032b9508bb7fa5d5005fa108d582b699f4167defd2b604ee7cdd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8a35fc63e7365953a561695a5bdcf5ae

      SHA1

      953c14c13f1f55d4de4d43624755a64e35fe4320

      SHA256

      aec0575a840d82b3b6bf0dced0f8b33279eaf8835d073c17ffda7504c72a783f

      SHA512

      46598ce8067aba55d416c3e61715a70eb924a6749129e75e1c91b09a1cb90c177a6239d115cbce977e06fbcca74e4bfd2c021a023fa6885c4408152b28cf4c7f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d6f67c8135f501cbc4e669393368a761

      SHA1

      5f0601a46014edf7aa96740e05647e735687de7c

      SHA256

      3acce73ab194780a642d1d339a85eeacea09ea0f6af221ad0368033c392c59ad

      SHA512

      d5332d0a2408c9c3e33e7f042ff1c24e4df5681454d98f2e3d812ab03dee9e90487e7a5104f28f502f1e9c31a3071d97a1add9f11898379fa413f653e24fd110

    • C:\Users\Admin\AppData\Local\Temp\CabD980.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarD9FF.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/908-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/908-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/908-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2740-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2740-436-0x00000000002B0000-0x00000000002BF000-memory.dmp

      Filesize

      60KB

    • memory/2740-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB