Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 07:12

General

  • Target

    6ab2ef960f366fd401891fe44d8aac53_JaffaCakes118.html

  • Size

    10KB

  • MD5

    6ab2ef960f366fd401891fe44d8aac53

  • SHA1

    fea8c856024addaf1608c90ca1990ac9441e5ddf

  • SHA256

    43e282724034d1a7909353a5d800b631c381bcd1bfbd800e775cdd1e9ac5cd69

  • SHA512

    04811614f835569b47dcec0ac2d3151cc5422c6dbefde82ef087eb4c53d9161270ede8a2a17cbe209d27e2bc79afa851600e2df0d04776475d3a0f4453faf157

  • SSDEEP

    192:2VWlIsr03JxJy8k/w1whqJk1J+BJWJtnJkvJuJUJnJw01y5uBuLbdU8d:sWlIcuvE/g6sBoTnOvsiJG0y5guLZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ab2ef960f366fd401891fe44d8aac53_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bfe9d4110d97f680fc7ac5553098482

    SHA1

    2c483cb61349a75c262e8a546b701f98aa154513

    SHA256

    aac69c112b9514b9574822e144ab94511230647b6de8a61620b2c0ec9aa7eb68

    SHA512

    f15969a56da6f1f8244780b9e2de7d982787e99820b9f3ac804259aa7860f4dfa14b97a2b19758bcdbb7bf7f298d726c17db0d96954fe02ef5bd26a3cea5f609

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa13fe71c54ecac6dd01e979c12516eb

    SHA1

    826635d2b3ca13bdbf555232f41634635b82121f

    SHA256

    e1256cdcfad44e0480e83d6416979b58c99c58245687e9c8865ad14d7e3c3472

    SHA512

    b93d5ce443ff18c31eb65854cd70565a614e6ebf46b952b8e64f4962c2051e71c565819e44df67f40afb2dc0fb505ef4bc31cbc1596a46c54d36c82d5157deb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdcc037d002ab31345b854862fab2216

    SHA1

    03a404e7a7ff8cce1f5fc0622ff670efabd37251

    SHA256

    4a9b1ed773b83b076ded8e119b3eb361e3162b4cbf3d5dc024d13e013c08e899

    SHA512

    92af3e3e7fb2701a91b73044bc82483fa651f374cbe9003320f0aaf55d0de6bba20c0618843206a7465758b9646da39c6627330ac7eb152f0575439512dba484

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b473b79c25a5934c89192313dd748183

    SHA1

    061f1be3a93cad896f09783465a7d01458d0be25

    SHA256

    23bdffebc86c252e685f2e5cd54fb7a47869dcebc177a402b852fffaea9c2c84

    SHA512

    273ca373a3b4f98f735071c2a3b1037bea25751d025ee6005b5843b1f1924d2dc0e53f642c172a249826a0d37025a3ae030b53610c6f0418fa6fd98b858c6361

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a2786199782752f5571f235ac7a0097

    SHA1

    bb08b6791420039e1a3ea91c0c524834d9a4bfd3

    SHA256

    9d0507cf701d986a8dd5a863ffc23abd979c72683fcb1b878a2b7f21d7e0434e

    SHA512

    01da24e626f03800edd8e800ecc87a6c4def74f8ea1c038b5ba683dcf241949ee8e8f03c17f5977888e2414e4d7eee404963b8bb2690798f701a4c35ef864efc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00ba8526d88f121196760b5ae6f5cce0

    SHA1

    19b34d021262ea23c686a3bdc6be783405dc9ab8

    SHA256

    53a79fcdafb8c97c6a1bdf68b3e4d12b819480d0f59051a706130046553c74e3

    SHA512

    a76de7416ced6c045e56e36be0d66ae99330c1606118dc12c2dc85bd4132682319997b0fe86b25ed6db7c463e003780a8309d0f8540609fae9f4377086ccf762

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab4517d3b8c5a1b0e14b226457d9352e

    SHA1

    8afe24cfe54662d1e78cac617845ad0e55da30e3

    SHA256

    169c6398e5abadd1831bb22198751dc2657fc7da57f1688dd4fe05cf0b292b58

    SHA512

    b6321fdda16834f79ffa12c6b48463493ff5b2737a853e39e27e3936b929cc81c90600b082705b6f3cc2a0dd25e3de04349375361cc74a887e76932200dba808

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a84a2c838f395ff27c604b7e79bb8964

    SHA1

    3acd53530c4a9b8a9598aa49c788df951cc92c88

    SHA256

    05c422b0ceabf4d19ddf77d8cd8280a3b2bdc324fe686d9ca07d7aef325eb1c7

    SHA512

    0d03c6048f10693c9494793cb75aa9588b43a969646d542aa875000ad9d678e3853e272af2a48785f41bbb2e886dbd9f0d49e00726d1c15d759a6ea76e81cae0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    167165cf6e52acccc858a9d81a55fcf6

    SHA1

    c0865a6e50dd09910ed02be8fc68e32f10b18198

    SHA256

    ef62ac0e27b6ea49de8fff528216eff38f267ebcd02531a73846d3c0960b0fee

    SHA512

    863ccfc7ba612f1b7a5a6f4428c71b2255e305b5141cd1d65023ab7d0b5716c434c9092233009d4bbb149dea763166fe0d51773a1373f427d18c517ac6f30170

  • C:\Users\Admin\AppData\Local\Temp\Cab5ABE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5B30.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b