Analysis

  • max time kernel
    138s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 03:26

General

  • Target

    f210523f720b82d442e814829e83f384_JaffaCakes118.html

  • Size

    147KB

  • MD5

    f210523f720b82d442e814829e83f384

  • SHA1

    a076d418d7eda5944f9513b95574a6b41b31e58d

  • SHA256

    2d3e6cf5f626655d4f23c165ee97f8c4a4943b7f909eb8864c0ac7408c48a3fd

  • SHA512

    1085fc65e4900d13c5149b3da10815dfe80a9261547dfc67c67adb8d297979cc44294fe7576165c6118479a8cd9ff1b4779c7644f6e40b27ace736a2f406506f

  • SSDEEP

    1536:vHNs6SF2tq5XT3uyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:hqXd+yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f210523f720b82d442e814829e83f384_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2920
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:406537 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C1B8D87CA29E93F2FEEB2834BE22FBB2

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a7bc3cf3a0c68ecb845aa8dbb91cf53e

      SHA1

      30c0de8ba3d144a654b86c83065761386a971606

      SHA256

      462e3cdf737b53c93ce3c719da8f66eeea589f5de8b4322cb543a135f113495b

      SHA512

      465d1d551f242b8ee03d79b74bdccbadacd772cc01a23555db48f85061b961f64c97b3a3b65e39cd71faab2c8384d731ebd8d82e10ecff67aa0f15004c5ef185

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      745a3891effa931947366ede408769fc

      SHA1

      9491eaf1e8bbecf17d430176b5f275128bc8c05d

      SHA256

      eb758466b834d170e12a87cad1352b9b71ce7b194eb78ad4ea9e344634e6796b

      SHA512

      af2025ecd930f9b8d4aa052aed506d24971b9aa2398c6bb9d5cee93b6ea30a0f69ace1def529ce842e0a0718926851ac9ab5d38bcb128d3e90b9e4b1418150cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c241a723be3bc77a50461f8a7699a5d5

      SHA1

      5c88bcb6973051c42445ddc8704166c3dffcafb2

      SHA256

      4f91c19d9704ece0f3d084c43a6934bfb72ae0210a8dcdf4b522f8710d998f0f

      SHA512

      da187acbbfea9611ff6320dc2024df9dbfb03b3e80b47b0073d65e3be6fe24eebbf53b275e9c88935d8a616561b6a239e72279a4437f8066a8fecd803acb87b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8600663725e80d1df6b932bd86d5baae

      SHA1

      0d7b64107385a6b13692c5af8bf710defe06f631

      SHA256

      14c0da19c213bbe1203022a7ebdf30a874fbc2285a0fdac9fbd8a8b9001f8c62

      SHA512

      5b43a35080f8d09b6badcfec98bf121ddb6f20e814bf27833f9aa5199173e1de5ac2547645dbf8ca154233c5f8b38edce62e76a239795f24a0a70df75ba512ff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3151b4b83fbbbc0508bd4277687a98ed

      SHA1

      1404095708b8a1ea1c0955dbb5e44929bf32fa43

      SHA256

      869fcfa118a40f8d59354016d21fa35b507a12a9838a65567fe37824c39ecd2c

      SHA512

      f9713050ddd10c4c356b255809909f1fd9d6c16f5fb190b06a8c5c86b9ccdbcde14e5203a4fea5b4edc03778ab99b618638421ac82a7813bbb724c85ac26005c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      be471f3aaed69710c4d0e63865acf021

      SHA1

      a6d79354c6a133389cfa9c4c85e5cd05c8c02df4

      SHA256

      e4407ca16e65144e096fbdbf1d397f1e16102b07b1219b799670d23aea0df06f

      SHA512

      b638900e3785265d93be503071e6d1a4c356cf7494e7f776eed2dd7d1bfab3c5568f6e0ffd66581d95d425f3bd7615079b73bc417d9a80bcafdcda03bf433c18

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1ea721053ec46e425dbecf255cbea07e

      SHA1

      6c17ee26644ce608bc0c4525f1ca42f0ce54a05b

      SHA256

      e57ba2f56fdd9b1437308185018ce614a4c768f6b6af5c63d1025385034db3b6

      SHA512

      78781f2d5853d12288980e7dc90f26ba4203b0da9cc35b9efc9a628121a1ec9815258f0704674fd6cc5c3f2c33ab9ad8e82518caf3785528addb090f0e682b79

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ce9141efefeb2a8781754dfc4315f860

      SHA1

      c124acc6fb6f2d745daddf7339766790380492e5

      SHA256

      0d924a0bd9ffab795f3b56306e04749ca5eb7444040e5e8759f9ac65a8c9be3b

      SHA512

      5a8ab89f63ed1cb1abfee332796e4d33a76112d4042059256eca05ffb8b6e2aefe1099a7270319a422e9a1de1acdf98092ea422b24c222c316063cbd5a367730

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ab7762598d4b6bfc220a9d5f61c1c329

      SHA1

      d217a5fadb191738c24c832a646bb147900412be

      SHA256

      ff14204342ebc4cc9c14c50e55a8c67be021491bf6e09d8da0892b98f05b694b

      SHA512

      63e520375afb4899b56d571780cfc94d98a869538ff542320d9534aeef47c8a9f84b7ef37ccb291aa64e4adde7cec0c1546d972789b342866dd294d77e9d76c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a0f42b51aae72e647f8c2870fcfb51a5

      SHA1

      9cd625d225fedf70da574221f7d7246bedb30646

      SHA256

      3ed78f0e1bbac0e6fd69b5844cd5bd12e1b6f77d98c0b6844aba49ae2398c528

      SHA512

      62cdf1dccf08e925c35451ecff865762530998c771dffc5d544f07df1bd3379b11b534731ff4bbc0ee205f8b703e4fbac4202afc6f6a818ec5e477a57243b4b0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C1B8D87CA29E93F2FEEB2834BE22FBB2

      Filesize

      250B

      MD5

      0d52edab9ef12f3f26cf45d919327cf5

      SHA1

      37054411e9abd0409476e7d126e923b37b12f905

      SHA256

      aad76540c9d038407a1f9f71990e089a3702df531d86c16a97c13105a99554c2

      SHA512

      24c399d1bfa4749b15f5be72af9794187d5cc1978bb68dcf466f76bd3180ebbe088e4a874b5fab4273d9ba99bec40293c63884415c6c7e939581acfd1b9ac12b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\dnserrordiagoff[1]

      Filesize

      1KB

      MD5

      47f581b112d58eda23ea8b2e08cf0ff0

      SHA1

      6ec1df5eaec1439573aef0fb96dabfc953305e5b

      SHA256

      b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928

      SHA512

      187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\httpErrorPagesScripts[1]

      Filesize

      8KB

      MD5

      3f57b781cb3ef114dd0b665151571b7b

      SHA1

      ce6a63f996df3a1cccb81720e21204b825e0238c

      SHA256

      46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

      SHA512

      8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\errorPageStrings[2]

      Filesize

      2KB

      MD5

      e3e4a98353f119b80b323302f26b78fa

      SHA1

      20ee35a370cdd3a8a7d04b506410300fd0a6a864

      SHA256

      9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

      SHA512

      d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

    • C:\Users\Admin\AppData\Local\Temp\Cab3075.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar3104.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2876-23-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/2876-16-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2876-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2876-14-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3056-31-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3056-28-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/3056-29-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB