Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 03:54

General

  • Target

    f9fd7bb4ec02e80f1f4c907bba87da7b_JaffaCakes118.html

  • Size

    155KB

  • MD5

    f9fd7bb4ec02e80f1f4c907bba87da7b

  • SHA1

    246d2bdcf2bc337bd472db0f2454b691a5351e46

  • SHA256

    9f003febc804de812e5adea0961b130faca5211b6b57f2f1559a1e7c0ccc7ea6

  • SHA512

    7b5778c615b6a8b66b73cb0e1159138cc2b7982dde771ee3d7a47358c989836f70582c08f6769eecb1996a71e96fb5a7febd7e39324b4c2e8dfe4b29cedb8aac

  • SSDEEP

    3072:iT4P+yQhQyfkMY+BES09JXAnyrZalI+YQ:isYhNsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9fd7bb4ec02e80f1f4c907bba87da7b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2460
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:472074 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d8cda28881c1f70e0f7c04cca0f8ada8

      SHA1

      3aff94577844a78d826bb6d27a57bada03fde1a5

      SHA256

      69a405fee23643b71e53fcd2dc538de95ffec2340ca92ccf879ca744863e944c

      SHA512

      431cd414dcaabd84ba74d4b82ae01e1abd76e5c47fda32021726c770a52421b631c6c896aff57eff1a2d26ea550eeb4f4fc9204dfc9a9d09ba749a6e51d362b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4ae3168eff979a5f5f7cb25d23e6bd60

      SHA1

      590211a7d62a47c9ea9efb15f2e3d2f170172afc

      SHA256

      e758041fed7dbaf74a388f194516c38ca2177054f45bac7fee9bbc3be5df8a28

      SHA512

      cdf41d3d432ae3a93efc5e6493b0798b013979b09a00c2097f837234fcda3ca9a473205535e67c59d47ca5f507e7e650d5894b782a5333266bf9b61b476f6b42

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      26b1b91ba72faa56c1cb1f5a92b49e3d

      SHA1

      11b668423d28a4d1a74bf9d1b86ca2b8a40414ce

      SHA256

      18b180c640e47e8d776dc563e8ec8b3956d6bf0c8dcbb643cde342628b7da507

      SHA512

      9c2c468f4fafce1ba4c4ddeee3829f839ac20938f7825875c6ddd34ba3e397028a0054a9b3795cf36dd22b6ac7cae0d35dc91c1344cef423178f307009bbc071

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d455d77bb4a1d905f9803fb7e8f015d0

      SHA1

      59988e74c272fe804c09ab227b9e6a28e106b036

      SHA256

      39649b6ce4911ef84cb2b938a3d0091d76f748818cadb9e5aef70ee34ded4803

      SHA512

      93d76218c48c9efbf7a2e4ad3ac1466f89c008e93f5f92d4132f8d52caec11d18e80c9360a8ecd368581f3fd6b2bb9232cfb6ed3d44ea26a55d2244710b3df88

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dfb8f753bdef42033eb3dfcdc04e20c5

      SHA1

      a806d5227933a26c336ffab52bbb8ca293c2e8e8

      SHA256

      88e3a80789288288ae91bb1a4edd6c4b990b643180b80d4d72fba9f75835aaed

      SHA512

      6b6f277ede044e7c704a13b4c3ca83e522d90130557257b3b33ec6bf73a5a238661a841a9a5db89e2ede97033a43bfc7f833bfb5ab9a74af2bd0d1d912fd40b0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6c1f666dcf678020fd864451f8aa507c

      SHA1

      dab30644a2c94d23a3dddc47aee780a95a482932

      SHA256

      f83d60f66909da6b58855d4569363ba627a9eef1626ec44f0729e89cb2c61efe

      SHA512

      b55aac8c640bc5ffd877654682e1b84ec977e06339aac0fcea9cb5e0fdb0783df86590261a97128d54c8263bb0e9ff09ff3908e287943c66fad013756547c3c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eb95f34242e5444f37578be97e9d5a67

      SHA1

      a81f9fc723352af717de331de6388b09403319bc

      SHA256

      b05b0261ee56e8219c0c0fddd3d0ddbeafea32cc56893dc54c81017549746a25

      SHA512

      e70274c4b8bad499189334982f6d9667fa5b6baf5185d07c60ba85eccdfd55773ad8c465d606dd29759e53a51bd84ba9de89d168bf4e0b9d738a56fccdae4abb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5e914c8e6d72375f9d132c01193d7e89

      SHA1

      38a8840b05f148134b9728c2c40b2bbaf401c49b

      SHA256

      f37be6509e582ed14d031856ead6f5406c1eae6459ebf2760ae259b8a7641327

      SHA512

      bf44cc9c1e4aec0bc35c7631a489cb9633a269427c3d742d7a60a4be07b50c00406a99933df1c9779acd95e41e516337b4668df81d010f1b5e27a3406de39395

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b86f518a66a4e11696e46d5199e311a9

      SHA1

      2c2cdbf376868c99974a586961c256745bb776cf

      SHA256

      686b4f98796eafbb69e8c11d22020baea0fe18617f1fa02c143b6cff2c7e7ec1

      SHA512

      1ed0e7eb264a1fe62704bf6391488f00f460ddef14b90cb5457a58b7f69b56137dfd5e277f14498d143714f512e3577db0e79bcecaf7424f994027328b5d2ae2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c0e019c095af819fde273a794414e2cb

      SHA1

      5495b64d1060a4580bacae36670fe0eff6bf89c2

      SHA256

      fb27a05dd6d2b50df339da4559071cc2eb8252162893f171b4b50c5f6ccfa07b

      SHA512

      86e23c39228eab8b06a3cae85ebe0496c6b0ff83b3b9d611125350e64c7e5141d3371f683eba31d36bab46863e7388cd4c6fb154b34b77ba1cae867f595f472c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      384bf49b51505d0495285bc7edd473ca

      SHA1

      49c44d608eee72fb15886819e87c01b5b429ada6

      SHA256

      1c89e6df095dbe5515b7bc0b57fba23cb6328c762e323511b9e9d5c54f3a29fc

      SHA512

      bbe8cbff241213d73787b2b16cdad902f54b280df6664e3bdb2955bcb3b806dd8f44ed7d49623d798867b732af9d5ee57023122c29eade6087232cd18f6151b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      768e4664668dd5f8651a53b64f7b7b9a

      SHA1

      5c9bb7657932b97f3129d2986fe7d23e71c37cb0

      SHA256

      3deb2c481721dbe33a94aab5277da6dbae562c666be24614870c60e1c1fba193

      SHA512

      e9b070c6936456394b63a5101b514e46e8db3f04dbc8bbcfb7bbfc73731b8fb47a81cc91871a320f05b82d819ee13fee00d6094e2e4da822939bb986b9e0b055

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6312ebd2755d762eb4e35deb98d9f711

      SHA1

      b810ab8fbf97d6cbc6f672ae2c2f09012b4bc7bd

      SHA256

      86abc952568dbfd9f6ebe853f8b8ac57d7b3e0b09a004f2b89151e390b738e8f

      SHA512

      a6f432f4fdf8520898020eaeee72621d2b921b8e9edb7db8117ec48c7b036e57cef0ad83dc1b4f320aee0bbf62e96f2c8a0ad0840b8b50072dd8e622d54ad1a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fdb82fdbbbf2ef6879519b77088f9ea6

      SHA1

      1a939ec0efc53dfa5a0635f086976081cf08d7da

      SHA256

      d28224f207a2f3e06e5d077f8cc529c8dcb802fd4766ce7a882e35d5be7ca923

      SHA512

      eb8272b2b89c906b3ca354f00bb913700ce8de74dc6f26d2cb4b437d0f39c663de38b449e525d419d7e2db66625541ce53c9d00ca916901d5c1f516b8dfbde50

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f2f1f47ddaafbfe5e39e17839aff0641

      SHA1

      2aaa042d45185519df77cb0242b25a617003e9a5

      SHA256

      62b31b935d286a7eabe7736ebf6598e3dbeeb8192f57f668737db21f53d6c2f3

      SHA512

      18f7c4c18abd788d2973d34110a2b0a469d7ef6e5f33edb6b9c0a9707d965a6a7894cd1f23edaa7f68593cc58f2bc8625f95b8b0c3db442f481af197a1514167

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8ffcedbd2b9f2fbecdcb65d5668a93bc

      SHA1

      eb6a933910749086877db786ec7e60daec324acb

      SHA256

      45aa6ef328c46e8bff8efa27eec9c4b30ac9880ba75f8c8d2c9697678a5e7463

      SHA512

      2ca0ac57f309e9d5469e1664c2737af0d572b35508c1358316629d5523bd43ddefb09274ded5da2a2a4aa8457360d58d7657d458cdd59b1203546a3544eea02d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6232e63e8e20547d2d0e07c851cc9268

      SHA1

      0545cec3e5600635d72372fb1ec03394af60639e

      SHA256

      35dcc0a91d9a985903b7c298127b4603c34d38cbfcb33c2c77926c4ce0c712ce

      SHA512

      0323467341d224ca616fbe36ae1653de77e4a56d9b23a0b738c43eec4013e70e66c0faa32683b928e4c19eea578aa89717e6cffad8e6e649d1ad2932e96bd5b0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6d700f83e24f5cd2cf5c4bf275034479

      SHA1

      a215d35c08639165c445313c1d9b9859c14bbb27

      SHA256

      267ba60998946e6a765f071216b362ede2ac4c682775cff7d0cdce88a0bdfee5

      SHA512

      f892fe095ad3aa2ac72a1bb149b27ca3073e3be119943bf476b64d6e1ac714f0a15fc6422865628780495417213af82f22e519dfb8991884cf22714c03f944fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5453063c99132083e3adf4240c02dabb

      SHA1

      fb5e64efc8fef4f8962c2d0b1e1ef9331fc61469

      SHA256

      b0aadadac1cdfabcf916e25cad510e49a3a362d9d4681b7eaaba17b0476852ef

      SHA512

      b309ba5d23f39a52626efeac186a2330bb4f79eaba13c2c58b75b961e0b9a77ec6506dd725791334a7a497fbc35a4e6df84b818586d1853c6ffad27481e3683a

    • C:\Users\Admin\AppData\Local\Temp\CabA2B7.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarA366.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2056-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2056-450-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2056-451-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2056-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2056-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3024-438-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3024-441-0x00000000002C0000-0x00000000002EE000-memory.dmp

      Filesize

      184KB

    • memory/3024-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3024-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3024-435-0x00000000002B0000-0x00000000002BF000-memory.dmp

      Filesize

      60KB