Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 02:28

General

  • Target

    76b7e080bf997cad179c366564f8af4d_JaffaCakes118.html

  • Size

    30KB

  • MD5

    76b7e080bf997cad179c366564f8af4d

  • SHA1

    9cb060be09075a1de477e38368284aec1ddba1d7

  • SHA256

    3ddf8cfea1d8b91eba09bc479c122f34beb3036dfb83b7c30f7b3df2cd3ba19c

  • SHA512

    0b4f07e3a9f4d4edb4a1b70bf05d5fafa4659a4eaeda6c6c2eb3493dbf556e1d72294e3ed7091783035ec2b39210b165d3852fc6c501d1677053c5780073bad7

  • SSDEEP

    192:uWXXb5nLYJXnQjxn5Q/DnQieSNnwnQOkEnt1VnQTbnlnQeXC9AR9EBkcwqHAzpfe:jQ//AHopfZI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76b7e080bf997cad179c366564f8af4d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c37ed0ff5714b0c23fc24ac237b7ab2

    SHA1

    478eaec222fbc2fa5c217141813146c9e1e5eb66

    SHA256

    235091bba97a6fe786e6ccdc82870b9e91e01cc325f0111400d89b340b3c80b2

    SHA512

    3553d9e39cf7e81e7fe0ff5f2592840683bf7a741c1afba83553ae0c879c4bde6871eb7c4141efa24dc590981c7d3c8be117b1dc79e1f6ab93f023244ffc63ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3367b7a221316ed41e63d97ea17f49d

    SHA1

    8fdce6b1dfc84ac5123cbceff2e9a7a81d1d59d2

    SHA256

    6285a11b5feefe841be7120511e7228c958493afcbd46f6df21b48eb7d984907

    SHA512

    8de8953cd94e477fc3dfdce28ac72d2f60a7573d4b0f472d1032d6dccb18aa3342a6e4455b757481fb974f1fd98b0875bd7caaed8b2e7142566beb622d39b346

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84de86227fc12592c9b27d7b32bad66f

    SHA1

    3a210e8c0db9900d95f8d427b973a690b5a0ddb9

    SHA256

    40daa5e98129817b4fe1e6ad2d7546ff982180ad03bcece0d5a87fea51efc354

    SHA512

    2ba0a8343fce15a73f04f0c845fa89c8261489882a060719ff273a8f7006a3e41a0a539c638c2e1c371747be64b76ebcb01e536eae5909d5e84d12605772d6b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b79745549bf867deff3cc367cae65f64

    SHA1

    1bff3eb6c615495593a97cedec7f971ced481b2e

    SHA256

    b5120c6d10f261ed4999e11d1168ebbedfecab8d6573146c2e107194e67bdd96

    SHA512

    b710e984e3233adbde175c928f73e2850c711b47d65437d0e8d6259ae63ea94af1dd113952aa645d589192c4f52f79d672f92110c873eb4675c4eb98b92d621b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    479150ae58755906d05038d91abc8c39

    SHA1

    e29fd92db0875b9a92d8f3ed056e2dd28ef9e3b6

    SHA256

    1ab91121335d8fbffa95d8b5efa85f1f809b8ff677f35650d16901c3d750eea0

    SHA512

    9342bcfd82daaf2a7b6b7aede28be9a1470273588fd3e7010246e1f57693898aae2a5559ceec3dee9a6d3ea69f9a8ed95e2fbe70988afa07b4ce6c85c9896e3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b88508391371fd3be14d1209ecaada0

    SHA1

    e65d7f21d604367c17de71d8e7894a7b2efa9a32

    SHA256

    ecd74165d1dd5d1b4d0abb9139cc0f5067250822d03b58994541fc4cca33118f

    SHA512

    02261f215caa822d916dd212e4f601f16819b11785151f3eaefc7419826d9430f8bd207e7e66aff765f5031f153b731f4501b443cfedcdc34a354e897c4ae793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a42b8cd0d446a60d8f689dcdaac9d553

    SHA1

    3090083555dcb43b858df419d96fd5ef13e5e3c8

    SHA256

    75295dd846557456aff2567b388177263822b814cf6b58050fa8d5f920651bc7

    SHA512

    1df0adc62c67d438e04fc3595dcdd85af791e5f04ba0ad2f32c6504bb94fd3d4bdc2e97bea4637640b887a2813b9e1d14dd26cdbe303c43d853ca6d40fd91700

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2547336b0d5375cb875e6109888dcbb

    SHA1

    ca2dbcc09576d359c164a9cb8a5fee44c2a44a07

    SHA256

    004693b03ef1a9ae424403a98ca1488adcd88d3cd3b1a3c4c16c59ebf0325416

    SHA512

    2061fb0f319865b89e3e7548fc958594e18e12834d7c2b34d605008c1484a311d9071349ea206316f48da52f023cbc06a9472b4e6164a629f84856c1e0308c9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    789b6efa7cbfc4a27ab82371f1358cb2

    SHA1

    1046204a8723674b819e8260af942059dfb9c647

    SHA256

    06e5ca0e6f54560b42ae700276c1deb4d0e9107aa71a065b0bc27782252aa096

    SHA512

    1e61f2cae05f208c35d768dde58fe28f3589bb6922f42420cddee9b7c1b1806ae85d8fb606f919e55a767ef14f98e00323bc5a9eb837ebfe3623bbc3997c4b63

  • C:\Users\Admin\AppData\Local\Temp\Cab244.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2E3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b