Analysis

  • max time kernel
    133s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 09:42

General

  • Target

    f368b641cbf793b6c4b011a93522adf7_JaffaCakes118.html

  • Size

    156KB

  • MD5

    f368b641cbf793b6c4b011a93522adf7

  • SHA1

    259b6218415e7e13d7cc98be205d8866d18867fb

  • SHA256

    4fb45897148298d31b956f945d7f3a2babae533e1e8506c97cbd778eae6d87bc

  • SHA512

    e7c96d09ad9c31c4c25c332ac9e259e2d834dfe6a564f7cf7f539931dca85c79d28910054c4bcdc3d3ffa9f6762ccecc9e2e2cfadf770c11d28dd24bbe2ecf9f

  • SSDEEP

    1536:ipRTe2eT84/B/6RPWyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:iPwLByFWyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f368b641cbf793b6c4b011a93522adf7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2096
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:537613 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2584

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b6a0e369a55b403c5f0dea0d433dfc7a

      SHA1

      da7e671f371c264d68fd9ee6d4b5e89fe9df3d6f

      SHA256

      653677564218aaa924444282f61da43c6ffa6fd534ebe218e7cc778518d48d19

      SHA512

      9544ad35c361f99b7360c4e07d3f60cacbe65c0779f3657c08fdc4ed4cdbfff6b64bdb5338b3f998285930b685eb2913daa7bbf6ac37770c2bd1cf8034333039

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      77e152ee00d0d8ae0ed3a939c2299587

      SHA1

      9f41f4f4596159bf8326fcaaa2d6b9899816c88f

      SHA256

      b73538dc5a8071389d70f6ddd779d75cc9b243b0a7fd30300c7fefb2b061f8bc

      SHA512

      7bd6696153e97652e2b113085e93ac92749e6d965760c5830e97ff41868c40ea5eeea7b70af4d9d2cadd6229ab6cf3f180a2c3f3789f3808a5a37e43e4637610

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      acc6094970a99c229d9827fb4ec2f729

      SHA1

      df6c0978e119c14ec2d3c5a16f662826a9820d1d

      SHA256

      4d3742e4a40b7bf9b4b83d071c9624d529e6a7782ebccf9cc3b205eca5c98c4b

      SHA512

      fa51a20e081a4ab5b50cac6359d12d101a1611c375e28497f71695d6a6bda1ede4ab214ff5b001d62df02ef31540a8333edbf49dbd760a00fc44ea9b532c807a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b9041cbc57a4df5834106faf6d31c36e

      SHA1

      ef44fd22de0010877bc573bfcee694016e359ad4

      SHA256

      67c4d0873d0db8694d9b05254ad8642d4909017c99ab792f31171739ad8dc4b5

      SHA512

      f5787089f46c1c782c2214d6e94285cfd3eac2badcb11179baefa566a3d067394e9ec5b427a9d95664c74c8aef864e72bc2e171b7dd235a9eeb7f913d61f4c8d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a8de7175b2e1958d8de5a1de0040d0b0

      SHA1

      b1f6771f0c59d7f3770b6b28c030dff8e76847ab

      SHA256

      af38480ff70e5e130af433274b34163871fc7a463affb7427b9c0a69c01d1f35

      SHA512

      a217b903de1394e0cff2615777200bfba7300e0c7b714ae472871b05f66af49d7777d15786f2328b028924b9ec902e7f778f96670c7c7b42a421083985c63ed4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      df0b8f3d43696fd2290d6cac493b7f9f

      SHA1

      fc875a84c9b8b1882025d21b6615bd3fd1182a1b

      SHA256

      f6ebcf896de5e14d41b0f95eadc84333909901eb5652532be90e24707926e0f4

      SHA512

      737a83cfef862fdce201cb2bf062bb504edfbe3af49d7ef9db5c4eebbf7dc1522e3315d70add491239ca1fe546fa3566b0a61fc1b35746c6b200070bfd92da85

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      43c185037ee5b09241416cf604215b7b

      SHA1

      ae32121d80ae86d4478f63c4c45773fd2bce57f4

      SHA256

      127a00fd3ea3fd6aa1a5c67222d65ac3e02ec3dc89761393b5134ec1158fd496

      SHA512

      c113de03e007394e743d225eb9cd0f1ad56d5022d4988c86a9ce3c0c2566c36e97e792b8039cddc8321a4a6f404f926e616f142cffa5605c8d4344a8f56dbcfb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1dd54a47b4205102c54ce8112cec0a83

      SHA1

      365bc469eb0758c54146c9b12cd6f30d579ad66a

      SHA256

      e30faefece3c0f1cbaba5aeca312f9e1a33af84d35d68a38d10d1a8c56b65cea

      SHA512

      389b19b177ab239cf81923f5abc38bf634af3cd7e6f114e7ee7f6194cd259375d0dbf3e49d6e4c9dd93aa1975fba77de8c8277abfeae9ee45db09292a677d7ab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cdb2c72fbb69b1a4a181e37704c05db5

      SHA1

      1373879cf78b482d88224c5d7a21933febfccd9a

      SHA256

      a91aa0e8fd53c9ff22a2a783e446139e6066231244086ca1b47a36be2e999d2f

      SHA512

      e1b9d1d16bdd5b0b5efb0cbe02314d258dac0954ce019e9c4dce5f0e23240f0f08ce28520b3fa85ccaa666323b64dc7f8d7c2dc4e5c6a963873430bc6d90c8a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      302c08c26987afb27ba525ac92ce8bed

      SHA1

      28c739a52b06e7cf3e19bfc7e48c421c50e49e10

      SHA256

      40b618e8bbdc5f866a5cce84a3c17c9f333556f5e8c9e5ac1b3f0735cb9f881f

      SHA512

      af02ab129f66c4ee8736e87311bdb3f9641f511c1890016b264330b2202d0b540b37683fecc76c993255a744a74e2585c474105995e344f18034b471b4d50587

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      717fe48d344e1843a94f4ae3293dfb3f

      SHA1

      ea1182d8a8f3f30130281695731118b5f1d8f759

      SHA256

      feb7ee50c2c9924ac6da6e97d6579ee42acb21694e3c44612aebb162e328429d

      SHA512

      9471496500013154d5722027fcad2abd53e1b8590717f2d823549a78ee488c673d8fa670f69e5c0ca2a97e30e22f4083fb2f18a8e74054b8acc00df39a6faee4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fb3ab5343e04db9e6a22d14778ff533c

      SHA1

      a4cac19c480d38dfc9073e73cf1c032e545db013

      SHA256

      7cad88522ac305d045a7a8f7c467f7049c49502565032cfbe99778e9b2b9710a

      SHA512

      ca812f1dd82f0f17699adc8c59e6d54a0bb5d1c40c0e496c585720d3545b43e5177fa2e85c6443671b9fc49f67a5f5356416141c288b280992a181f7a1ed991f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      864926bc5e75ca5038df667a5dcdf4d8

      SHA1

      30fa01690ff6ee55ab422ecb061636eb697ac8bd

      SHA256

      145b0278acc5946613b3e7b9507852dc6a1d28695343fa8ff90123a9db3e9180

      SHA512

      912de84c6e39a696bfd47c55f125b59694552585210eee1960bbd560fda6ed1485dfaf780f861cf033500fc4eb520b93c201e4c46c58f2bc1a1296516162f97b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      17f023760c94cb57789fe43b3e3584aa

      SHA1

      f360c727b0ee14d88a8354c0ff4928fbedaab466

      SHA256

      7cc5be969430b11e98d643e94c9385105b6221269fc0849d1b45bc924149ed07

      SHA512

      fc978a4ac72ed7d46161dadf4b10d50e7f30208448879b89d42240297fa5f6013a0782638449e6ccfd41002bdcd69e2088f2f5e1b1dd16a9ab4c3093a43e2e25

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8ce98e9fc6141cfe8292cd53a78d3f81

      SHA1

      fe220d257af4654cf900aac394fedf9b8ab97843

      SHA256

      27d9b3e9c53e646f75ffee3553145aeededc7885f4d0708c8e332c635f0cb452

      SHA512

      8eeceaaabd53f57f283d6d83b9ebcf6f1efceb6387c980e3a14267918c8d22cbad6b7a5ad11c364051a8c159963241c8454cbb0cb902f84dd73aca6a29cc27bc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9c868c4325b8704c1765b368c457d57e

      SHA1

      e38b5ddd71e8a75e6d217cc6885645aa1933f09d

      SHA256

      6534cc8e86bdb376fb714daad78be0adcb33cd2381dc462216fa3894b45641c2

      SHA512

      3225c0c99eb4ebf96a07ea400cb75b0c469b74cbb87d22cebda41de28021d441f429cbb15ea94162309f06010866251bd0261cba641c1dd4e4b3cb40dd33a9a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7bb4f11c8916abdaf8b661063782302b

      SHA1

      7810bb8a1e9a294f24627e6c4a54057d8a6305ac

      SHA256

      9dd69ce3223d889fe9030b48266675c53c9016b8dc2d0cb653d2d6e26c9436cf

      SHA512

      822c8705132f30d3b1c2605298e73d73bd1461f8675bece30e76027a27f76f4ffb6ab73a8de2c2dd4c2ef4e7a40565e4afaee2f9305baf077cfcf98132a5a6ca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      108496eab0fa561871f8d39c76eabef8

      SHA1

      7418a0646c36db31ebc602a7e0f282f0d3765813

      SHA256

      581de631d3dd02216f416de1ad99059d01ee87fdee693ce0283c832089fc1fc0

      SHA512

      41dc02e94868ee90b6663010f6fe38f8787922e4e55fd28ee8ba981ca99ef6132c9e7347f8fdb79086cbc1284f7e9df66c06a2de1ca1f8a2c59a8dd64a6bc918

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      129d7a2de5ab69dd2d9c517b7d87d663

      SHA1

      89ab26ceba82276ca7cefe2ea655e493f96c3cd7

      SHA256

      e1c75e114b95f57ce10baccc11d4b5b03ab611fa850f9a7733dd60c390bfc498

      SHA512

      0c7f48a058acaadb9cc97cd6cbddadf10473e3301a2ae99c5908d7f2c78a0f7a651bb6d9ff48028e8abd19b891fb4bcbfd05d3f63ec2314b3fcd434476ed6d70

    • C:\Users\Admin\AppData\Local\Temp\CabA759.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarA7F8.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1996-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1996-445-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1996-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2624-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2624-437-0x0000000000250000-0x000000000025F000-memory.dmp

      Filesize

      60KB

    • memory/2624-438-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB