Analysis

  • max time kernel
    161s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 23:15

General

  • Target

    17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe

  • Size

    113KB

  • MD5

    17e5f525e5c5853a71f3238ee0a12e41

  • SHA1

    f4bae783f1a5abae35c5ef8e6ad87bd1ed099004

  • SHA256

    1e3818ca8b66cfae092f94e6a55c840759d28ac76d08bc5eb2b7e5f3b8c3ad73

  • SHA512

    1fd3d915c9a1d6b6e57b941006b2d78a2fca2890fff401d15c7c35f634c59abf2b129ece39354872a0e2bbc80dc325be1781d8a616931aa48986a83f6a5b7096

  • SSDEEP

    3072:kE7YdXFjJHu5puorSE5/fTNjliDs+TseWBy2D5:p7ITcFrSE5/LVlms+weWBBD

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3500
    • C:\Users\Admin\AppData\Local\Temp\qRP9q23
      "qRP9q23"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3112
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 204
          4⤵
          • Program crash
          PID:4924
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 204
          4⤵
          • Program crash
          PID:3260
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3516
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3516 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            PID:816
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 204
          4⤵
          • Program crash
          PID:3508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 204
          4⤵
          • Program crash
          PID:3592
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2804
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            PID:4660
      • C:\Users\Admin\AppData\Local\Temp\jwdkyenngcrftxpf.exe
        "C:\Users\Admin\AppData\Local\Temp\jwdkyenngcrftxpf.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2080 -ip 2080
    1⤵
      PID:4916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1984 -ip 1984
      1⤵
        PID:260
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2524 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:2348

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
          Filesize

          471B

          MD5

          fa34ecb8815a2d98849888cb1cdbf38b

          SHA1

          84fd0e04586009efb3683c98da8d9aa41487cd42

          SHA256

          5077a54924f80491a74ed78bbd73ff7bf85a27caddb80ceaa9ccb86f8b9a11be

          SHA512

          ccfdb76ccedd0076601e17272d346229e2b9c0dd884c09bb7701b32c5dc177da8a91bb539ce751297d8ea44716fc497e8a337a9499c93a474ba85915f28f1053

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
          Filesize

          404B

          MD5

          68c97149a127c83c3b275b65b03cd39d

          SHA1

          12aa4fbe9ea290c8e26325d512c2817d4d8a19a1

          SHA256

          4de83b296850ec879b8ab24caddf7058fc74af77ff214cc41af75fe6dc54ab6d

          SHA512

          fcf2c3722e9305167ccc62c9469f67b969705ae012be8949bab38b69319dafd27591457b7b3a4f1bf53ae87d0bfc71aef4f4c40f472ef6ae11c6ee5f500756f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
          Filesize

          404B

          MD5

          3c0adf46820a7949f8c803d5438db1bc

          SHA1

          f86ffacf0f22a941e36212842a135d95765af7e5

          SHA256

          5992e1a69c43c6008759a4436b130b4352e9eb304a4e7dbdd086f1c3dbe153f2

          SHA512

          1083bd7e9dc78f1d28e26acb394ccd8c8210e584357ba9a3969ae93e7a04460e1b939f5f3f40ac7fe84d5f1e61ce626dcb1288579cce7d40a5ae1b4d0b1b1f1d

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F5956FC0-34DB-11EF-B9F7-CA9969386483}.dat
          Filesize

          3KB

          MD5

          2b8c8744977f2294cae8cb02b1454eae

          SHA1

          948bc1408187cb65aaa40a0602cf893c9be32e4d

          SHA256

          edd5cd58cf723e6c0db99e1031b919783f3d20ec53c1543ae1a21c2d3c9a976c

          SHA512

          655be36e57f29168e7a893b1d731327c94a861a57f20a28df73adb829f4ad78c499d994fcfb0c161952568fcd783971a3e7f20c850a62386c26b197f90a859a9

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F59596D0-34DB-11EF-B9F7-CA9969386483}.dat
          Filesize

          5KB

          MD5

          d885fd60c2397470f2b75ea83755abcb

          SHA1

          7934dfc0f4443d57ae133f83761a5a38c61690ae

          SHA256

          ef7f557855eb7ecf3eaf979f3d941293a6ef69e30a5a4596e185e211deeacce2

          SHA512

          b687e120c96c5986362a4d1c4692ae688f0f6b97dd787fe74cb9a039dde4c3804def6db1f9cbfbbc54bb8b8485d1287981e056f76adfc98343913a54c5a6515d

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver7BDD.tmp
          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Users\Admin\AppData\Local\Temp\qRP9q23
          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • memory/920-36-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/920-43-0x0000000000400000-0x000000000043B000-memory.dmp
          Filesize

          236KB

        • memory/920-41-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/920-38-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/920-37-0x0000000000400000-0x000000000043B000-memory.dmp
          Filesize

          236KB

        • memory/2080-14-0x00000000004D0000-0x00000000004D1000-memory.dmp
          Filesize

          4KB

        • memory/2080-15-0x00000000004B0000-0x00000000004B1000-memory.dmp
          Filesize

          4KB

        • memory/3112-10-0x00000000008D0000-0x00000000008D1000-memory.dmp
          Filesize

          4KB

        • memory/3112-9-0x00000000008C0000-0x00000000008C1000-memory.dmp
          Filesize

          4KB

        • memory/3112-26-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/3112-23-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/3112-22-0x0000000077C32000-0x0000000077C33000-memory.dmp
          Filesize

          4KB

        • memory/3112-17-0x0000000000400000-0x000000000043B000-memory.dmp
          Filesize

          236KB

        • memory/3112-16-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/3112-4-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/3112-44-0x0000000000400000-0x000000000043B000-memory.dmp
          Filesize

          236KB

        • memory/3112-6-0x0000000000400000-0x000000000043B000-memory.dmp
          Filesize

          236KB

        • memory/3112-25-0x0000000077C32000-0x0000000077C33000-memory.dmp
          Filesize

          4KB

        • memory/3112-11-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/3112-7-0x0000000000400000-0x000000000043A04C-memory.dmp
          Filesize

          232KB

        • memory/3500-0-0x0000000000400000-0x000000000041F000-memory.dmp
          Filesize

          124KB

        • memory/3500-13-0x0000000000400000-0x000000000041F000-memory.dmp
          Filesize

          124KB