Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2024 17:13

General

  • Target

    86f0a340040e1fe7c823b777b7f5823a_JaffaCakes118.html

  • Size

    330KB

  • MD5

    86f0a340040e1fe7c823b777b7f5823a

  • SHA1

    a4a548dee8eba2bc603cc294671e4811c74c8c78

  • SHA256

    454cac2cd87cfef50ab2bf028901b93918169245d9874514396da2e4e11ff819

  • SHA512

    6883f98fcb52392f841adfa0cfc48967f3aee9e017e76cc09fc8940f07823f7d77a2cb3adb7609e5df5c0de04bbaabde3ea779a50cf456337a36033c7e203a0f

  • SSDEEP

    6144:JZXHcfBrjZBGxkfNV88hANsQqkcNj+LcaNBfC417oToLmi01PziAT2NHW+uPZx5+:G2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86f0a340040e1fe7c823b777b7f5823a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75dfe0ed9bbcb9375258e3f1011b27dd

    SHA1

    cfc46462e0ca413d93ae26864e3949ec45eff73b

    SHA256

    73c4fd9e249a451505c5c3ce92b1832a4953d162b3784ed0121f60a85989831a

    SHA512

    c81eb95add7723cc1396ba7f60524bd24acb75caa6c6f530e311b84ac928c0cbd71c8ab5ced79c92f7b962176cac81cfb3bea6cfc88f62fef76ac103c33d1a10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e98c169a958584cca1ffc54c7e22355

    SHA1

    67fcbcfe49010e556ff5ac95e6482bd474af2a5a

    SHA256

    9d4079d17f8f572d30422fda17932a1e738d60345ec85ec6e501b4c2fdd098aa

    SHA512

    17b4666799ab72f055767a25046f29ff3b56a581904023d9c52a6f57b43e0417c491135d07fb7e95c7b87c57aac28e86217350d998cf8f01df67a704ac4bc5e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de4a5fe14b5a9301b6256dbd14395906

    SHA1

    d1acba13e1a65f2ab7bd58b12d0350243bb04368

    SHA256

    1e0e292850c45209bb594833edf3648ce06c49529ee9ddac1c4940fc2ec0b11d

    SHA512

    919af22a73c7f12e4efb1de020531061481d434e35fe71b240246e9e8887c493ecfd1e7d27f08a3fd3f2e2dfeb7c982aba7132babd54925204a6d87b9fae21c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e23ff156790064bf9b419e0bb69560b

    SHA1

    401c907d9a90da220ab03e3392c660ceb1d7f34a

    SHA256

    edf55d87885dd0e853782f52d7a49b4fe8b0582d4ebd416e9f15153befec2bd7

    SHA512

    6265fd86dfce3be7b15a3894c067eb7256627a90e0cb1481a4e229533943cb0504889315bbb23107780f3d487f17d95711557a34f16596fcb4b8054c3599a4ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3081131430c28fe8974c3904102218f

    SHA1

    5adc738dea78cda99ec17befd25e81a0bb8cc251

    SHA256

    337697c47a5b235728c0d746c5846e697b820b961efc45c43cdb5b58149b2d18

    SHA512

    7e2929138493f01f6a8f84e6ef908ccfe234364d121017c562bff6f56f0e7b215ad3db0474dddeb2d2bf6c32c480f250d70b9aa09d744e82ee2c7544b9f3f1ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0809f17043b96ff4dfa3053caa5afe74

    SHA1

    2aa17189eac327e24d8e82b674a0cbaf4e3c518d

    SHA256

    5cb104c9a6ab2ceeace5252ab9515ca38d1b0b358fddbd3d5455426ff724b343

    SHA512

    c1f016f2d9a4e6c04ad1776cf62273b37db9dbe812b72b72f02cab869a5a9c087e9ec99c402eaf0e017be49f1fde39de349f8f2e013a42f4b82eff93009e336d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2591903ffc6e764ae43a13047712a73d

    SHA1

    7abc06d0aa04eec48649e3574beaedddb3a1d34b

    SHA256

    f2f77aaa147509931092c1de8e55363d9acffd3e3b687293b570fcfc5732ffd5

    SHA512

    69bac873036b3352807383adb762f49d29e2fbccd1e063b5dca02781cc1a27ec7796c3ced42582cd76838b5af01887edd2ae8a3fb857580a73775bbe0b99b7ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1291de2ddc6d82a72cb0105f197894f5

    SHA1

    9dab7b92a7d78d23fdd856d1bf95fee3e2bf8fc8

    SHA256

    0710709a47752ad28671b63b88ad07e6675e4f1b9253bd70b5e823ef85d2b043

    SHA512

    ad16b3ca6dbad74bd62c534dd54d62fdd26b3e94b88fe0d2083ba5f7c1f6177c8ad8049d3630fb374ea6f0ee7d98a99bdfba69ad35f82c5763ef5925cc4c4b97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0de459c17c27ad18ab133640cba6ab1

    SHA1

    2dc208ec1115173753cdda4a31c561022277543a

    SHA256

    8c5a7c93cb74b3e1047cb7232be88f6698231936d704ffe1558c8fa9f3949e52

    SHA512

    40c3164890275fff3e5b5ec1d703c4b16c35aa2a3997260cea7ac6e6a054423fb428f2deb92312c92944739e92a996063e1adbe9f4a96fb4dbc76d6291fcf8e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b53b1c8aaeaf1f556af5ca0cf0ccaaaa

    SHA1

    f3c8dc215dc0249c313dd71580be81e77b41ad55

    SHA256

    1c63e3bea2033b61a39bed842ea0e4df0deb13f4c6cf48114631d6cbe103405a

    SHA512

    fa7bea29d52ea86cf0a13afc6b703c612a8f22e6f8b7d248c114a655aca2e0058e978d79a3781ea23718d1498ea27a5406cd2609f57516d13677324a84e2c089

  • C:\Users\Admin\AppData\Local\Temp\CabE774.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE8AF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b