Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 23:44

General

  • Target

    JaffaCakes118_7d4411e9149b858e186f9b6207b0424b.dll

  • Size

    96KB

  • MD5

    7d4411e9149b858e186f9b6207b0424b

  • SHA1

    513fe691a59e66313cfe0e9680c38bf3443c806e

  • SHA256

    0e7156bddab6a6a1ce983defc0b70b5e3a44113f1985a6e874738211afbc3cb6

  • SHA512

    84cd28bf79bf5a27b7d5e8f20d93e612431246787075875126b113e729ef80e31fcf1026b540d3299d63222af3d1a8feca7f2c2e88a0b083f3e07d38a36b000a

  • SSDEEP

    1536:zibToqp78CcNzxR2a/j3d+9BNuXVI7jWWSOdsV4AQrgK29fb+T76/ZGKKi:zibTTp78CczR2a/j3wU60O6tmF29jhGP

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d4411e9149b858e186f9b6207b0424b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d4411e9149b858e186f9b6207b0424b.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2808
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 224
        3⤵
        • Program crash
        PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a2672b4e11f7e5b5f0dc40c3335f62c

    SHA1

    0449a8390cde6062f85bb8aa21d9029024c1729b

    SHA256

    b8a28e3ed7139d728604be30082353543da9c64a77b2030117cbc6e034782ca3

    SHA512

    9df00772c074358961013d3a25be36046515944480225ee6959ac3cdf9036c5cb46a0313473704dc7dc56ca2239f88a0c20484d44932e5eeda5eb8eabe8df853

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce667ef74cf394373691d8de92fecf8b

    SHA1

    3a6095c96d86a4d2546a70102062f6a960e616af

    SHA256

    9f69e8ff8a7f2c0e2d8a56b5c2deea57c887071eb555ec85fae8709ee8a83bbf

    SHA512

    918928a57c09b441db9903bcf506bab9c391b5fa33413dd2a5e7659ec62503b8e76bd99dcf8815997fa226c49bc021be1570dd03c7169030c7e96e21c59797e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89ca3fe9365dfe9aa3888f11589e7d74

    SHA1

    d8295e7c5c2a1f8fc8ac0280425eefb6cb28504e

    SHA256

    ad7d1f9bb747dc8fa8e26b0af5243c07cc91870335f2da0120c66dff02912dc2

    SHA512

    83347b81de15183250629f0fda8dab42d61b50247388b941578b554eda1e46226f9fe73bededc15b7d89b08165ab14a45977a52eb843805726525f2c93568429

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e56abc108a172a0954e5b1af127f3ec8

    SHA1

    0b80be44c4aab6ce9f9b70f5cddb82affed06896

    SHA256

    27a7582438df9cf43f9f560ab57b4f683df5442b750340d92bede9dffa0c10f6

    SHA512

    cf626e246227beb1bb0d92cc3257ea7f6d3c17d3aa8cc2c35a63e65a1c362b6b8e594037004edd1730eb686f7e2cec913aacb51d4a25f1474b35553eb0881e66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b24b07cb1b540e7490a0d7792ef0eff

    SHA1

    2d780627700d57058a046a6990f8e6167ac6bc30

    SHA256

    6d8e7cb445df87649e54ac8062fc33ad7f17ec0eaf8fcfc04fa3f365c9746806

    SHA512

    d86d1af25a1582beccbfa6939b4bde9ae004f3ded7f055905c0f11941c6d4f9237e33e607057e4beb23c785d0ea45b57b0f1fb4474ac9b4f5bef2a373f46838e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2908537eb90459b085d79b701a38b872

    SHA1

    ce03e924ed02d96221589c26632fa0446fbcb6a9

    SHA256

    e3a143a4a5fd0d7b20bcc39f0fce8b07a14d541b51c3fea15f6a719cd50c66b1

    SHA512

    baeeb72293f2e77ef6048d7c95b4f6f27d82fee5815c7f21f2e187c7bcacaf6056acd4b1f833716f41f5285244950389ea776e6cd3875b6f301aebac0d48f4bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b14004a36dff5927723f09d93435e24

    SHA1

    b122f529fdf6d60295a1d960a62b5697ab000f35

    SHA256

    c30b8b6a14eee1e74d77a226cfb8fbb25c79726b9220f017bed4b670b7d89b43

    SHA512

    47095ce7c0b6bdd287e572c9a555179ae8ffb449809d672e47474b013ed0e73529213e6548fcd66215f964bda1d386c6b91850c5c1427370acc0522059e799a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5097326afac0eb9a7d76dbd42bcb56e7

    SHA1

    73845297cc2df95ba5f38bd17e5fae3ee81d207c

    SHA256

    218223f28efab9e5aca18e2b2ae2aa933e03322c5be24cc6b5c7c8ce15eb9b24

    SHA512

    604ee60715a4327d405a55f57d644bfd44932e3f2f8c0cff83af4bb354f7e721bd51567c667e85ee229aa58e0f992c70f0a0baca5165888ab2039c7de4cfc893

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0f71755d368cdc692a26d6b5bd476a2

    SHA1

    795742fcbc638f1b78681a8f4fbe1e748fd7c7f1

    SHA256

    c685cac90e91a96270f9d47d9cbc8aaafe58e2c924eb61271ed6e3751aab5a8b

    SHA512

    6b0dea0582179014e73c82ada6bf04a93de73d32085e891e60e7bb21d88256bf7eb598f0e74415d53d1e2a632d18b7c0eaa908cc0816aa3d6b7a18ce283d4d93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5e58c63304fd8a8d9e4531d9e4b2176

    SHA1

    333d0d405299ab9b6a9164ab00aced51436980fa

    SHA256

    be835d18c6035292cdcf2692fa2b7b4b10d9578c3a7c758936f1ea0e9dc0caa7

    SHA512

    b6cd2d5db02b654eb44a2846fc219d2b1e569385ce056163e86ff2271917436ad50962934cb702dfa2ee3ded718a3d649f0421ebcc47b5291aa1d1b429680f31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be01580c3ee1b5dd6c7841584fcb1be3

    SHA1

    af3cb7754b1f1618f8a65d48a8cd733e68577c9d

    SHA256

    96df7bec55daf24e2d497dacaa05d8ab9d8e1892d4093ddc577ca855ba74fe5e

    SHA512

    9db50fa7ea2f0e5e7739ae16e4ea8be20563591cba14f05352b3d261d64eeb9d44de790afc7676ed9057fe8a3805b280dda12e6774e1353be16390094a97d342

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f74e0eed03ae089be8b58251c602c3b

    SHA1

    ddbe3c951cc8592ebf5f7e072404349d711273af

    SHA256

    e42653bdf547742cfad1194b4aa0e8f934169517fe38a143fd0006cf6d232565

    SHA512

    a976067ebbb9064eb8e99d6c1be39c4795c2333cc6c01e64d59f62b0cc8367caee114c0ef6844264c9c566da58e81b9503ad97ef5859eb732b7baad3dfad840d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6cffef1a2035fa522ac98b8256b6750

    SHA1

    508d8c822f8a422a74cb4ff3d39724596fc149d7

    SHA256

    dbd0b1506abde0da581e21a46319014ca9eaf980787477ae9ea4bd8b00d01c0f

    SHA512

    78bc2afbb05cea4980aef702ebfaa4b3a63de0f287d2cf2687deb246895ff8ca252298edb6d1fc9ddcbdb8366049d1c548ab2a5e8e38d321705b28fd00aa058a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87db9518706247d0aa26a82ce314d074

    SHA1

    b4f87d0e48889310d34543b54eaaabfbffce4e81

    SHA256

    d37fe268cd2e24951efef5278510c30a826d25f9ab166ce2422e2960e9448043

    SHA512

    329b3ae716813b952b9ae772f801abf290912e9b1e96cabd52671da1ce5aa2cbf1c8065277bf4f4990e8df32de5fd051722757a219b56826880de81df13e0dc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c94295c4e18af2daf1b2a220c784287c

    SHA1

    180d1fce85e64bdfdab6d4549a97194457aa262d

    SHA256

    7fc019786db4a69060a13004871f28d085044adbb7205c0f12496687b95d2a72

    SHA512

    a3e37ec169e94b26187e26237e6aae3ac878a8f6a785b734092177ffddf1f841e56e605d215e9f1add8d0547c90aedc70348a47d752b8756c74b46abd693d92e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a76159cff7b5ecadd9719ee4bf9f2a3

    SHA1

    ca44089afee20194b1ab26cd024418007af71814

    SHA256

    67d23296a10ccdb47ac2b155dfb2526355df92d7302211cf08412dcde55684d5

    SHA512

    d36b7ac3072d5c50be90ecc33b49686ab69a10c891cf5b397e93115dcd1537da93e9f793898be7dd9ad78847951717c67e386f10c28ad73b17bd772e215b0cd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    effa9e6365de21212d14b93838699a28

    SHA1

    0fa50a3b2aecbcfefc56661b76e669fa360123bf

    SHA256

    55772d2ea54cad5a7f5fea6511209739c8feae0a39d1719a81cee03043b9aa26

    SHA512

    a832adfe5f790b8d7487e5f428a0027457f43f8d8fccd59b699ad84e1ac5fea80d360ebe9cc094b0b92fc967f8cc26ffdfd5b8550aec35de0fabb47581ef54c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    298ed2011ba630ed68a0a070b7cd4348

    SHA1

    674bab2f43a1f418e967d3fa8f827337f6bd071e

    SHA256

    0585decd67dbf67e95e55be8b6e02e29515bc843cb143b44fc5c3892f4c99e56

    SHA512

    caa116c2f3bf841456cdc35ed009c1ec7fc0e3d5611d112e30e89b7569d91c456981bd0da1457857f15fefcd3da3e9fe6fec094fe4ac88ba61cbe92a544d9199

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56c02c25f5478dfac00c01571d3a57d7

    SHA1

    41a00d2934a381ddabab361f7d791a51b138b8e5

    SHA256

    bd7b2f7b715c1bb9e07ae020434e355752f4cf67172cb50720ff78f33711eca8

    SHA512

    8977dbe206e87e3c3243e1f382358b3675797a81e38e91f81024cef79b739f90e1e1be3e80efb6e6310c633a2b333ff59ff69e26fbab7d6d6b1f75cf162d46b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7985629a2dc303a349ebd252cca554bf

    SHA1

    31b706cbba55479287905f259f08c49031e11387

    SHA256

    cc249b0162e9bfcce8936f1f31df57ad1d5c0cb6e2d592322ef4417eafe08323

    SHA512

    1badf6f00a13ee5e6349835ac4acf0902760af406692d1ffe831ed90ed99336b138ce330cdb4e1484f6b98bd8beae99daadd9d398c7b38f449cad5cc773d864e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c658d87507e5de435a4605c5dd27aa7c

    SHA1

    86632246932ab3754e349087dbd4bb81cdae62f6

    SHA256

    29e79679660cc04878f97caed9e31a8db5ab6e0c9e04b58cc0a88747a63affd5

    SHA512

    744e7eb5bf72ceebc5d99b7bbfc96d794fbbe5132619bc7acc15a3759f140a1153641586bfd392085862866a7d693b808d818831c82f0c4f1528378b5ed93c6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc4124314f70e97ad5bec47d70735536

    SHA1

    8729499d365498f2dc0694d8a1068903c84d5b60

    SHA256

    36ed031977fbf25414da9cada227b6be17b7536adef333a2d380d8eff5615790

    SHA512

    90c69b142f08ca4466b7d2e84c1478539ec8043445f97caefdd8e786b8478d8fe41bb260c1b0de878e1a572b00e0c96895aaefac7fa94b41f2d2d72d073ae356

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    202ea11f340a6d9435659eeb93ddb986

    SHA1

    179444b2cbaa73df1d94abce9ea33b1edd0cca59

    SHA256

    aeb6d256ea35df37e0effb440d9ce131b3fd5f3eac759acac2719dea8432532e

    SHA512

    72b88481068103d6fa86ccaff61bf6765ce78c81bf74c9065313fda10d4a5d94d427e1a94b7e6c8a9312a8c9917c23bda6ee0faca868fbc3d7ae4a73d679819f

  • C:\Users\Admin\AppData\Local\Temp\Cab15A6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1606.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2508-0-0x000000006D080000-0x000000006D098000-memory.dmp

    Filesize

    96KB

  • memory/2508-1-0x000000006D080000-0x000000006D098000-memory.dmp

    Filesize

    96KB

  • memory/2508-3-0x000000006D080000-0x000000006D098000-memory.dmp

    Filesize

    96KB

  • memory/2508-10-0x00000000001B0000-0x00000000001DE000-memory.dmp

    Filesize

    184KB

  • memory/2508-21-0x000000006D080000-0x000000006D098000-memory.dmp

    Filesize

    96KB

  • memory/2528-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2672-18-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2672-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB