Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 08:41

General

  • Target

    JaffaCakes118_48f22300d025bdd32df83777cb07b728.dll

  • Size

    159KB

  • MD5

    48f22300d025bdd32df83777cb07b728

  • SHA1

    7baa39f3dcc34b9eedc1e8d10c84a87213683e24

  • SHA256

    26ffd6dfc46314ff1cbe2299f82db84567b805f63000cae1b47b5dfd2aae89b7

  • SHA512

    b59b8bd172ee73fb73548c07fc1fb1c2228e6779e85495c5fdeef2e661a79c3693d0b22e84f1cbb06290c6e5e12a7575ce3e384b9a4fdb393537b8afafb3dcad

  • SSDEEP

    3072:HRccpvUG4OmCnxYWI5SEsjCkoxNSzQF9eSkWa+2Fr2TLSO85:yYU7cJcZZNIoxkT+Yr2nSO

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48f22300d025bdd32df83777cb07b728.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48f22300d025bdd32df83777cb07b728.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1296
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1172
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2196
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5381ae992190701090ea6e3d97b278ba

    SHA1

    9e670ac556db6cca88cb2d409aaea0638d616a51

    SHA256

    32fbd5c53851509cda5a757cdcb96cff6fa5d2e5d7f09a955468c2a1f6da46a4

    SHA512

    2b96a5e9149c7caf0ada8a9bd9e219b10c4803d14848efe47f261b24e66521398ad6dcdf5a95e9f612040cbfe6e11b6ca2f398368c00711a63841c30561b62ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0abf8e97133a8fb92d5266e37899ab61

    SHA1

    f6c00dc265bdd37850d72f453c0071b26db252f1

    SHA256

    ad4d4cd2031aadfec94f3c09eb8fa95381545395c0d97c72f4737d25283e752f

    SHA512

    338512d554e161b63d97fd2e3898ca834d7fda2b617e3df5e663974dc690b3272bfdb2e16cece77597c3fef6ad5aac01c7c9eea05f982cea997ce57c6c33faca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    759c4ba606ff06836989c03ce5bf58cc

    SHA1

    402d76ec8476187110fd5965dfbbea171b6fca68

    SHA256

    7c96a38d01491489045ea60eabb041e86b47fc7454861d7fbbe5671db17e48b9

    SHA512

    37b60460c9779269efdd6f13755a3c9ef0990648432ea39d6d87e5e5d3e25bc428b45073806710deb64ee5448be7d8b76ce86b0be5fa53f7b5a4d4c9cd2e177a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29462c3ecfb1b53035d2dbb75a5265ea

    SHA1

    b70cf3e3bab70944ad6d4edac88dcb16f2494b98

    SHA256

    d2d543e8662c45a1005d64b8fe2c33bcb969aaca221afdc8d5649aabd6be6714

    SHA512

    75d0484a95e4ab71cc68ecb4d2b024d26de36d0e76769996d339b88b45119c46c747e3c8bde310418060c17adbe3b6cd0abc3a2f286c74cb02d0e05ce926dced

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1585706d432a9b68f0862e9b2594ef43

    SHA1

    d69471e5607ccbf56a1a004617b8cf966182b535

    SHA256

    db7babc5e0e5ddbd10a7a8891f9e58c569639a670df5865590e0547ab20bca7b

    SHA512

    dc25abd31aa387d828f87258f43587cb45ae56bd9f854202340fea44b406ce79b6ab5e729b44320c3512ce1e0955c447e1385465bf019ad5d4ce0d2d83630cbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb983d7785ce95629675354930af081c

    SHA1

    e0126c0a0c2bb47a4a92a463704b41d49f10ac30

    SHA256

    2596e0ba4aabc72430e5928fbf938b8c43cb72198bab022950ef2771d995491a

    SHA512

    0db782940f16ecde4b2f0f7a4600e45ffa2f4ebeb53b00bd39e6bc8dfa710a514399920909ec1f89b848c8a6bd502770d10cb985c3b858f776a56c9c5b5cb523

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8ac4b7fc10e7d9b13feff2d42c41224

    SHA1

    045e6ddaf6fa6bfb27cad78a038b17455a07f840

    SHA256

    eb86bc33b13ac35f9704e668b4d52c4d56afc85eaf48dedfc6678ef0fb7dd13d

    SHA512

    83bd96b28e3d739a75dda15d5d036115f62da18e58c88586a79ac979953eab48e7e5a6d3c1ddd5dfa33817350de35780866c8f09202e28d6d221bb737d0a52f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77a0d7204da3a016fa5bf673b5684646

    SHA1

    6be7580a35b35c5ba3f8cc76c1b37afc6a3c6db9

    SHA256

    b21ea434a41f68c07074c5e538055e73099e6d4a688af4383054c9c1ad3d1cba

    SHA512

    54f471b5dec28d235151de3ec8483498aaf02864a71ddb522b7128a904464cb8b2c41f6580ab1bb11ee8d3088060bfde481218dd450ae12101cd5caa2f67bcd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8da36e9e28f17d4e51ed0664f7cb7cfc

    SHA1

    311688840907c8b15b7472e28eb55cdcbe2653c2

    SHA256

    016bf2a499961b731f83ef111abdb0b50374b23a9ec829c0a198993f404168b3

    SHA512

    631280fd41272ba1c7df237c02ce9ffeedca9d60b6fb803566438af2a002a78ad990a0ce9177e5a088d18215dda7b0c3e077f595737b32606fc522b8891b2383

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46c3840ad0091e0f7883fa318548b7fb

    SHA1

    45d27b411bce0824e09abc49f6122e5565e8fe1d

    SHA256

    a86677a753a4f16c76ff3d839c2d065ecbb5ca68f27726e28c23a3ac257aae2b

    SHA512

    26473b35496475cb1a0ed5a23ebe6e81f20480eb65bad2ca88dd0a3445d32678a074e81c181b57305000348666a4420cd7c3383f1fb3eab693a1fbc0c1e57246

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd45c399fee6cea0acc925c82e157809

    SHA1

    e5a8af23ae6e3aed4008b65bab4bab2c10232af2

    SHA256

    cc0608bbeeeee1ed1a3da51081f99e2c314ea7ce2d00b81c6f120425b0bdfdad

    SHA512

    1bcc00e94db825fe724b84ceaa10011643d5474386083fb1efe1a9f56ed0a87dd1081383ce83609805d380b9a0b5bcc0ed079e4d9e40bd23052de534218cedd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56eef9b1f11670bebd91a71b7cdf4528

    SHA1

    5f4bec43575a1bc7a3decc09919068c3b5f4891b

    SHA256

    c002ee29a9e01083d6e4c43634c10ca5eda8f846c52e1b8f5f45dcf0643ee7eb

    SHA512

    79b8e987e57c305019dfcfe5133f5a2b6e86cef1a4023fbf56c74df4c0ce7db1267efe3f77ed6e068f6f52264599de1592790b700b8393a28413ece52512db7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f9f4e61dee3f8de6fdd1f5d9124a16b

    SHA1

    722ee4ec484abebd570a4f521ae1b6c217be3562

    SHA256

    7637f91e3db2098f3ad79f0aa4cb3f7f3536792dc2723d22a248b24c7926aaf5

    SHA512

    7dc9132f88203001698da75d1bf230934d9cbeb4a9b00a061dd2ff99371e8e720489c135a1dbecb294b408219f515ec57649d9a8e4ba54da53a90adeda009ebf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e458d1d17e0a32394a086ba4c14b3eed

    SHA1

    149bbc0ee770390d0f084dcd4ab47796193f7b8f

    SHA256

    e3d6843c8416c2b160b981facbdc44359ef1e376df634bf06abe19f22a164885

    SHA512

    59a3d314d8daa1fd8c877708b53c516146f5a2b3e51cc9cc4362348f037a2bd2827045654e4ce381e5f83396fc64c3c7922760325ecd622d9e64fde15ea20461

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d0de36c9a9135b771b21f2492c16ba2

    SHA1

    175aacffcaf9d095086e0eb743e45d09100426c7

    SHA256

    e1ef34a5644e57ccc15b0383d914068bb66cc6a06bb093a17b44a1cdb052f263

    SHA512

    d410d17cbb8f4c345a126827356a8f3a627c731b226fe7e4317588e93818d1505153264e0f8c9f2cb5be2e0e63c3827c562b8188ec67a5de09b8cc42b6d7ceea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    031d284d8381905b5350baa6909b9ce8

    SHA1

    ede0007c012ba9cdd410c8444264481049b06532

    SHA256

    830fbdf7b691ca04a5443252a45d5d793410f56a5c567332bafa4ff5bb35a7d5

    SHA512

    76138929b91950a8a6db441ba2417dce2dea9ca0de91615c33ef90947ce760b761fca2ae6c49a3967bfa07a81aaee25a1d838bfa825fcd8dfbe33b7f9184d417

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8231027f91ef4d3d577a236f26a15aea

    SHA1

    aa4d630f5d98c0c2c0e697667bf99189567cedd8

    SHA256

    d4f096ed1d9e1f2aa8e1fb68db5c3a845f84a71b85a38a2de7fb19bc5b737ecc

    SHA512

    49ec0675f4865c9383adaf10cc62ca724df1a9438ea99128b786ab1a31abd4e2672dd982ece8caa5bdfc4af266179982abc34b656998927b2de3fc73e7ff35ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    385c7b0f51050633596ac413f9838996

    SHA1

    3bdd116dc0044f37ed2b02e8ffab5d60ed8b94fd

    SHA256

    698cf75008d130ac596a67999b34cef4809c908a3add6454e0f4774e0be5cb7d

    SHA512

    d0a328a230c1cd31b706d25be2c9ccc59b56b80b078968a2005ea8f401d6b4f617ffa57e0c0557736a7946d5b6f669c268cc91b6a6921aa415a0ce8a488c5e32

  • C:\Users\Admin\AppData\Local\Temp\Cab3611.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3681.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1172-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1172-20-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1172-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1172-23-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1172-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1296-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1296-9-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/1296-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2100-5-0x0000000000150000-0x000000000017E000-memory.dmp

    Filesize

    184KB

  • memory/2100-1-0x000000006BFA0000-0x000000006BFCB000-memory.dmp

    Filesize

    172KB