Analysis

  • max time kernel
    139s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 17:03

General

  • Target

    86e9bc3361473b787a4ae2dad0f2be6a_JaffaCakes118.html

  • Size

    11KB

  • MD5

    86e9bc3361473b787a4ae2dad0f2be6a

  • SHA1

    58c9d5ef33448c7caa2300da76d31b18bfb7cc78

  • SHA256

    2da95867e4871833c45eeb31b095b773f24bfb96ec7bfe228ad16bb013c57ed8

  • SHA512

    11eb1c52811d433ade2063d198ceef6e1a5a0cb66ec73ea10b90761d8d2148f351d4d3ec3c66cc4424d1bd4aa97eeaee912dfd8ac6c8b0e463d18e0c95225e1a

  • SSDEEP

    96:uzVs+ux7D6LLY1k9o84d12ef7CSTURGT/kDGpwcFGCU6JFGCUTXOFGCU5FGCUelg:csz7D6AYS/4IwFdNwAPHb76f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86e9bc3361473b787a4ae2dad0f2be6a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2212

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          92cfbc6a410b3f4c582b08570afd7abc

          SHA1

          d935d43350a06682d40eb1a633d092cb4886b6fe

          SHA256

          02d3ab5a2ef21a26c4eaea48e8738a3f380103e6f7442159407ff3e4e34e3c44

          SHA512

          12b123f17e3c0a7982cc0033c6828dbbfd66d3081df1636c63fcb68aa4979ce0d0ccbdbef5eb38edd61363e371a057b55d32ce367ed2dac1bff1b4b99b849e60

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6a04241d06cffadb3118ca71c0e20c4d

          SHA1

          433fa5375e95576a2be712713aebeb7e970bd028

          SHA256

          895ea5f9a35fa5d81883117b6cd4f3a1e18e0de2168b716cb9de0efabae9957b

          SHA512

          dabb15efc89562cf5069c03209c7fa8ce82b332935a56e89f86b32a2cec5819af7f33f6b902bffc1e7ec03a8a1c2d9bd91891bb7d128f89cabb0a3c04735d367

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e0c62fc006c4e4f8f4b35bdfc0c45767

          SHA1

          9da930cd7e4863ace03d1535c189ae7e0591e3dc

          SHA256

          ebde1ac35ab0e94525197b829e14b8e9a1dad90fc42dd8e385ad8fd8df449b8e

          SHA512

          2915948462c16d00b37ffc4c5f86cfdc6a8c5ebf8ef9f04d6fad55889fbc97694367a5c942b2e45168b8fc74fce2d08f3feebd09741c65622604b1f58a77b825

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9a40488bef35c52e94390fed668470be

          SHA1

          7b5382514187dbca49d12c8baa3fa2267c24b4eb

          SHA256

          dc87252f0e6378b1814d5399395c0bd89cd51b23bc4085011f317c909120d22d

          SHA512

          b7c9dc17159fea1d0db9ca45e808daf6d11fd3a9b279506a61916930db74d3c7a1bfc5ec6b88c3df09f0a64d1bf6ba81ce1b0396ccfb40771e26f5bdacaed353

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2cd2fc547cbcfc77f7dfc78f8d4f1963

          SHA1

          63925202cb1c0622375197ae35d7328f1c58f343

          SHA256

          59dcb64941c2660cc38289c1ee5b8237caa011c994de092665db774a252ee276

          SHA512

          c336cfb4d16b9036597dbc955c4d8bc7bdf1cca2463f21e194196f4ed71c716b69fdcb4f46d3e2d27280f654f86e42eeda19615a414633bc9c458e640c9ad660

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8c58366badbb7e0dfff7ec3e01c63442

          SHA1

          a02fecf7a5cd95b5a8586cf3ef3f86abf105270e

          SHA256

          f6dba0c7df3256bffdeca417746254e6e0237306aae7949f36683d882e35fbc1

          SHA512

          eb8d165c78f5c0e7cc6a564393f7ad2eb7aacca56c5b7dac9a09da8602b372e74fa4570ce1d8406e52f791478f6d60ad8cefe0776a26546b38f6d30d4070f3fa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          178dbdec0b227748b06f24c3be6d89b5

          SHA1

          c1953ecc50ac1da46050421de77a3d79ab1bc9de

          SHA256

          4270240a7756f1853325a4f36b4ffe1bb8f885d9cbdbda406f8d7ceca4db5f3a

          SHA512

          f202b1aa95c274ee2ea84987d442091fa888883509744ddd4d9f0f2d6c2b13660bc3b1f224a8839e6bca0cce4e71469b333c555c4469fd37743bc38701e6f541

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          78f97b7eadf4ecaa617289370712afe2

          SHA1

          c8c8062d40089375bd2d1cd804082acc34c17ba7

          SHA256

          1ca45272433ea78c0a8e4eb43e317d7daea034bee1c12ea2663388730651697a

          SHA512

          5f702f6b947dcd8d6eb0e04b222ac8496972ef6c3ce6822479f200205a0437e1ad1b617ac525431b9d7f480917e63036cf6f5b860b7bff0223a3cf12837f4aeb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dd277cf0156dae2e5db7bc451af6a03a

          SHA1

          625dde9449eabcce2aabaab349f56a56ddaa637a

          SHA256

          a5566b20758c9da7283b48b989b1e32ebb4efafd0cc2d373acfd0e934e42b976

          SHA512

          6d91fedffa7365712d5049697c63865305d56dee8f986f7b9d8d801c0c2dc92a05989d7e8bb0deefe96a1c83e3ae18b1f0281d7bd0d2d9368cc2b51f445cee36

        • C:\Users\Admin\AppData\Local\Temp\CabEA33.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarF33B.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b