Analysis

  • max time kernel
    118s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 03:05

General

  • Target

    82cf4f222900e0a607d8936d16cd1bff_JaffaCakes118.html

  • Size

    6KB

  • MD5

    82cf4f222900e0a607d8936d16cd1bff

  • SHA1

    9f3f3aaec8e7997c862faff5864bbe593f36d011

  • SHA256

    d5b9325673aba6ee8fae494dd8dacc1679ccc32883b2688f37a409c8c4f1fd19

  • SHA512

    c3915c9164992fa39ac630fd7424cb87f1e93738571c3984b01eb66cff73a7a8d648b719508e32ea553122a80b7831ae341e53632ed785adef3167b2306aefa3

  • SSDEEP

    96:uzVs+ux7Qr/LLY1k9o84d12ef7CSTUzoY/6/NcEZ7ru7f:csz7Qr/AYS/s4Nb76f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82cf4f222900e0a607d8936d16cd1bff_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2736

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          95aed09e5315b5b8573fee03962733b9

          SHA1

          2c9500d93e5ad8aeca50ab97839b1ccfb5906cea

          SHA256

          fc9b887dc26d2daf89fdf0eeb8fe77c1965eeee1613ee40b5bcb7ca9a4077627

          SHA512

          1c8c2bd4eee0c180131285c408e38ca6f160d641863a7687256934e1b6af22ac96bcdc5d094472147081e2838e68e2d4a8a44a463644ccc79adf666e26a9e2a5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          4a3c8884659358ee53607bff6f3b46de

          SHA1

          9cfd01fd92d92d12d01f415fe4e8f459523be3c4

          SHA256

          a44b7a69d33d1a5439bf29d3fb433430ac390cdd3a4ea678b19bc63d9f5774c7

          SHA512

          72d5dcf51b1bb7d7fadde6bbfa23759521770dfa83700cc12713ec5481ff878116ad1300a5703b8aa9654dab64034514258c572cdc3e7d710421fe63bda0fb48

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          c7895c38d8cf9e77fd0d162f47dcbe59

          SHA1

          3bc8a01c7f31efd2db764e79959b4d0ad38b4a43

          SHA256

          21fe9c90cbbfe5d513af31ce4a3aed93bc53c295fc412ee36b75c5ad502721f7

          SHA512

          12a94cf30bf88695b152f93573e9dee97933eb5a99cf900b524811cb9eb524c6ec909c2f3b85980299089a683fbc4081192241bab10d6ccddda7f6f784a9e9aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          02aeb786ef4609e88c1a86f34dd7eae0

          SHA1

          b546da8991c92085a25b2d197541dd509bbd86ae

          SHA256

          7a65537b45da1fb3a9c9e6a44c6923c63511f4db7f14da2c22f2cb8e8971e463

          SHA512

          6202eb5b667e954e9946abb9a91f231f29f9b5c71f4d83bb115acef8862f558e2840c292505a1a68cfef355d70620d10e4dcc88080b7abc22d69108a9715a569

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          3ee79366ced7a4a35b7455d6d3ab0613

          SHA1

          5cd4e10d0ad645c3f5eb76c9da7403f771922250

          SHA256

          88e1e1ef0ac392dfcb2381de28c98e2b7ba299d64183d570cf352cd898c30a63

          SHA512

          0841fc422dc7cd5bcf1180ff27251d571dbff2cf7a2a7d74a8ae83ab8322b6753f04f78c476cb65232bb7f6f89e254a0a48083c6f73878134e387c461760106c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          cc3ba20c75873cc4b65cf34860f3d1cc

          SHA1

          b22d6b43050c4143ac5b4a86a4b746ae873cf7d0

          SHA256

          8bcaf1ddd9b5b591509d55d6a0e1a6a13698f6d172c2b36ee921ee63c98c5567

          SHA512

          33e73f6e14f7c47ae5eabe630c76fc2eae32469e2ddcb94796589457e970fd7f1820ed9b732b60c67aa5df58dbee94b0e32477daa2b92e63387166f900f12b91

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          4a8e2b09a734714bbff3a7a57ab145d3

          SHA1

          af4dd7a6e1de0534bfc61b5edf027f7cd208fae8

          SHA256

          f333a1f4d2731c648f4e32fff1bfcea9e21699e2b40ed981f035136025ee9e6e

          SHA512

          dd8b746fa65a236f6ee4d0f9c5d025cfd0ab60e44562895120d93d49a04893580789ba14b770e9b0d74ef6c9fea7b8087552473b54426bc3898576f36c99dcd1

        • C:\Users\Admin\AppData\Local\Temp\Cab1D32.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar1EEC.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b