Analysis

  • max time kernel
    126s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 09:06

General

  • Target

    JaffaCakes118_78d5e21942c9987ec4e4cde8c6239341.dll

  • Size

    416KB

  • MD5

    78d5e21942c9987ec4e4cde8c6239341

  • SHA1

    30997189dd45f52714e19e001397e08f3cb1fd6c

  • SHA256

    87b3405fbab9892900279feac3df2196cae469089abf67f038617a8609bb5e8a

  • SHA512

    ff68f8c8c49d9e1ac21acf77b3182bf8856d8290e90f2df169d05c0ea0c31a57e117b2b1be5d44ca514e2bf6517ca0abc14907995b635c520022a786d6a06238

  • SSDEEP

    3072:8S+oYdk875wgVDhpGHa/LMQgRnJ5mw/G0jgVxBDCH7OgtBLfkajaAXjBjsPVHDJg:8dt75wg9HgRnrmIjm347FLfPFsVHDqj1

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78d5e21942c9987ec4e4cde8c6239341.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78d5e21942c9987ec4e4cde8c6239341.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2820
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275468 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2544
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:537612 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2984
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:734217 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1420
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
            PID:1432
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2488
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2492

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6b0c2dd264103b57704c12b0c291be0d

          SHA1

          a233ac892f48e0d68365eaae9dc463c0db054c73

          SHA256

          9e064636b7973f2600e424f05a7c37f0f45e91be04a9dc32639cdf65c2d81e35

          SHA512

          3490b5c076783cccadf31889873fabb7af14f70b25b18f5997e28c53b5cc7fc68e0206c6bf032968c8b8fa122782168f00e7e44528b619190f6e59cd0acd4ddd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          571169bee45154237c7a9d245eb37c2b

          SHA1

          ccbc8563ef9a28b4d7ac19aeb6f6d156f0bb0b06

          SHA256

          76dae53f370cf251e79cad4c8c58d80efdb69993cb8e69ff7b8b3796f14532fe

          SHA512

          d156a83eed3de14f54368aaa2a68dbc09be588c9456f403e0181a8186569dc423218b5b36eae167acf90d2af8b63f9696790f37578c21610967c5fb51046e472

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          574f08c2e05aebf6dc697bb449448b7c

          SHA1

          c2c2470c86bb37c372450b43af1d20f182af3c24

          SHA256

          21d7ff3f6d5714d40158263713bf1ea8f6ce1fc244a98c3aebcdbaa54a5990a3

          SHA512

          1568be234ceec455b88b8173f900023a6a471692c5ded2e0ebb8d6f4123a3408a2afbadafa9f702214cd4807b127039b68f877f2d0adfe0e52db4f848954e922

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          366c43affa34ec374232af4bc6a9bcdc

          SHA1

          81fa1c772035a2939a0c456570aa9bbce047f49a

          SHA256

          6ac817c1905a89ccd2b34edc4847e062b614fd2d16fcb4e7d57ed3d57924c8b5

          SHA512

          3cba5aad452a1f18a6cc83334d4fa91de8efb1ec3397b8dc68178277294c7e5cdbe231744d4bcdebe86cc53054311e5c28d9508da1dec0bd5f2c85fbbabf7196

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b01d4de339870abc30ffc5ce3b0f0c58

          SHA1

          3be21af13688e66c9e441981e18e7e86cf1a1f41

          SHA256

          7f0106a857685fc7df2d31cc1abfe43db0d13a87fa4ba95024b91dc8e598666a

          SHA512

          ab36d37ffc6826bbededd310254ee57472c25912f7e292cb34b9aea8e6d4bf684f18caff8ce4953f3bb7184e211b21d3fb7e4b4d3d1a7d917f6eb9752eb5e3d9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d23d4e909efd5e63187327119d71f49a

          SHA1

          98fe95d8d9bdbfdadf5764ee1d2a609a23d1bcc1

          SHA256

          b53849168500b2af008d754a5e03fd60f2ac9fc0a90d90ac7b5417dc8f400eb0

          SHA512

          89d3d01caa0797f91bf4833d32d788fbb78d58d73d96be03dafb5a8b4f73222f66477c49b768103e3e8d035a88edcd1e06e2879035720c69fa6332bef016a5be

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ee517a69a39ca122e5ddb1eaf564cb0a

          SHA1

          429a1ce6176ea07b3ee3775fef5ab7afacb7af0f

          SHA256

          b5f2e7f83ede2bedf216e7501abd618e4374c943d02f97179c6d648f815b246d

          SHA512

          f7de334417fb91c47ca3da76c4edecdeccf382260d021702065d437eb26a21476a18ead201aea0fdeb9f8b1ee322f9b5efcdaaf800db2c6429b32581b6bc2315

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          91d594f3a7ec21cc856d82c460010970

          SHA1

          9f17cbc8099bae8229643f04d1bfe0387a712e9c

          SHA256

          d6016acc602da136a51e93be538555a26503e51f6ebb969b2745093d64e164bd

          SHA512

          b367597dbbd0aaea93dbfec6ef3898603f2020a00abb29ec535606c2bbb39f6e7ddaf2dcb0bd97c608a3187df0576ffa5e9abdfcd8be8e9d71f172976da06bb8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c030261a5092fb48609c589463e3ff9a

          SHA1

          f5a8d64d1cc487355c3a2b2fb09ab1426875d513

          SHA256

          c6f09d50dd8aeabf4cbe5ff622ceb3b1fc98993f0a4734838e2141eab86aa97d

          SHA512

          48c35991389f2d2313b5b7123c3cb65a88b5cddece1f3dff21fa1c3b6316ff2c100c700303417c84ff14394deeb1e5681a1cb3d04d668e8763422cc3fc1f9879

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          10a20f71d30b5d880d2462f9d487e425

          SHA1

          29b8566ec075f6bb003a79fc50cbd2fce86b4a07

          SHA256

          d84ba19866d8c78bd71250f8e8a42062b97dc6a4089a8ea4dd82fbdbc713b94f

          SHA512

          8d9a0b370dc4d51206ae32b889dcb9dedd5ea675b26c1cfee58c9e33f31a111c938e61bec56e37fd47b3f6117c4c562edfd5224ff69973234b7c21f1a873af53

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8ef660d1549f5b3d4deff5f0fae8dff2

          SHA1

          8777475b724a058d19f9bb715f260410882b8678

          SHA256

          877ffb7227fe7283019b63f363e1c567ec01f9aa0d4ed494b419901dd18dc04d

          SHA512

          13f41fe17342a603470e2a44fb1d1673e2c32518e0e69b5e7d948532d246df7303d68eec8c8e55bd430ab8ab7fe1e73e1d252e867ef68429dbf7e134ca9e584d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          eee83fdd5b911b563ba2f9584bea6aef

          SHA1

          eaa5eeb17dfdb753e5b6bba5e2c212a756050c9a

          SHA256

          016d70408d5fcd7b16214c10d49168e2c4602eadcc2849a802c2f3d82120d02a

          SHA512

          1f1178666157107a9122999dcc99d31d778fde02c55c1a56885e9d6b7dae12f2e1b714923e3946f3e9587d59c74b446c2b1d2d4eb9a7302076b1c7a26db0fbf6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1c7c10bb7e2c9feec2e22e203043f419

          SHA1

          f71fd36a1e1ab18742749bd0530932b3b1a9e03a

          SHA256

          9970b6f72a0823a71302162a09c515f79137bb42bf1b92888528f90e5a6915a9

          SHA512

          3cb8a31719c9ac1c42fa84b3a3348ab698b7074e8e69b0c5e3288fa8ca717dde3551b1bc0afcaf75c35a60cec66568162d98daba5000938de3ac243a3f98b890

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b6fbb40ac5da65b3a585ede79d74e39d

          SHA1

          6098bef4d44b6cc82d7c2307506cb0b5da8a18ef

          SHA256

          e6fe4fba670a7f7cfc577f31cb4c9ea443471d0139a4383d93519aa31c31cbca

          SHA512

          ca431f1693f7268cfe0685ef6a1effdfac8ae06325043f908dd9df5d7993cc590ca07348ee3ef6a2f81bc7359e671a0882966518c779e75cd4100d45167f15c8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b04738d1dfff93c5adf54078d25a39ac

          SHA1

          3c7fadec2d32c9249a666999d282e93279ddfc03

          SHA256

          929cb336b69346ca7650d9b284ecae11b26e487855434bfc66015b1998a7d6c2

          SHA512

          72fa8a065fac45c94288135e0cf1620fda8d4887304d5aee8b0357f668baf8cdb35690264c7ab18537b61e51c42a686fb39ba7f1b85fc9c5f396a6befe23c306

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          43c50ab952063b92b795e1d871c0d8db

          SHA1

          b8508b62eb6b2fd23938da5fa5b625d0d5f45e43

          SHA256

          83590d47fb11ef2452cfbb83ab62a1e9cf073a8b20279da2ac905e7564013743

          SHA512

          16ccc7827687b417b1fc85b40ad0bed688beda4cf2fe98c4c2bed8d0718620c0ed2f35fcf017f38aa7ce2493fabfdedc1f41469e12957bc597124914d75b2897

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c98c03cafb29992630259f648a1e0a72

          SHA1

          5b93d6c9a1c0a67065332b459872f313ea5d00d5

          SHA256

          1a95e5d012a3b9921bf414fb19c14037237a7698e374e29e8ef66b07c269946d

          SHA512

          324b1d86d37051a1ef768d8fed8cca94f4851e1cc5eec1ba93f3e443c7aee2af51f6c612912a10e3a00e1a20e152d464387eb172d04b2cc621fcef3ce22f1053

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ea7c78b0e0ca9f9475ccd914eaf4976f

          SHA1

          c2f7a30946af2b547880d790dfa8ed9245a79ce3

          SHA256

          1c38c7d5396136a6477b0463ff272a374b623cb9be0917f3323dff8a6fe022b6

          SHA512

          f8b842bde0fdd6cc60c8c179e8d1f997eef3f41595d3be25415c369d6a0d2fa9ece287fbe0ad9b0c2679a8a1e6ac1290dbf41b3b048786438bb07aaa63be11c8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c8fc8e07d59ab3331550dfd52a566a29

          SHA1

          850ff66140fd03021f841bc7d6a7286dbe7dc417

          SHA256

          8d23f33e4c7ebcfcd0fbeb99566bbeb0856c320fcb3afdf21bc9351b898b5898

          SHA512

          402d782e31e84e552e0534e782666b63bd74bdf300ef50d0a757e9628b107a7c0e73b8ab68cf042fb7cb10e4826514fecbee288227b32dbb618e63baea2a2488

        • C:\Users\Admin\AppData\Local\Temp\Cab7E93.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar7F05.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Windows\SysWOW64\rundll32mgr.exe

          Filesize

          192KB

          MD5

          72864b90643b2ff7a3e4c06b03ad2ce7

          SHA1

          52f60736728362514dec7880f67009408bf744da

          SHA256

          c0dc483d5d52f102a46125ba7b79757cf535aaf6075ff1bf0b255243d0b88c43

          SHA512

          b6f2abb30dedc588601324a203f348f453443a28de2a82b16ae175621471126680bf239e502e5c4f848955a6031e211976a3aa24eaa9e1e56b06c30916a23bf2

        • memory/1496-8-0x0000000010000000-0x0000000010068000-memory.dmp

          Filesize

          416KB

        • memory/2380-9-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2380-12-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2380-449-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2380-11-0x000000007789F000-0x00000000778A0000-memory.dmp

          Filesize

          4KB

        • memory/2380-442-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2380-441-0x000000007789F000-0x00000000778A0000-memory.dmp

          Filesize

          4KB

        • memory/2380-10-0x0000000001E30000-0x0000000001F20000-memory.dmp

          Filesize

          960KB

        • memory/2380-891-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2380-890-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2380-892-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB