Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 00:26

General

  • Target

    88477840a9ba1cc9a4719422f946f7c9_JaffaCakes118.html

  • Size

    41KB

  • MD5

    88477840a9ba1cc9a4719422f946f7c9

  • SHA1

    618c7909de164242a146a6c658fc8f853ee1d9a2

  • SHA256

    5f9ac99eb02b7f70d72fae04b6f4e72e85ae5e85ed7c437dc9d473ea87990e87

  • SHA512

    c850bc8472a40bccf781b343ca841bfb2ac432577311db37deff5098d39ab71003ebcba373ad94c72e2d8c827a51d833a6821f56a14a3794e668f4a235dc1ee3

  • SSDEEP

    192:uWv37b5n/05nQjxn5Q/TnQieiNnsxnQOkEnthBnQTbnBnQ4XCzAjEoZQhNqoJyf1:PQ/aAIYQL4lg/m84qk60VkvepV

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88477840a9ba1cc9a4719422f946f7c9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    657388c0de2d0d9f58ebf81ac05bbe34

    SHA1

    bfb65fef305592afe49523ce44512d3366cce2de

    SHA256

    2d8b7681817ef3d1f9af9c3e21c82362535510520d9a5ffd753ede74eafadc52

    SHA512

    5a0eed1b3216bd453db35c85c903be25b627f575bff2c84493cdda216daf638f7af68043d2924859fe446f8e1571950354c9c5e84db62cf2cf41c283579fe840

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ee061d37a3811241dcfbbefd3f9d1ca

    SHA1

    3806389621a79b2458292a52bb27b6e9405a22b1

    SHA256

    727d1e8c800babc45fd9ab4b6e74ab43ea2f652b9343b8c1e5989bf55710ef33

    SHA512

    dfa57e05c63508be168031452280f2c4a305c13d729b339c11211465a64b27ef9ca40e54025fb4d8d371a81ced25031a582b1a96246e77cace32ae566a3c0e9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48c23b3061b398f016319cd7659d6897

    SHA1

    9562026770805fc1e55a5c15f3ae3d09dcf59884

    SHA256

    3437fed1ac403f94457ccdd445439595f5b9755221ec8672d09cce6949d2a195

    SHA512

    58edb8e0bc136586e9c4aeee8d245e5bb4290272b8ea1efd178dc106165214bbaecbc9af1a3403e576c7b2d9804d4f8bc6776d986a8e55ebf370c50419405948

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3865573e0c6d5044905bbcc272a89be6

    SHA1

    c64fe6b0dddc9234dfcd7bb55ed9d4028d7e9409

    SHA256

    342f65e45856ec68d5db09570d0ab5466e497090c5690f9a00eb1f3117052809

    SHA512

    8ec011661c5e7150d10932d0b7e77890fb6820f3ebde81c0433e4a6f140d5d907c11135a83327235dfc3816fda3fc44b97c276a1f248cab1fd15e97b1dd4b6b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eceed867f5aceb5234f66507c83f9ce6

    SHA1

    02ca52b86097f374ca094153e5143bf655e919dd

    SHA256

    f38f2c9a4ec30c66fd86351fb89ead98d7294b1a3ff9349dceb626e5ba467e87

    SHA512

    3024a67460764be3e3c2385277b549bc048acb7698ebc81df62cd9a851b8f05d70063bd908fc4492aa8187ad87af5104950918c9bd1771bc8e96fc6bc336e56f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f60b51adcf15bf5234c666cd80200f2

    SHA1

    586c4f9ae415f17d4c33650976fd06288c607516

    SHA256

    4ee3cc1f2fc3d51503c22064ea5ea0c8104708926abd0b825c79628ac3f6cf87

    SHA512

    6b7bf991a5c969644d974e4bc9b75e3609e448f6d013f1c055fed5b19745921339c9ca0ebec4acfc904f12c3d9014ef629d188d8e260111eeaf1e8cc887cb3b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bea6f2b55a0807751347e15dd66ba5ab

    SHA1

    bda9400d00a382d6fcca6908561c66ad40041d22

    SHA256

    406906b76f66d01510ae959419921fcf15c72ad81aca153f2cf482dee7194c59

    SHA512

    2139775315ec96c63a244e518f6ebf52be81b42f369d44e966361307a4a9ae46887c070159f16b06c82fdb951061ecaf0e546756d9f27fc1c2b6eb1648b860f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ca3eb14147f9abc5395ae16128b04d7

    SHA1

    a16c46eaf1937a840b64368ae047fbee72d64e82

    SHA256

    ab83599f71f6045b1fa6b1100d5af75da707bac29c037306a16b0bdc38bbf436

    SHA512

    44440e36aaf772000d5353daac1a4145f20b25ac070f49993f6fff328dea00dcbe6663b625636dd0f28fc329cdcb7ec544e35a17ffa9dc4b06074265b36578d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    245082405e3e493abd7b02fbbcc4cbba

    SHA1

    23820137e478cab96b78e55e83a6ebea05843144

    SHA256

    bddb14c25bbdea981d9ddc4ecf55e570a2694c708e4f84885d370efca9be48a9

    SHA512

    208e91c7f88b2322db39018cd6a4b7a4bb8c44ab4860c344407eb200810b2203cfcff2fba725fdbdae67d6fd4ae976e8fb4b15ba9d168f343d806d5069b58128

  • C:\Users\Admin\AppData\Local\Temp\CabC322.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC384.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b