Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 07:48

General

  • Target

    776bc2283f8fca810d83ef33091a034f_JaffaCakes118.html

  • Size

    31KB

  • MD5

    776bc2283f8fca810d83ef33091a034f

  • SHA1

    acea35881eb97a1653fc36a05fda05ce2356675f

  • SHA256

    7b876b1aaaa23ace941dcc70a1baab25a1444dcfd3050db7904551e16d4366d9

  • SHA512

    bc22e9f70759f4ecc1d4ba50a932bca0b3e14d015be2e279e6bc9f3131b3d74c99bbe1d8820fcedb87091f5ec36dfaedc14e8eb4f2a0b8d137b2b55f31973a48

  • SSDEEP

    384:SI2f2blMRVl/4QREKMMvQVOL0WCVaJNF6g/XFkkZi:SX2blAVlhRJMH0vJWgPFkT

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\776bc2283f8fca810d83ef33091a034f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3782bd430a0459198d0e84dfc2450ce4

    SHA1

    3f348e40ff2b0434eb677d3dd195f2cd4bf5a136

    SHA256

    71c5f4c0ff6cc64e2392df49251a909a25e449734f61608080005313fe8bc19b

    SHA512

    f75d26999030fbf96061c1d40276b187f0c29a68bb31c3b117b27a606f2146a337e5e39d5ed2da3f86e8795fef68ad0ca3f5c13032dea92b0fae85036b3518e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db8b1884df87ba281b21a7d7420e6bb4

    SHA1

    30e49f225fffe380aaec0bebc36993f2093f9d07

    SHA256

    c2227e1dacb6679e933cd41f3c5d4c1dfe6e1febef69a613b8de9a88d29bc823

    SHA512

    cbb20eb3e57826bb406d6c8d7d8206bcf80d4ef7a1fd3aeaba3f5a769af2d263251e183080b2c30b53ec29bcf471a5b619be0183225e90db7896398031a6d412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3f4e944b272ab63f4e3af4ccb8047a7

    SHA1

    ffaf75088da9ec8e3c59b269e64c834ca85ad7e2

    SHA256

    fce05a7657cc1130f4f8c41fb0cbccc9f9c5acaff5d62bffea33262b7059f296

    SHA512

    714eac70b03908d11698da1298eaaba22a097f5f803b570bb6597bccbf8e5d61a53094dae38156408ed99df448649463421ba4f7a5140fdea07c14c7e80c6803

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd5b856933121cb5573209c65344978d

    SHA1

    105acbd8d2cda96ce9942088ed536249c614b651

    SHA256

    69dc6cb8861ee46b95bc8a4d5781947d283a5120369b9333ca5f1bd9e15f8a0b

    SHA512

    b01b19c0c5e82dc48e043e80bdbb71a82079bbb4dd99c8e8fe6a8536a12b4e868af00d7407a14cdeead58b4de33b01e3f68cd5924baa81a25f4250115afb84db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a836cbd05797c872d732124e310518f

    SHA1

    60e5d1aefdabe83d31e53a529a65eb43841d057f

    SHA256

    1d8294cec12d98eb95164e70a5f11b51f2aa8b93e6b9801a94ef40fb1555d651

    SHA512

    96ccda5abc6c8a8f31a76d81b06b5bfe79b14b6dd147e705c421bb005f8795a5b042f5949d6ec9e2e69c3159a442f35c7310add1125caf0fcee52038576e8962

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4ef1b1e7db3fb2c3863628604bb38b7

    SHA1

    fbac71aac77e389f5b988a32e93331a4731dea62

    SHA256

    fed0f1868ede2e5d3178f160eae69eb3b49c553ebd2654a91a47f1052ca4c44b

    SHA512

    8e3164937b300244a5ebd5b6e725b7ed600513eabd77adf8854fb2e46c5327fd7eac65e0b703c3d2ffd735fc9bdb4ab8c79504cb149952434cd722c2eb1893dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3040b48e29e34ab4f2dd5c7158a7611

    SHA1

    191b6701894143ccee1e85111bab9b7177664a61

    SHA256

    0e56c44c66cb25afff0d457c5b5c285ea74e94ce8f9cc0376d19e8bdae6d8348

    SHA512

    254411caf11f33338a6307b185daae590db36a97f3dd2a311ce69081cb4f365fb21cf0a37377b6a0b1355086537dabe860ecaa547d07d19fefc05a11e5fbac3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0eb598b928d18341aa11f3fb68c5d5e4

    SHA1

    9554a236db12fe9f51956c527ad049cb8b5571c9

    SHA256

    b2eb64c3ca6b9098cfc7a3b5fd8c8a8a0bef7bdb73254b96750d8c1f03bffd42

    SHA512

    2a4ab3ed8ed2f7d55add1b870354ed04c79a6f1af73f57f5fc451e93f4091e7dd68a57950fe354032704b872420958280c7c47af4366917668b085a66f2e55f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e79dcbadc28d112dcefde0d40a34c52

    SHA1

    0f91d34ccf4bb022e43f7805e3bdce2acb9c02bd

    SHA256

    a17a6f6705fd55ea2841bc7f5dfd38d4e9c40e96e2ab9600ae7ca5088006c379

    SHA512

    3656ed0ad02a9bd43af94a083196bfec210b99ba68be6b6df0aff6c48881e6dcd5141c523079b991a4edc11eda603987f1575178f93afa15203759da10dd7a2f

  • C:\Users\Admin\AppData\Local\Temp\Cab6D07.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6D78.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b