Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 23:06

General

  • Target

    8c57c52a792751c79b17768866a4880c_JaffaCakes118.html

  • Size

    6KB

  • MD5

    8c57c52a792751c79b17768866a4880c

  • SHA1

    4644ce7a4d97d954e1da1966b2e3853a63093be0

  • SHA256

    16180643582485e63df2514ffd3d066a6709d6bac6f7cf60bfbf97c2fa5ec482

  • SHA512

    e23d31c5c9f7a74e70e6ce8efb98ec7d38fb79f1a11abace74f78d92d8610c9c9985fe704b01bcda9ee7ed6832177b78c0923eb509e49327c30b6bfa40a438c8

  • SSDEEP

    96:uzVs+ux7m/LLY1k9o84d12ef7CSTU4sY/6/NcEZ7ru7f:csz7m/AYS/F4Nb76f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c57c52a792751c79b17768866a4880c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94c3e9a244655ca8d00257b624e31388

    SHA1

    9d7f7dc90c79d5974f69776b708e56255766d9ad

    SHA256

    e2f0c75f4802c512a5c6e30e50fabced89833bff27774bd9f898fcc3abaae7ac

    SHA512

    ca85af181a325118353441a823efb149c438375b8c573d021916bb45f20b1d9f41341a18dd07ebc44c410cfb1f55dcf1980af5ef0f8ebefdc363449e49b90297

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1999492a721f4007d9ba1c5c590c5fae

    SHA1

    3cda4f16f81cede24889c174df5e168d4a4f9f8b

    SHA256

    0e46fdcd1f3990629f34c6197358b6e6071750a51a00b2b32048f296d5e3fe31

    SHA512

    280eb85cc6ba4e3b4ba783d61074ab8e79e21036699c4d00485ca15a62e53123392caab363a13b7a4f23f73ade34dbfe0a7ed186a05aac5c47da64d0db5db4c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73fc4c5190c2e03bf975c022d22c174b

    SHA1

    94bd1c698b7c4240127eef82dcf87f9465b997f3

    SHA256

    5a4de11c5581268f9f1450569983b5f3c8b159beb4326057953336c0b476e5ff

    SHA512

    5b5e63c4f5e5a51eff48d2a481bf6fef0ab0a7ba56a555ca427e6d0fae828e41e5bfc96e24a4aa2a10ec4e43042a6b15ef618466d1946da22868b1ea9cbacb79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70c69bc2f52f94bb3a9d74b81d6757af

    SHA1

    21ff21690f44ae2d68348b334e15aca69b7e42eb

    SHA256

    7aad16adfd48028667422a1df05a5739459788400d83b3e2743f482705c7c897

    SHA512

    2b3110f4d76c6f14f820c2e07d2a5741e5c12a6cbd99e63bdd0eef81a7eda9c9e380efdd4d3dc83162aba582965588b933746e1860759f974a195af8f1b3bde5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79a0d998a2720a0bf486432ad3dfd21c

    SHA1

    737d8ef6a9082ca55e16a16dbfaefe9fbe320e03

    SHA256

    9b61fe9abca062bd5097f67d32761b3cd504320c8820457afd9a2738a70f6b8e

    SHA512

    55702d2db843ac37eab051cc1d5da6b148a331a6b44cca629bc7fe10ae736562067feb7e6e37ed86ebb313cd13e2e8038df4231fa9c43a643b2b4b3b25da57b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    249f2247f065c3994dded2960d0cff6b

    SHA1

    4b56f97897ee44014bfe414d4e9fce752410063a

    SHA256

    effba600274df6a5134edadf5674c5340916ee4ae99a0fd216fbe1d49a92dc2e

    SHA512

    f069981f6882e45966eea9f0bc6f5ec5246e35fb239f536cda057f70085fc1626301e1a74970ad4f2dc81f58e0be851a60cd730de463f3c6213eaf25c67cf075

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f46d6cb5cfdf1017f901890748eb848a

    SHA1

    197da456f5eb837d7b451c826bd93558a25493f7

    SHA256

    95f6f623f11a8c43901b7a9f26c86496df41304c0ca12bf86a851a56168255db

    SHA512

    6fbd92a3312e7eba2e6eb1629c419584beef6f05db1819b4a005755a5ebfad486c05d7a8184f1063213f8f52c78ab6d4adaef1fb1132163b05adc37fe3c1a2c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06bf83aff9946d99c1a9aeebad10d077

    SHA1

    6d6f278b52d4bd4dbee7aef7c91e452d75274cd0

    SHA256

    d73416f95a6f2d887bd82a6f68cf4fa5444d245856939e4d937f78a4e36ca816

    SHA512

    a6a0a38d13b35292fda19ead1d7853b274c7879ca039b2472c7b28b967d5da1c1427a3352b449b70f2c16ab6604a53a594dbf390dd6a31b078dbbdc579617325

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26e43cfd33c6bad2e64c0088574463c6

    SHA1

    f623ea28f765439b350b90bdc2cc686a813f7f8f

    SHA256

    0889b17895690e2588b68d5c2febbf31af4605a621ed7ee2a6d195223ed97fb0

    SHA512

    d4f57eb4b5511b9e4918f4304f01c861a7315a680e602054bb3bd34feb494ae57b44b94f1d1ef45fa3521b761beac35fca13fb673a37d67d07e5c70e28131262

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e233b2b6608168c3d34698dd345b1b2

    SHA1

    2fde13206f98444cec6101ad3ef3f89512da92ba

    SHA256

    783f4562c9697939509e0227bea14b4329df8c991ce05c7e0d6f5326f3fc9d9a

    SHA512

    a9519672c8d26e07c81b87892c92e157df7f9cc0c57f65be64e69c831722b3ecdccfe0f9f66702a9a7484dd9e13947138e4133d9f34c92f482741cda48edf51f

  • C:\Users\Admin\AppData\Local\Temp\Cab732F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar73A0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b