Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 23:16

General

  • Target

    83f0d9437eb269b6917f7b74f906abaa_JaffaCakes118.html

  • Size

    13KB

  • MD5

    83f0d9437eb269b6917f7b74f906abaa

  • SHA1

    2f5923a0dcd92965c33b3de4ee3f524554f71e20

  • SHA256

    795f02b1274b5d677d829492fe85daa718963838ce6acfb513e84011ba8fd9e7

  • SHA512

    c15938cbcc2e6b9075812eb6f8061097e2d542a711c41664881962e892d35592b1b3f56c5daf8ef285af5b032cbb8de30569efe1da12719ecb325f0d0033f912

  • SSDEEP

    192:qD4Du4Fq45vE8Fe4ozKL1n2H2xmPZD0oXWqj2/hX439tqA:qkjjJFDLisXwqA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83f0d9437eb269b6917f7b74f906abaa_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dd058e910b1aacfd156bc6b197ecd9e

    SHA1

    b90622e421c0e3f05d45bc9c9bf1eba9dd8d4e29

    SHA256

    6d927a329de8e71f2b5527ca7a179210baed3c0fd1516680c544d78a5d99364f

    SHA512

    bc6c412829cbc118578d2eeac939a9e6150ef005a6a8ca4fdaa89d9777dc12bc592d1bb41b9c7d673cdf2c9e78c4bc114d323362743cf515610a0b72acc11222

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    219e2b96c21de7e38bc3335ccee6d178

    SHA1

    66fccc61af06a4199a8b8ed833cca865935f553b

    SHA256

    54175903448c2223f46eb5777dcea70af9391ea5a6dd52a6bedea45c6f73b9a3

    SHA512

    35814430dff497972eca049f35c49cd2fd3fea4649e61dda5accbf8b549fc8d428ddd91dcf6a61c2d4a80d209c70cfce7c089f4f52548e75de88a5ffc2504bd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2b64b933f25729010ec7fde33ccc04d

    SHA1

    4a392504c23f184b1b29b9ebbbe156a12cae299e

    SHA256

    ec9fc7c34886d75da6f2a1270d90d23ad9655abecc1f0b0fdedf845e4e7c5364

    SHA512

    f0736078cd1c6ff1e3a28886c5491f556e696b5ff17d5f827f2ea3d302aeb42f1f76ecf87bf5b2e5bf2f15c2af6431965835ec5461933bf5af74f44561c0da0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    846b99b93b52d92a2cea43ac5bd1e1a0

    SHA1

    61e1259c64fcbbcfd2513b2aca9b3c61a256e6d4

    SHA256

    8e2e0da46ae8b9334ac4773e2b0504090f8b1347ccade95a4f9bc1521c147354

    SHA512

    23b7245cbfbfaf61a10374e42d3a55809c1d82643256bf3ca8bda327293b90242c398195191aa51c5ba083da1ad5df959cd080b974f322d37a0d59e84b25ae91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8dbdae67ddb60da09d7bdf62b6156be

    SHA1

    b544030c74913817d76d38b3e1bb59d977d0e29c

    SHA256

    6b65929fb4d11721ea16aab41789de89fc096097c3e15f752f42aa32b3b53c5b

    SHA512

    2e074c13eaa341185e98aaf2988b0e9331c6aeba60564a88f8a0a0a07b3d8cb6d7866efa664b383543c2cd31f15d0dee749711c4db24fc9b1aa9299a0214d01f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    990d6fec9e6140ae32ecb9a3a993b6bc

    SHA1

    d5dcca2b3b52cdc87137e355e228976dc549fe17

    SHA256

    c00ced8b3d6a5ba69bbe60d2ddff0fb38822ac2ef3962dfad3857632cb0b5a5c

    SHA512

    d8d26134ceb67c486160f68b3bec8c05eec065adf2892dd589c662a3ef529b093b3954938e14b10b5f26f1e1206476741eec2a9dd38c76dbcc86f45841ed87a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3fe28855be07da617307fd84567eff6

    SHA1

    511f73eb2c5c546eb85357cd454f3168aca3e840

    SHA256

    99a4cdefc783ddf46b59f40712fb49fbb1c262f605ce56a6e6d5befd7f2c2e10

    SHA512

    27209599d107c6eeeb4a7dd759e4723b9f75e0085dae62721956e78fe4360de62d126598b26edd1c8c47cccac6d9060b305095066288bb7518138449974751af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a89a0642865b77e999ae6183e94962d

    SHA1

    ea82f71555a1d78945cf44c4e6e6c33c2548943f

    SHA256

    b366c3746b2810589a086ef0031dcb5871e1ece8308cd03c8c00491591ba4c64

    SHA512

    7b3412b94ce8b3c01095773ab6d6a27496abc6bb5dba88152e8aaf933483e36673577ed67854a04b9a4622507c51b4669d85775488c0a20075c0105ff53a7a5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    560e9c87e0fd21d34f5d607d19ecd364

    SHA1

    386e1947cf1f751e73481df44d24606d1b16c7c2

    SHA256

    bae3546791a2cdffbf57a93ce36487fb0908e492af2ec8a50f5b2c5e38fd341d

    SHA512

    871c214a63baa772fe2760c349be84198d1b9d459d5f831aa710681f5ab74a9fde19d76a878f8be26ad461ee22643b9ae1567d31a8d81e438441f4c291b96db4

  • C:\Users\Admin\AppData\Local\Temp\Cab3FA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar592.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b