Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 08:16

General

  • Target

    6ae37f835e0d9a8be80eca06612f0870_JaffaCakes118.html

  • Size

    32KB

  • MD5

    6ae37f835e0d9a8be80eca06612f0870

  • SHA1

    be39fcc7c0f6a342101d22889aaf504cebb1ba7a

  • SHA256

    931787e239f7cfeddb6bad62090f306de2996231327555428da8ce210e641643

  • SHA512

    e8c9a2012508a2e30d67645d7a2478be6e0a4d581addbc8aac34354e60bcbecf8d5aa00a21f0ee28dbdefdffb83ff554d33247d2b2b2eac0e9ea7282ed205a38

  • SSDEEP

    384:Q/u6wK3o0lAtsdgYdKkq+MzITHsLNUaM4fhKfq+DmvaGcHzjOaWOuI8L:QHlMYNsQE9L

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ae37f835e0d9a8be80eca06612f0870_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eae44c93081f02de84a3efeb41f38ac5

    SHA1

    3a5fe8f7063864d007143d1ff4c99c096a7a676e

    SHA256

    b6dee00471e442ebefa26584e00b61078444898dd82a1fef067894fb777ae9ae

    SHA512

    e7a0cc23d3c7a903f894b0074fd07f4bf91d106d2d7792aeb85e08b1327a0d5452a4ec635c4c3dd410b52cc0b4857cff6c43fe59aa1d8cf1bb15ec0290c3126f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    876e20517d423617327f0afc0e17c416

    SHA1

    2268127d9fccd4becf338c5a5d3cd082d29e119a

    SHA256

    6995f2d2522a9901a64f036401d02c6e71fb7cbe01d3d24458964861aed6a725

    SHA512

    4cb1774c361486848a77e36d086b1ca59aeedd18f7e769060d81c41088e96757669334a2b55d2441481b820e7e1de485a3abf8ce94da22fdd41b9435a63fe289

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49869cda8b5c72269a5039357839b5e0

    SHA1

    f914067788ea67ea0debaaeb7da07072cb9585c9

    SHA256

    0bc68dd3690e22ba7cd212dce58819e155b62741096a6a46f7239ee3d98fe542

    SHA512

    ee64320a99f586c61b37ab539c146a6d194ffd65d79ca736180985c079aa373f8aba46f05d6568e51a2278682b9c4203979ba6809e525a6eebd7825b315715ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdc1b9b0691a4a1d3bdd5b431d109970

    SHA1

    92b162bca2a29512e65f1120c73716fa2e97a5a9

    SHA256

    87aa3c3b48f5eab931de44ec857b668bd96cbfde66933a0f8054d4335500ab6b

    SHA512

    75bc244db34ce1d369fb554382316395020f8962bff6ab9b451cdc71e84e1e6ccf9c4f587ab59545240ea6e117258cfd8a6c3439226384df3b8d51e6fb9996bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    913d1d26ae21d437aa4377b7585c6844

    SHA1

    86fd3a8567cf869a64b6a2f333b7ec40f4e9edd0

    SHA256

    fc23ef3cdbb35eb6651364978ced390e562de10b8778a8809be2751541b1dbbb

    SHA512

    8ee2d11a09f6cf99a0c857fb070b04428d070a8756a9d8362679970ccf0f531b037d41fd3a39feac269e745a042af4ca565f89665b48e2f6ded417708c5eb911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    212ee4346a3b91ef78ee0ddbdf7a9092

    SHA1

    3ccf2d13c19495bfcfcc622eed2df1602f98d9bb

    SHA256

    68b978ad637551c61ac1e0f8e55e57d483c1c89ccd10a062003eb228cd62c57e

    SHA512

    c57a40805061d6bfa09be8b726071cc4c60d4ec80edd99360776139da6af6c2f25adbdef7ef19387703d3d40676de161e999b0cec6fd59799dcff9b3fbf3b157

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eed33a94a74205cfa9dddb22b3f34be2

    SHA1

    b43c24122d64cd99b61883f300458c04e860ce99

    SHA256

    0780ad59f51ffbe61ffe949a7a3389063b819fff825e974c205b47b711936f5f

    SHA512

    65b446a3707bbaf2d516ed46de43a5431f7cce02f11dd7cdabb588b27e936644f7c0f9f7650105a52fc0e2066d8c7d4b57a3ff14606a33c8dbd633b55a2557f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d31dce54ec733d19065b281be4fb255f

    SHA1

    de56354368e5a50a484ed14dba3d8f8e3babf2a5

    SHA256

    b98b51c23fc270ac156d179a558771f93684244bd19e0feed7bd8fb76ce127d7

    SHA512

    c90cceedb88f096fd7d598e3428dfe9a93fa1139d92f0be63a323d6a4bc9bfb2a5d2c30cc7adf7e285339dabc7135742e066592289b5c720113d49a1a79070bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b05f3912e39272317c1bc17c605bab0

    SHA1

    a1aed00ce2606b890695b22094775118f758d483

    SHA256

    77170d6d5d00c7c88e2ede4c8e61a1acb4010cb9daa44dbc4f3601cdc36f20f6

    SHA512

    76407b658da301966e8f113a0b6811ea8ea8c56154b5555ab8702820aa9f8f36ee3c6d4abbcdc46c53949a9f4d5f5c24552aa278f6fb7cd00419e486442c4870

  • C:\Users\Admin\AppData\Local\Temp\Cab1D6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1D8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b