Analysis

  • max time kernel
    70s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 14:04

General

  • Target

    786c1a522bcefd64e741dfd212af45e1_JaffaCakes118.html

  • Size

    2KB

  • MD5

    786c1a522bcefd64e741dfd212af45e1

  • SHA1

    c66d30ced3b333cec26b4565abbc04e23f293d83

  • SHA256

    625fe51a18089786e135e002eefc7d951e7148337dee35053e4b321eeba6cc56

  • SHA512

    7d9474a5048d983a4e59cdb243a30afd4027c97d3ce8ac2a4954d8bddc50c7c81e459ccca334a46be90ea4b54cf0ab5bdb56dc261b02398f16b467765e74ad75

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\786c1a522bcefd64e741dfd212af45e1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1182058c0498725e3a4e4c898adbcb68

          SHA1

          ec64419b9460e348c7a246680ea224a2de3baf63

          SHA256

          8fb6e14878660067a9e110d8b695cdbfe93c0b2e7ab663bebb7c07f0cf3d68eb

          SHA512

          8dedd39b75424937a3825e800c1324e23cb5a6e4e83ab0d2e30fd8e901f18e5633352595831702769283523085fae8893cb5a8f54b4166278d5e609d0b461faa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8ee8a7ce0fa87455dafd8bcfaa89e08c

          SHA1

          2113e612045ce191818127dd06d40b0ee1a3f782

          SHA256

          073bdfca87f76feb0cb893c6f121f28464a9c746a09cdf97dcb58fbf7fcf418b

          SHA512

          c514ae66d1de42657bc83dedd9935b275fc65bcba6cacf302d8d82ae5658155e110cd77094e4832575e0e00f923e44d8f46ebf338d658f0b5f6c9150dc4b33d5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          89fe3f0036b4b19c8353df1e7a2b763e

          SHA1

          417ad076c86b8a699fbd5e146484e19e82a8cf02

          SHA256

          012c8f3550fe8df31007ad4bc406a07b954da8799e2acdbca35e63230effa2b8

          SHA512

          3d946abba64ebeb8160a39c4cdd31adc916667582f3c5c68c4f9b5f63478a4f7e6f79b4b51d608f7a5296f79525079d0743e88c944d6decd021c07c0b4f3df2c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b72d6ababd0a89905b72e84b682c3dd0

          SHA1

          3130b0b42296a01abff3c027897d89e40f185f04

          SHA256

          34b8224b60cf128f003b43aca208507ca028b1eb89400c67cd89fd8313d28d8d

          SHA512

          06e30047889313dc8dc0d35a2b7e55e744924478a8f44902dcd67cc504094c1de1946fd21179c15cf88d3df683c75c9e878f12786d1550992ce542decfb5464d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b193958abe1cbd297dfdcc321336156c

          SHA1

          1d9d57b7ffe12c32cea37ac04d5896177c433293

          SHA256

          3f8fb078859dd3b8b4401af5a9d818062bb82e39011c8fb1a5bddf4efcbaca7b

          SHA512

          c160ce900d55351677bbcb0a306b4c4a767bef0532cba25a0e5f3b863056452174c3717fbe1a1875469da04bedbf27c20fbab843f63ae24508ffd57a054fb7b0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          96f5fb529a2b3729f653d09f146835fd

          SHA1

          e740c61efa82a5e253082d4714bb21d5ced841bb

          SHA256

          defc0c18fe9599555e0e21bc709b231935e9cbb04c0da312b8891d3f06e109cc

          SHA512

          8d5beeed2ffb0e772e40cebe2c035c2387943e1e58d271277c6f01d6f074955a48599be951f5b43dc483be4dd257d79f4654f049e7a41c4c6518cf21a882675e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          650f4fb502b0f9ae9ca7bdd6136458a6

          SHA1

          737227d48f02a4f8e540c1cd5bc9af27226f842f

          SHA256

          2c26955e7b977b6b6b0f234e4dc958a432d4a745b0f4cb551eab3093db311f8b

          SHA512

          5284316a0e2a5b4c9f1efadbb237ee472559be4369a26fcb7b8c02ef13a5ca0903236b4db842d02f0e48ef7ec151d261c19517e3cbbf254428074193885d27e2

        • C:\Users\Admin\AppData\Local\Temp\CabBAF9.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarBB0B.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b