Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 13:02

General

  • Target

    8a74b980360bd12c28bc34afed17f7d4_JaffaCakes118.html

  • Size

    19KB

  • MD5

    8a74b980360bd12c28bc34afed17f7d4

  • SHA1

    f701f5dd83fa66d380584e359aa80c1a334b6e91

  • SHA256

    35c3bdee651774658b905a3aea9984e9c8ab10a0574a19d3754f7eff8bff7865

  • SHA512

    360657649ac74971b14ee2264ae4c6cbd7044b35f9099fec0562ec4de5d9971b17ae2589f047f45edfe37e0d1b328cc6e3c840db109966f3fefb9faed4adc0d6

  • SSDEEP

    384:zijZKhgES2BVBD8cOQ3RerD+UTemLxXucfIk99heVOzVc9H3+:zij6S2BgcB3Y+pmQOIk9SVgqH3+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a74b980360bd12c28bc34afed17f7d4_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ec4466227bcc1d4107c8ac076033556e

    SHA1

    6172543a7f62d30bd9c5e37c8a1cdd99796c83ca

    SHA256

    13eae2ac80282f54d484ab5320e9dde39987fdf310f94aaa762ae88b40c23e12

    SHA512

    00990ecb1781d4e30e409e136313b4977989fce570c4797bdbaa27feced506d7b3d5e8744dc641f24155b8f3bc6deb84c7f9b6e125826eb3e4cff2cd38ff86d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    166be004b0a7ba33046ef4631d65a8ba

    SHA1

    05e785950d14989496a9e4cc3e94b1e3b2d91891

    SHA256

    cdc02f1f8aef6dc0aaf6344dceaa05ec5a79c00945c3e3cc57190beb94c2759d

    SHA512

    4ba07415266689dcf3de28b405a7f171ffdfb8fcb2155abd3bc54bbb336d8f894c9b458ed87060e07b2eca5a4b56028c9b806b03a6e18ec9ad3be1177c86abb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c1e2bcc511de7d89b1810a47a9f3de2d

    SHA1

    f07e4f03aad0b6861ed82e98b8e033610ba64a9b

    SHA256

    6bdca56f2ac389fb7a5400285a4ab4ca3b7fe10ecaa843347d5f71fe4b733c25

    SHA512

    08ab72d8229e671be4da376a1053692f8e2e401f4749c62e8f9c06cecaa21b76507de4e959139c6886b4a965b29c4470bb1533812dc3ec6cffe93cd8422993d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a021b134e2a8ad1f2bab7e4a7e0dff94

    SHA1

    d9273394a9a4ab20a9dc81d77cc4083cc2e86c28

    SHA256

    e095658232dfc49a8fa60b979a4d910c0676bb4bde131568ee07108e232a6eb4

    SHA512

    03a03cb0ae37ddde3098d87eda652b8fde61ade42b435f51b550369260a2822f007eb48c5e660765b97ff884b0426963e6899bc333e3e8619f7352f6e6986050

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    19821e7ae6e22605202588e1f7fb2248

    SHA1

    455fc2c4e82ca088653dd53697ad53556e4d0c84

    SHA256

    3a8e602f52fec21a17f336ab2ef7416d7eb1dd37692c2b9f5b0ef340ff73242c

    SHA512

    9749e05d49c850623ae38006f81df514199f33c08da6f5be7e99d79a67f45a71def4577eb72a553815a793967f2a0ce202c642e2bfb74c89172be7a83b25f5d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9a0b5898e3e2ac0ca146c92b5a7d2149

    SHA1

    3eaf0cd4ffe1b2880a43ff49b9f40cce04367d19

    SHA256

    301aa66144bff32fb2a455d5c4606585ff6e4249f6538edc2013884441c5d2ef

    SHA512

    d7b9012adc0db02e383dcda3f7adbad26c876bdf914863c5ace90c29bdeeb2e195f4ef88de8ef7b8b0af405d57404ed70f3f4cff2f4df27b464a36a1bc31e079

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d6b817f9548064135233e8357891e220

    SHA1

    279f38e0e6f05bf4842bab0704f5e59cadb17bf8

    SHA256

    115b2b5ee1083c562afe98e6baae2f5b1350dd4a6f049bf10d20106c9e170f04

    SHA512

    1248d4ab28f25da13c9adbadbdc11c7d8961f65526dbc933f6f763084f348f4f1664559fb586f13ee00a19514cca590ad1b39f76761ec5bb78a22bd15bfa0baa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9f6756205cc4fdd51bd9fc5e1dbb01f2

    SHA1

    9187e7f1d0f818aabbfd521965697513e5acb4ef

    SHA256

    8c611c0fa35cd186758dfea4779f01c9a5193fc3a7e0c0ccd193ddb8aa3462f8

    SHA512

    3b8bb8d5519d09dfd0110d0a980898925d86b67a1a56d5afbfa63ec19af84104746ecd14a957646b3209931817791e66451d344d1efab2fa2d9701fbe5fbe7f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    11422d317577fcf3a48b4737feac3c00

    SHA1

    2a20fdefab60884dee66d80620bb729a58747098

    SHA256

    29c13bbbca77274ec883984d0b6d80bbb7f8eb326eaa25994ed4e468565bc0fa

    SHA512

    752e808c0729d52cc05fc726741bd260973da8971e65f8073ef4baeceacd6971878740b002a3dfa2385250e4a98f484e00eb0876bdb9797ebbcce31faad793c2

  • C:\Users\Admin\AppData\Local\Temp\CabEB1D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEBCC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b