Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 04:48

General

  • Target

    JaffaCakes118_47b5d09bd1c61d1c0d90722e70881360.dll

  • Size

    184KB

  • MD5

    47b5d09bd1c61d1c0d90722e70881360

  • SHA1

    65f1dab05506e568b8c18ba8032cf624fc993f20

  • SHA256

    3e77d891d7080334802ef515861b44c9a4704f85413e7d386ad23136107d2a33

  • SHA512

    8756929fe4bc8d1ddafac58a3a5385f14406b21a3fdc343af7711a96f3f76a01163cbad32a66e015aa8562e47b9ea9a64f5e99d2360c2bc2ecf8038a7ab15e86

  • SSDEEP

    3072:ttzFx8pZDVtxurqn83eNiDcr1y7uEi3Oabk2leuuSWhdMZqO2MSQVO++3U2Pdvv4:MDVtxuK83ey7jwO/dVSyO0ONO+cU2P1W

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47b5d09bd1c61d1c0d90722e70881360.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47b5d09bd1c61d1c0d90722e70881360.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:320
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    139db2073a27eb77d8695e61f4159c65

    SHA1

    8284766feb8dbd47be009142d0fa662e52d6f089

    SHA256

    340aa227f82eaf19b5c399f8ee32507e7c6e475dcf8163583d5475a57b227f9d

    SHA512

    0a3946693df55232c260c9e056e6576d267df39a13998d24e7c4dc41ff03e0411c462dea636aa0d8cf9cff8ca2685b0dd781de11f48ba910090ac42dbd1593da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85e19b1cba31d562f02b3b29c94e83c2

    SHA1

    11ed2593769330afb8cb2193a35617fd39215b33

    SHA256

    704600ca955492c5afbf352412332c7814f394aeb92b4f3db6253686bdf1b0d4

    SHA512

    f7676a1f7833a80b4f86dad358b1833899cf3c70f516debea2e76e8250ad78338dea5290a4e3aa8dd6942023040eda158fff23fe7e372f55704a4e0c4de7c593

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b847a71cb08d7f208ae85bb5042d6308

    SHA1

    6e0baaeb41364d6cc3dcf7880d7a8a3d57a1b107

    SHA256

    b17a8d3c02806935a0de09a48064d8b4b987ff7c2542580408529fa21856ee62

    SHA512

    9df2a4da108dfdb7cab8a88d01b4a0b6a4389b4ae394f3006a6def710c0d073b318e1fc4b3f8449770a45eec1852dfccba76f7b8212a139c90116e7abf32dcfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c92a3ebe17b8f99220b5a51f140ebc4f

    SHA1

    105f8723b8f237a6171514e424d016994f926dad

    SHA256

    b4aaf988ca36791cf87bcba43317db3b68e965c423a1423bccf16845baa436ab

    SHA512

    c2672c42b7f0573c5ca2637026de7262bfcecaa3c1f358a9e75d2f8e3dbb4d49775d4429f5dc5f50d3bd957500cc7309c648f085eb26a0b1882a6b9c2536bd15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40c43249b9a1b77ce3c1b9ebabe23ce2

    SHA1

    4af9dfbf04e368be0653135a1edbea23d3a0cb71

    SHA256

    2e9eabd85241fb639606c25dfe12d9b833717507b54095f1794867a3c21fff90

    SHA512

    515648604e07b8824b77c1be236b3e3b38b90412b1e49c6ff741bb969e60650caa15ef0a1156286b2ae78ff07a13791894c7490d9976859d1bd063d1719086ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de1e417a9680cbe19c6a846ee23df745

    SHA1

    7bb00380fe9c5703cde973ebd50707075423d24a

    SHA256

    e3a44b5ecb7aa6a01d03572aa1e9cf6085a9b5cbd45ff2da60dfea9d61379ab6

    SHA512

    0787d934e60d6bef01ffdd7b321faa2644915a33431e2ed9fdcd5af3a8474d6f6e0fbbe733ad061594ba4789624c43e73c341f7df995c6a48ee4405f0f04a85e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5757fb5d3443ac46af3201b289b70f6d

    SHA1

    dec7fc2428f974882b9e0371d0721debd71ac06f

    SHA256

    cb1d14968d80f5b3b2c304908e66c6a546c0139dd9765d31f54d0534d6cc7dab

    SHA512

    7a8bb9bb2f489de9c09938f55fe5da4973a163a2cabd76c08c9ee86abf43dde532d2196cda890c5251445684be4a2c1975d5086c2f239bcd65910af37b45c1b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c25993e518875793f6371081163afa3

    SHA1

    58e805d49c19f294b333f751b4d425a95c5b647b

    SHA256

    ba45f45c9352f053a3d57fde42933c1346aaf14332408a9ed7ced1ffdfbb9336

    SHA512

    a65983f5dc36421de260c052ac2167971aa9c84b3d876f311106ff6b97fcdab53b9cee9ec7e16a6713ffd68c97b28034efe09ec92a97c1fcc9c086f464abdb32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9defdedb05714725b702c070e66ba10a

    SHA1

    bcd22a90a86913fc9db962e1bca073607673c84d

    SHA256

    7a05e2b451b607262135d1681381981753dc6ca1d1e8f3040993aef5db116fe0

    SHA512

    b9bda725117bfe94e2317df87918f7d2d6de4a1dae91d70f45cd74603391537b7cadba0e4790a851db2480848bc52c15ed5fb5642d831d4ab25f8db5beb784b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72508a49d686b8edcf761d91322eda6a

    SHA1

    2454cbda2b7e4330176cefc725bd68099760f3ff

    SHA256

    61e308b744feb0dffe99039dc3f3d713460036867f473fe7eef29b93e347aeb6

    SHA512

    7a6320a5b9e44c6d21c171160dd4c233aa7997ac694f56b1d2405d1f6a4079a6a2b18a43bb9827d7a91b981421cd2b5b6480730e2c4ea16653d2e1f50b35f826

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9875b0808e5f1714c1ddd5d5c6e4412

    SHA1

    ec5e6cccbced632c8533dd25130688519804f33c

    SHA256

    1ada6333a95a24aa52e122780023dfe93da753623cfe07e2b6574551cbaab7ec

    SHA512

    3d42c95c9e25154e5d0f9af597b8cf0ea44058d1e3bce60e2eac3873508edce37be78750d770ae3345cf454ed38ac5f8580631fec822421b788b007ddda8b99d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c6164d14a01182d614dcc9b10837df5

    SHA1

    115c6eb6c8c0005b448c2ecd5bca7c3e337ea5d2

    SHA256

    ce2403a5a586e1203eed3e445e33ef011c748960307c6614f75633f5dd6d26e1

    SHA512

    c1d3790916ac4060b8dead633a24033963abf2a2761b9a3d81b68f1ec926a62c120aaf2f80b6d739764fc9968c1516c2f48707586cd9a56f5601f041f550dbdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    707813f729cd94e4033f59c09a682d56

    SHA1

    5c6762063bff43e773c0940986e497d4a274a1e3

    SHA256

    ffc25bb2ecf66ad3f70e7fa35db994b73054bf63ada1d9134daade9d9352a439

    SHA512

    63fd2cf04c6a9bf838adee5bbebc76f4456bea955add247bf5b8d9edacb3fcb3e12b28e0a1c53fe6725bd93b52010252c31de70d800ab4e7d0d765b4d6ae83d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1eb1aa2d4b74a9685e399ed98b78731b

    SHA1

    cffb943569d7bcd681b773b048b817c579682019

    SHA256

    43d83d2a8b6993a86b8ef1c29c9205d3d44508b0e0eeec319960f9adf38a6c84

    SHA512

    345ef96c478c50fc308bc8d7542cf565c6afea32897e1d61ac7fa477219aacbd6eaaabae909d580d81712c0518acdd4f4d7e88c336883d57ab1f023fe01a3ac6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62e13221d27559497386141d374e7fa8

    SHA1

    2f6be2bd464fb9321f2b5e70be0917f775165cba

    SHA256

    0eb2de4af8e9ec75dd3c3ce6f6bcaf817c4d53e36b283555862e8a3ce0a7b754

    SHA512

    16c593456390db153db4596151513cc6f8ee4cb2d92aba44ad2d0eeff4088938fa8b1121b5c5f3c9f2a789bf97b85fe69fb5a65747eb752d32ce677192dd4b03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6eda1026722e11c81b6937c2fc7bc47c

    SHA1

    a8d75d8a6b712a8e1932840da576a4d3cd0e93f5

    SHA256

    99d084f3cd7bcc8af4bbc64c5e84d8a88563510e9cb7d5552514db9407a9e375

    SHA512

    a9f927fc05128390834020c861114305a2190515a7d09f118c36bf443cbd137129b92167b83a1b9d0f3a8ff2e6bf78f4ac938cf9ae1ab23864d39750c9152cee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7aed040521c339e6d5873fdb4e612b01

    SHA1

    c866be1a96a06f12ca9c793ca8ea54ba4e0763ad

    SHA256

    955b06427d4370df4db6824e54889db1a4d55086f16f700eec44c857e5f451ea

    SHA512

    286422a39c8b8b3c3463374f6ed576362b9c8bd955eb8e838e3741744694d3c2bb02567f09439ba18dcdcf0ffd3288da6e0d5c2f59a23ef2044e1713e66f1843

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    368c479188835acf574f5ad47fa2561f

    SHA1

    c19ca0dbd69b30350bf9c307b73e6a425ffb45df

    SHA256

    67658d388c49d7417a5099743a6596df3ea1739b8f2381b2d3ddb7ee2f606b4e

    SHA512

    ea8147323bbc6699a6a61aee3d21edfe662034d8a80a50a2a58a3ad9e2ce0367156aa4e7240a06609cfbb28e0f52efe9899abe7f0f75e4ce96ac6ec72ca98960

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c19e061d727d24b44ade62bcd936ab7

    SHA1

    4a86472b021a28b074fcf37c1748686a4d917539

    SHA256

    964ed5978d26f7e9a0111a0be68d2f763eeaf2ab1b9e524d71de30e1e4dcf89f

    SHA512

    137e61820372a94e38b8d5840b784048faa89afe613523734aa033c221100a32aade37bce8bcec0f019f6b566476eacf06a91fdb44149a6595e21f2a2208ca13

  • C:\Users\Admin\AppData\Local\Temp\CabE7E2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE8B0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1696-20-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1696-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1696-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1696-23-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2580-2-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/2580-3-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/2580-1-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/2580-0-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/2580-10-0x00000000001F0000-0x000000000021E000-memory.dmp

    Filesize

    184KB

  • memory/2596-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB