Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 11:27

General

  • Target

    ee87de3171d07bf053d0b26e4ea51f9b_JaffaCakes118.html

  • Size

    162KB

  • MD5

    ee87de3171d07bf053d0b26e4ea51f9b

  • SHA1

    cb149e144ac84dc52dc39311d283cff1ce99c46e

  • SHA256

    b7d438ad141795295edf362bb7bd0447df7db5dcdd9c51b44523d8293d5ffbf7

  • SHA512

    7dce72d0b297e09f292a6d421dca527e0da30644705a79d9585588a5b5a8f96334f85b1f1eabde9a3a0fcc310083427fddec885aebc75e32bf0636da04458dc4

  • SSDEEP

    1536:izRTfyPadsZQSun40yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:idE1c40yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ee87de3171d07bf053d0b26e4ea51f9b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2252
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2072
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:406544 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      10ee1d4c52a4a482f8825a2bbbf59945

      SHA1

      3c8b93a048a49d9fb2694e05eac979f70a8a6925

      SHA256

      8f4bcb9776468a2e235b9cf9606be2e327b873e7a6b6e8e8d6e0c8d5acd52500

      SHA512

      81b010eb87480c0de861bac980f6803dd383c2eaa8e0d955c4df81bf406b4e2f034b923dcdafcba37039941ee43c79537ec4fb7e83be763b2718915863a7842e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7bb86ee6775ee24b6a19cf3a00d0ef15

      SHA1

      898ee2ba987afeece229d4ee5bbac22fc13a35c4

      SHA256

      351d99a5870027eba3d924b2d50f95ce873021bf22fcef58af906d451e6fbed7

      SHA512

      14534d9ba120a25b07016bcb78165239479f719162f018f1d6c563f64c8c1d2e111026cb0e36340e23330370bcda36f594cdafd87fc131aeab6ed8f8d75a6e0b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c677d0173e8eadb63627e1ca54a33503

      SHA1

      71afec5d0cb4558afb16eeb7ba951bd2b2e4408b

      SHA256

      4501fe62c3d6dfbdf26f910adf62cc276160f4bfb5212639c5b549d77f7c70cc

      SHA512

      28f7b37279f02c704be6b7991525333881f5ee8e3cd8f4857e813a43a2386a8695265eba5939821b0cc02e50add4f54b169ea5b2bf74193fc20a51b5cbb37a4e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9d15fe19ae985aed99bff9c3b0c2106f

      SHA1

      1945a05ef777ac85a56300cb1b1c633b8783796e

      SHA256

      64ba8368a28de792d923fa013f1b5aa24f1daba2a171c302ac689d29c610dd54

      SHA512

      b591c482d822b648ee01aa06552f2aada6cfca130fe1d22fbba1aeea7ac3b107e30f712d289a21dd359d760fa7183d9fb8aec1f4a34cca277fa9820425d5f7cc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      04e0e0bd6b8f22b5d23b3a5207d0cfe7

      SHA1

      469e9d92d386f1bfd5388964f0458c45b08644d1

      SHA256

      bb1ad95e2f3d3a0082e9dda9d5002e617c966482a602df2fd9d8f4fc4cf9b8e6

      SHA512

      0a1d824097a5cc107836714f5deec5b8b4a8ca4b73d56c9c9f331619f4ce2079a6512fabdd2aee31a2a09bb5de79f598761a854b3c63dc70299b39a3de127d81

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c4bcf9ad6272b3b60af6d1cc3a2d4b50

      SHA1

      bb653b041cb95cf56ae995af5cd4353e74a1d551

      SHA256

      031090636f376c7213b84952c4ad7201b545538233e17d93831a03dd30995a2d

      SHA512

      7286c8ae5d297d4a5e0b994948d8edf537eec66580995c4b88fe9c50229c40394c84b4dbb805da80ce6fa7243c4238db15fb4896aa5a067d172e17abba81c419

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      92292e5bf826a29759ccd17862b0374a

      SHA1

      05e68531fd620e19d1840d6a92ffbdde4fc4b677

      SHA256

      4bd0ff151e1d21b740b8e13c486219c0ab52ff7ce31d19b2ebf8090235092562

      SHA512

      42555693a4073590c8368e536123b721c0a9479dda05a7d087544e0d17d58d6dfff409a1f870102e1084288aeffa37337b3658c7270c1fa5203ba74a5e757ab7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d852a5f1cbdb0106077a294c6ac092ea

      SHA1

      d7a2fefbd25e3e08eea68816af7e5cd330d18ca0

      SHA256

      7c13fa8ddace4fb9b7520bd527111d50777c538b9ebf54d31ce8b97a30511dea

      SHA512

      3bdbe31b8d5b3a6fcd03b034b5e778f54073e79b6f174dbf6b00fabc8cfab6509de30082d6212409babb53a610c184a505ad2186393a110e5b52cb2d4a88b409

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      03a536ecd6aa0aa9fea2987b38bdfa0b

      SHA1

      4d098fa9992003b3bd5e6dafbfd91f466bfbf998

      SHA256

      9cec29eaa5db473b3cdddc56708af35f69a3b1e23f0da7c817d4135c5fce2368

      SHA512

      7959a161132597b6a1eb79e304e68e47afc5b1d248fd263680a9b65e3a432b094e3c2ca64aa3073e2bca155c230590548905b9d47abe025bdaac01135ff780c5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      75fbefb3a0476b24e28b6721689bdd58

      SHA1

      f937c60842426fb88c02c62356e89f2cf513ff45

      SHA256

      790ced07b7db236cef76afcfd8df313e68ce189780ddf6192b399f5b1b662d6a

      SHA512

      370f0b43757f62d487e0178d7d39591f2d10c7be35be1fbf7022eb24ce3cadeb1a4e87da48bbfcc4d35e4d830d5cbe020b00346d26810b605bf90a0dd2bec271

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f8a082de3fc694b9d8c214e44f842f55

      SHA1

      10ff307c403c859f969b2632c4999d322369b2ab

      SHA256

      7e1f4779aa0b25fc63167859a407e946367b47133500ac97b5a382b6343e6c9b

      SHA512

      01e530b4efbeff206c2d4445aea62ddeebd0ef55d0a3fd24da137ab97cd070c889066ecc40912d2132a5ce7bcd15bcdbacf5d247aaf7bed09811db52b2a47181

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      de441a0648e5c280f128a74e42743f75

      SHA1

      c520e72ccc54ccb21da6e99e685ac574e0019247

      SHA256

      45bbe9465588064804b3bdddc20b92f085b3ffaed5385184b791ff0263d14ab2

      SHA512

      b58d7629cb66a6c7db26ac35702d78444ac55c1bb79fdee0f4ae941d846d49b697cd8245bcabb03e9e7211533e8ae96ba5e133a98067c26260229fa79a02b73b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b9d55d9bcd9f9b605134507e70dacc75

      SHA1

      6f0742fd7a47421a5f5eefe2e825244fd8113eee

      SHA256

      4abe720c393f896bfa08160a4f77d0657f49354e2a8843b897b53a97f350b146

      SHA512

      052aef68fb99597e20246e619720d7a309ec771d32b42c037f009a42672efa9d91ed2b128fc7e95ec37b5c139c487b4314045fc501d94cbd4d4a0d79a28fd69f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      535d8fc15aa9c88f382dddff0862fcab

      SHA1

      ef781160ff33f9edfc86c81b9de2afa1ad46772d

      SHA256

      1c208f5ca70b0a46e3dfdf3c24ecfa3484b62e3313ce1b4b7d71d3b2e5c57b9a

      SHA512

      dc853498522bb7b60f2f4c82029489dcf9c69bb2735b32507548f03fb1caa68a139de6477f518776abfd15203ee6a7cd07d6794691461e6299b89b62e6f14f9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      453d8628cfce0bb3e9f8a68d3aebade3

      SHA1

      27fb6a99bcce69973c5ca6d38bc6dd853f61a051

      SHA256

      06894f1da53c6633e2817e54acaaf75ee294e701e161055c87533b32e434dfef

      SHA512

      e11be5273440148691c5220bb6f34be745c1bf3f2eb3d5060962fd8dfdf10058a10397295b04f8802d3cc9753535b97f8d67c2a918de35e2a1f14cb6306930c6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b5b15a0c7b8a195fd57403288ae0f43a

      SHA1

      6ec06a9af237d0c544a85ab30b91ba89e3634bcf

      SHA256

      bbdd2cb0c61c503bcb6c93692149302c0f867f07b595ab0fe2e0196231ffabca

      SHA512

      5a65db4c9454186be1d37f4cf3083b74b31e2c7318961d989743f87db25dc6e261a60e671ef11bf94dd84e296d446efe00bd7ab8beffee370469f217bfb26989

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5b9f58407e8f577845b62527eecbe14e

      SHA1

      56063f4faf4c46849ead21617b4312eed109f9ca

      SHA256

      cc7644e69ff06567511cc0dd00cad224d534e211ff4777345b9b2d35c90bc159

      SHA512

      70fede0dbab0d8edd8d31f83648debe1fc3b48062002dd24192b4e6ec21c083794f1de4917615474fb74dfe89dba1dbd0d997875dc980ad8a176bdb8486686d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      721770507210d8562501f22765fb400a

      SHA1

      7a0960fbd34c5e792540720f7475180dafbbc541

      SHA256

      ad0bd96ed0e2dfe264dc22eefc0012115ad2d631445fcee2cb18acbf25ac7032

      SHA512

      7824c0d7318fc3d6b43cdfd6f312d9d9870ffce7f085c4301eec0ec66aad63cee80a802545dc2f4465062c8eaea065777d2b9b9fd528b88412d8d60a45759035

    • C:\Users\Admin\AppData\Local\Temp\CabF8A3.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarF913.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1656-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1656-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1656-438-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1656-441-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/2252-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2252-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2252-449-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2252-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2252-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB