Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 06:39

General

  • Target

    19256bd12b5a792b34f795d902744001_JaffaCakes118.exe

  • Size

    87KB

  • MD5

    19256bd12b5a792b34f795d902744001

  • SHA1

    050228507ddcc182dc15c34f2d5ca28e8aabfaa3

  • SHA256

    4ac41d74455939bdb93f0278d8def69e8a7731066766208833a83e3cafefe21d

  • SHA512

    05ecea31633d84ec3874ede6f69a0598180bdb14c65a856d71bf8d341bcb997adf3a9bcec969ed39dcffd47bc612d896f8ca3ec3eee5f493ab554575bcb0c06c

  • SSDEEP

    1536:UikAwHxzZh2UXYmvdRmSZad2jN0RAJGWanGjPEep3KJ:xkAwRzhjdRmSZiANP8J

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19256bd12b5a792b34f795d902744001_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\19256bd12b5a792b34f795d902744001_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2572

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    05daf274bda2b62b14358855dbd9b003

    SHA1

    e158220c7ea7d356afacffcca1b32e0ac382abb5

    SHA256

    4934c05c6ce33c14e35eb4e00f108a8a889640f063db80a34afc3ed92e201557

    SHA512

    e2b09f5cf503d52c72dd4e5f22b948301af44f8d50e2ee604f2e2ad23853355a4ba123312d3fd6da0f869310b417e11cd8d073d272065ca196248d3117901f79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3eaa71ac22b9e6345902ec8266199e26

    SHA1

    a71d557acef6efad4c2d268b50e615ac857fa7e0

    SHA256

    548ae4e5587baee26c997f814378bf474248757834611fcb7fe2dda6ca97ecf7

    SHA512

    8855d2f51d86ae7c68952077d4a48c30352beaa9b591e9550e91c100a1cb392b072070d5666c2c65f34373abd4829b9e187f0d579a017d165f740cc1c4ac12c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    706437c51e47b4d164c856b1cc678b6d

    SHA1

    665a41e0b3bc8b4299c68bd7a48d2899c7a58236

    SHA256

    6390cf45eaf195943bb1f96c430f339a9489b5f034a4eb587a74e2b77b39e7d8

    SHA512

    5d4bf28f1c7c9578fd3fec68a19226bb3390a4aa268660496836a6abad04327abe437e6252118a3b7c200c7c19512f617e1a37d40169cefc998232abb69ff88a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    2ea95d63ad42b8f8d9b799cf7f611b65

    SHA1

    46098d5a985cb1b0aeb7a74f6ce47304ec726ee5

    SHA256

    687dc9048265a84e5d1f48e93d15ffedda1bd16c04c52079009d6031baacd147

    SHA512

    ea86001312e01db5af277d7ac73e46bd0dc0b3fc054ce16e9c394d5772b32d205c6bc1f5854c9a809e97fc61c9fd82cf3727b75f33b06656b0be9ddc7daa1c5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7f7b92e4b2d595ba38bb3af6e60037e8

    SHA1

    a30408f3805261a64737214ab444a13def376437

    SHA256

    21b1ceec50e6a29707ada6298f8a3a3119259132ac22c19fdfb1e353eb5945c9

    SHA512

    6354c6d288df631dd4c6732151786de25f04bd107a70ed92771048319efe550d23a1adc9c6ed8b95b176410b97fc22c7586d82128408b0fdd0c02d49c50bacf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    9425863ef40c84388702e90d2a0c85fb

    SHA1

    b315e96b5f05f591e331bb7733342a94a2d63b85

    SHA256

    cc26112f318b17325a0867036addc02f0114d8cc531afa637ac7772cdcb21cff

    SHA512

    a8970e8c8785b834aba9d05b96fc1947c8ba38744c142d7381a8598bee869fdeb16c71eec64fcac3a40fd0d3d1dcaa704c335549a249838d78c03a340a21cdf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    860ec24638b5b987af8ff0d67f857b8a

    SHA1

    2f4a22df62dbe994c630ae06827661242c875810

    SHA256

    d0c4ed14f9d3da0ca361d12485958008e95e4b6b2f569ac18b93911489b6d7f6

    SHA512

    1653e803d6118044e7ac7588fd19a300d5409be27249d5cadb43189c612c1584bd011c4b4bf8d0a6e3a82ff5aa7c4b11840c914df4c95948a8772ab67acdae46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b4bca1ea82758b7871562c923a0ff055

    SHA1

    7c156cd234c812785da1a89f649d6e3779092d6d

    SHA256

    440e3f3e3b5bfe5c8f23ce7b52cc783cbae324a7de862d5d034e0aa8d2b79410

    SHA512

    ec5cc853d588e0e00154d4acd962699896a47a9db933c06706da7feaf44d04206ba3e71fe5011367d9745114dd87a8e6c959b7963ea84355e36f4e6d4abacde2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    de5bb4c6de48c65366868c0497c32184

    SHA1

    e7ebb58c21ce96c73680f914164fc09a2cff42a3

    SHA256

    3d830bb2616ff1c6fb356cb1d1eb340c256952bad2e90ffd7c4f6d035ad75597

    SHA512

    a48d9b746815af106c408d09332188c09b3aeaa708a589170cc508ddf5b8f3ae2b0c7522adb4ccebc4dc2c9067d20fd929bc406a3926ee5e20c827f3b5244491

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fe067c80a1cdc704fbbb66024412c02b

    SHA1

    6d0ed7dd3e3c60c5c5e831750ef49e12c6e3970e

    SHA256

    e8deb3459fe3e9e40df232f714d9f3564763d4f20ad139104dd35fe5aeb1d74f

    SHA512

    633955ff041391d907737fd64f399a8ee088494f6cd6fabe98c6530ad0ab519f0f504186b6626579d192694026a90ec1f526b5539f6c6a86ea041e3b0d211e5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    cd536094d339a0090b604b527f38fe04

    SHA1

    c827fa34ccb1e405e109d90e0a681c6b71c95829

    SHA256

    dd80c8f21af91e94c20c0b41a451ca04e276743cd5d3b9a6078d901ef34f13cf

    SHA512

    99ca8f706eee7d5271a20426152678d403009fd1e10fee0b29e25bc7226323dedf2f0dfe5ebd41fd92129e856d86a90453361428194607ce2a5f92db8eff305b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7c9846472cfe46e99815042ef9bba258

    SHA1

    fd683dae9df5e0d2107e594efba134ca73c2bc98

    SHA256

    d967847126f449cc622f0e626837912cd85f9129b51868b047b48aea917d9cdf

    SHA512

    39026b93eb49a74b1a3b5bef29449f5f16762d386373aaee7d149f48c48c00c78d1d180fc8151832a5d2b051723fd6a0eb02b1b393ec6d53831577035958436b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f27450b35a84dc3a80b329b45351f131

    SHA1

    8a8b48188ac4d5156f75fde334ccefa3489c2456

    SHA256

    25805599e58e1280a5db85b47cb098f28d487d4b0edf05edfa693871705dd9ef

    SHA512

    2f6d7114060070502bca317b11e77f31d3451dcdd4c0ad5cd895b2a10d6ca12dfc4fcc43d8f29c437e7213eddc2f021eeb2079d8601134c07a9d380b72084052

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ec0ff6cf72225e8888a217441cb90802

    SHA1

    8284244b33b10b5bb112aff1ba854ccc995a2e92

    SHA256

    4b67041e8861b936ba3b9eff1d3524b46b0d605f556950d22614552f27bdde9a

    SHA512

    7ccec1b4b76f345948c86895942e681e150e68957faa45a66047098bccc58771ecd07a70a85655caec6fbd60c289c86020a3856d678912e038a06fc2f787fa44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c81d2dce25a86379a8c64afb72f792e4

    SHA1

    32c06977cd6b0f91a00a1e01e777cce85f907b87

    SHA256

    a50c9dd83dfe0b925c9d012f6b2d31f0b6ed92e3818a34edffe52c436c670d40

    SHA512

    25b3e159800d9670c20dacfdec15ac9c643392d85d7789949d92c529c8fceb4cf8daeb67f1f1c2cc04d0ea3c0b6ebc510544bd15d67b570543d663fe88dd76b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e9cfe1143d4b8ee08ae5330dd5fa2262

    SHA1

    d6ee3b1db1161d2384947c397b401e43c17bf79a

    SHA256

    5897af85c391ab1b889da1be5b4b27209bafe8d5355383fc2606e059bcb812d0

    SHA512

    da6eba7e6f90f1cb9d8a2a73b82fc6f25e65963b032c7bacf448b2d2cdb3acd285dea397ec4ee6d1eaa0c99b7887d1075f350b471bc3d572243d0659f8289917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    756badd734ee4b71c0c58112e603dd32

    SHA1

    c08c7a1b4da614fdfb38c144a3387b78f95ea475

    SHA256

    977232b667f1402f07fa21e425c4b62a0313cc8015d25b07501844f1824f97d5

    SHA512

    9e3f14c4e3a7f844b340629254563d434e7607656f032dd86683911e02073414a56b92b18040bb74419f1f6600a9cf49743b38c2777d617b3916a0343a46490a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6ab366bd935317a92cee5ad9baf2d520

    SHA1

    adaf042604dd5030e6590b7931bf9f6c14bf3816

    SHA256

    e1ed0d16f875d6b0f57c882124eedcde5b07046b494d1f0e5f01736e0c649ebd

    SHA512

    72ae67e3ccd570e3e9a1002c74c4d650334963898065b2c6e5ae5fbeb6d8803a4da9eed0145c6feaefa2f7976d65409e708df4f52e22669c62a058bef675af28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    25b9509bc86a0af68f234023a5056bad

    SHA1

    a082b928221f0a70451c7f64d366c5d9bfd97f40

    SHA256

    545ffbb880538307d8824cd520955163752ab54bf48f7498d3f7dabc53f389ec

    SHA512

    cb0f54c387dba173070922a4a6b65574b184e387d62fb16152e056b4890a9658253d0105cdfc4d39f9fff463c57895f0aac687ac1916be4da295d0fcc600fb5a

  • C:\Users\Admin\AppData\Local\Temp\Cab370B.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar37FD.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2104-8-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/2104-3-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/2104-0-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/2104-7-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/2104-6-0x00000000003C0000-0x00000000003C1000-memory.dmp
    Filesize

    4KB

  • memory/2104-10-0x0000000000190000-0x0000000000191000-memory.dmp
    Filesize

    4KB

  • memory/2104-9-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/2104-12-0x0000000077DAF000-0x0000000077DB0000-memory.dmp
    Filesize

    4KB

  • memory/2104-2-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/2104-5-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/2104-1-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB