Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 20:29

General

  • Target

    JaffaCakes118_6f6742b8efbea63fc49633747085e544.dll

  • Size

    796KB

  • MD5

    6f6742b8efbea63fc49633747085e544

  • SHA1

    bf7fc1b24fd2fcce0066ced723db34912e28119d

  • SHA256

    3fa7f97e8f151e549f3d3292cdff5f102d7360441df482e1ec108339a629ea69

  • SHA512

    cbe6781966fe9a8630006e4e6f0efada70b59a41f263795b9d1b54c10e2637c9f8bbce0118cd21e2a348bf66ebda44ed912b23b9c495ce0b052f28e94c090223

  • SSDEEP

    24576:rSg9auyPl/1OhkbJK+YLqKw+Jx+DROSlM7a8eb5:rSg9auyV1OhkbJK+YLqKw+JMD8SlM7av

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f6742b8efbea63fc49633747085e544.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f6742b8efbea63fc49633747085e544.dll
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\SysWOW64\regsvr32Srv.exe
        C:\Windows\SysWOW64\regsvr32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2348
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e6a9ffb3f829083b448bd1c3542126d

    SHA1

    2fa7442685888dd219f23de6cb07d2a766af9eb4

    SHA256

    a3c7ffe73de293fbc82f98ad26bcc19ff427ab7ceaaa1ef3da5f37f2c51720ff

    SHA512

    33eedc9a5220bb6e5f19173b8caae9d71e03fe2bb9257f0e2083c581c395b8ea6e393b32bf90362e40957f3438247941087561e2814084fc92f900441392b6b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9249d16d1c785cda50a3483e7ceb356c

    SHA1

    19838c4df054c01d71d0d83f0116c232d9cb94f3

    SHA256

    bce4cf493a2df32f0edabe2a5472160ed0ab2dde73b1e614d4c93ab1eac765d9

    SHA512

    247cbb111d2e425d3c6345439db6104904d5a5a7bb4d478a6519eb6a972ededb8c00ba7e9ec6588f86bbbbc920e490b9c04095adf7e0b5447a0471837751e71a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbe9145cdda0c3c38b3ae90e39e0786c

    SHA1

    024b9e02e912bf609bde05c489ce3348ba528e17

    SHA256

    8b48600e33b2ae59db8f37db5d177acbd76a02a736a45f59a9ee5da5ea2a0804

    SHA512

    0bb77b0373a9bc66b6afa1e0f154f39c705ecbe6d8dde367585d9f20166e954bd19e0d5f7e585cef49a7989d3312475b3e50b346b1714e9cf2b703b513a890aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fa6d81ee7191e37d1310569bbdf4497

    SHA1

    56502c0db4ef12700eec01cc0a386785012567a9

    SHA256

    ea49085beb47931a5a1be3aecc0786c9c556cc1275844e938081b17cdbcc02c6

    SHA512

    cf92739e366f7eb1fd5f33f07db83d5ed627b0a6f305f78628fb944402030ec4bc8602a4779972e45c9dc9a6630ab3261c11b2b95221ee663ff87531a92b1b44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fe660c9a1189bae7f84e62209ebd88f

    SHA1

    95104d959c5cd2bfd011b735b2611dbd4911faf8

    SHA256

    1ce1a8d35899f8e781f58e737a20681e97f6c4f5287f40b420ba7035fdc31887

    SHA512

    f45d37e070524cf455f707feba42662214f7471c497af2d7c73d6784b585df000b372cb0908e9a1a3824f9d888ef2b06343c83dd4e1e948839ef8b8675695608

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23c4c208fb20c1c34aed437ff5474db0

    SHA1

    179ac3734ebbd14b5be5a72967166a9aca2fb9da

    SHA256

    596b047e2a62307c00ca16ac7e16c07e46e279535c901de3ed47ada01737f59c

    SHA512

    7e246ffb1fe38bdeb3d6d9a196e0112bdad3c1f95af93facfcac6303cfd3e48b69b02da838fafff6afb344546663f7b98d187cd4431708dd1ca0f2a4139e58c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1c92033e720ad1e37d46bd0c99c3789

    SHA1

    551831272bea89f72097e962c64234ce01dcefa3

    SHA256

    bfce4befa94714c292ccb2a7d487c19b731290ae4344336d6e2a74d57cc5aacd

    SHA512

    c2b34367730a5b3b5177eb0b4066d9740372a1b5165bf82c40702c89dfe3f7e41e1822ef06dfbd1ed1ca446d4b1aee7d7493adedaff0af4493c784de60bd1340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03863ff1deaece56ceee787c0571123f

    SHA1

    9a276c3bf467fe57c82ab8c540f823696af0be3c

    SHA256

    576514d32ef6043b9bf30c8fec75b7c9ed2f9a2c626e0d14bb142779b11f089d

    SHA512

    4f702783c3f383f8fd763c3d8139df0bd191496247fc790dd2c4df67c5dbd26b6e23a6073f60c011242fc1c1037c1a1c903b9d34cbb18e83691a09d891e812a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f001ad2d5aab1bb44fbc49e0785de70

    SHA1

    5929e9616bf748e557d21937df75d1802c81e71a

    SHA256

    56506e788afdb241739bf6a74ee9de6660d1b23ac3bea1bfdef3a946599b18ae

    SHA512

    d72648892a546e467d94db6e2a5285bdfb4f572b4b582630d36e9f97d4f086beb7951bb6b38410ca80160128a865d2dc3e097f6730399a8eb5e6b426bc19c53f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3251f3eec6b4e8b3f6aa30d29cd91a5

    SHA1

    8e8199f96ffbc7e2c8ad8ca5264e47f7deb268e4

    SHA256

    76f4cc86634d7d373985578c6afd64150a0ea336174e60dde7314566c65fc170

    SHA512

    a16a1b3f9ff9af2e6072b3d2b6db43f4999c09ee152932c75d56a93adf941f362e93ed375b6d03ba8ebbd2f77f3b91597a2543db5534a3b6f55b8788d8cab2aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9804df88229ecbbbcd16da833e2c530d

    SHA1

    4fd4bb9baf2326194d21a0b9dcb6df9a10f51c07

    SHA256

    59b9fa5da21e23eb327e62b90b1e24870c328a5141d23cea66fe7311e5895ee3

    SHA512

    906bb360188dfb0332f3565910f55fc1b63ceffc08b27708a658652d9a326852a309b9ec3d6dcc3bfed6c4bf4983e8b5e3b54b96592caf6852816df1f9fb6545

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c969ae1705baae227e7e985e4b7bcdf1

    SHA1

    a45768f43f98718e58dff1015a7e2ab59beb5517

    SHA256

    8ea6f0e13a5d2475657f4f2a16b3c79fe82d21cc0b9e14a0e255f18b77537451

    SHA512

    0cdf8f41981c4b8b239cf58a38f6b75b8026de4783affebf8aae2833d4ebbf725443540d9d21acb8e23579a4bf43e253afca134ee93c91f844bb31aac623a872

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79b9f2679f47c9507b38894d3320a59d

    SHA1

    da506c0e70d5c55bf3ea3fc49f8dee1d794cc425

    SHA256

    fee095f3072eb44649c7a8e6f1dbd94d041566d099e0481a7473f8d819cdca26

    SHA512

    c547b75c3df0ab5cc218a885624c69d7255579334cf3f8b3ba6c15c276a57cfc9bbbaffee95f1f1c92edc1951500807b83dfb39d68e1724049c417f02ff07c3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c97cbbba41302f952381a7c6dbaedb3

    SHA1

    384cd6494832a13f0e5a079defdba3feae90b882

    SHA256

    bf5cdd0eed6b01747c02ee07eaf3f2767b46f8f09b1fc94143b57dd6a2d1a3b6

    SHA512

    9e96d770c6b44427008005b2e8e31936fc7e6a6f27245b54c627ec19993610f557d60c6935b924dbb31b08e57eff768437c3e89ec1f0e6547f8ff662eae55619

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77428bfea372efbad2dde5c3462b66fb

    SHA1

    ec2092f157eec295ed929702c7db71ccc4e766be

    SHA256

    2b0ef303225ad8ecc28233faee76845f4c7608d17cd7a8964cdfe9e0da2a7335

    SHA512

    99dd6a05aaeff1bbe0c06c46dec5db3b3aa0fccae19e48657a30ad44cdae14a045b435757484ac85f906d374029379b16178e749fc709f287499e797ddbb5832

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99163cafe5bd79d09fe852f8c785ddd4

    SHA1

    9f2bd248240a08ceeeaaae7735666121a3a9e7a2

    SHA256

    8eaf1c2b73088267aa141a2344d25ed90aef22a7a7ee04ae2351c7111e173cad

    SHA512

    f9f5d94df914ef484a1f6dda8d1f4520b347fd6a0c86c1bae3cec5508e81e067f2b7900ac9a3df0bca045e07026bc4f1fd4d2a8365a467115210403a3db910ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7819b2257227a53cef0b9408d60f1b83

    SHA1

    2f8512f77a69a597b534f24e7655070e36110583

    SHA256

    5e6ef3a9af72554483cc87bd1a951d3bda2def3dbe07a39b7bdabdb159105402

    SHA512

    741a7a923e013e54917f4c7744911f1e4a8554d2e627f69fdadb934214912541a49ee21e577ad7bbcb4dd01e14d4cfdc02867d4b61c8b90bf1264780be9f678f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    290c6558656419ce460022e822c9e6cd

    SHA1

    6e424da938b789f18a57cf30714dd3e1b3a56091

    SHA256

    e90e07744b8211f03c42c1f1232ec9037902999f8ffb9dff674d85de025a3ea1

    SHA512

    e6d4019b97e97f9f5cdfdbd74756de120e0463ee3c22fba07e1d67a9ae34feb2ccda42e6980f54ab694245dedba1206457ffb9dcf1ceee184e24dcb93b217748

  • C:\Users\Admin\AppData\Local\Temp\CabB9BF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBA41.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\regsvr32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2348-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2348-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2348-17-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2548-4-0x00000000001D0000-0x00000000001FE000-memory.dmp

    Filesize

    184KB

  • memory/2548-2-0x0000000010000000-0x00000000100DF000-memory.dmp

    Filesize

    892KB

  • memory/2560-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2560-9-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB