Analysis

  • max time kernel
    146s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 05:48

General

  • Target

    8d8d5ca921bb95c0b7b631d736e19d27_JaffaCakes118.html

  • Size

    6KB

  • MD5

    8d8d5ca921bb95c0b7b631d736e19d27

  • SHA1

    9084d93fae934259057d22acc8b2e81c7ba85f27

  • SHA256

    deb4b2d0af1f312ab2584ed68b5e5dd59f5a289c7d6d2f3ee7fb97f31f8b5703

  • SHA512

    5810afabaf0feb5036058fe8f77318b3c8aafff40a217cc9d537c4c3889016ab10a005f4d93994b475e1470dfd227508e024f2c4b15064d7193e3a4641732b46

  • SSDEEP

    192:SIUh4H44usPsf4erBDBf8LVffMqO1DtBD0uLru:SItYZsPsAokLFMqO1ZBD0uLa

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d8d5ca921bb95c0b7b631d736e19d27_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      f55fb20cccfa0a582e95acd00ac4ed0b

      SHA1

      63c3214748f7e37cf6f26e7e18d4d4ef8d81c4f0

      SHA256

      4626f41a996f5ab9368b73242d9778b462190a4f942e2802a1878e66a1a8a84d

      SHA512

      9faa3b49cb45b6835038851d6dcfbb51851729820a2f3dd08f0370d6729ff991cb1041c2391a3cc508ca391547a26525a013704c6605fad70b5d4487f31bdf2c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a7c4306194bc6b5800a7185829546387

      SHA1

      7dc33674293c699589164c979c20c6eb439b6b27

      SHA256

      afb3a49a78275c292177f7e6291bdc00906a74046ed5f2dcf0235f2986049887

      SHA512

      68cc2eb14c5c186b8f77e9a76d993bb2c08cec398c8f8bf3a9ed99c1eade11cf6b35953e518ae84ed778f9ebb8b80b060336024a01c5562da4e489dee3667ab7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eaeb4e3f13b106cd2ab21ff26134f368

      SHA1

      fa240fd0435190102c80245706ec987291f928e8

      SHA256

      7abe2f2c1ad52912afee2110da9bab7f94e6122df7e91d0a6191dc974b101c29

      SHA512

      9e539effaecf4f86cc0dafffc2cccfe78df33f602845cef94be18d83561710ac48e1f6f4986c648b1fadc71c36fbf123d547d18a5a71e53f0c7aac0197a0b2d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5b296f3575d50b7842858b1bc2adf565

      SHA1

      340de3d2ee65f7dbbbcee8d72c845b8112405aff

      SHA256

      340a2d9de5ae08e3535fafbaff39a1d5441cebf728ade4cac7eb8cc14f720197

      SHA512

      8b7dc2add29d63863ff5f380b98887cef6c3e3782759417631160e65ca536949190aa5cd882975cad1f36bf9ddf695878f06a7f6f9bd8e02cdbab1741aab934e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      918675e099599052927934b83ff5cfae

      SHA1

      5e4fe6c6f2dd862fb04998f9c05cd324a8287a98

      SHA256

      507fc720bb46862d568526cd122de1bc0ad7dfa3f3a93dbca8f4b36a8870cb33

      SHA512

      b03edab1a875f148714301e65143601c4861b98cc7f1e5b5e592f4f948e691133ec00dd6038aa74033a20b8a06493910fc3dca750b2328b2208cbd5f8400915e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a7be8d179d400fbc4891593dae11471e

      SHA1

      6fcbfd75755f0559babcbafcf9736c4c09baa45f

      SHA256

      2b7553ded767448f3c7635d33c699d27cf8be2162d67e61661dda94cd1013b6a

      SHA512

      54b698e273e9626610d80aaeef014058ae921504c3b190b9a89434e5eb281531d53b9d57dd01f5631f4b4e53c5496e7cc01a42b0e6eda79d0e87342d315a6b4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e1964efbe7597489c5d3a8193ede19e4

      SHA1

      181b3ab5c7231eaef98afb32bdb8194a83fa7621

      SHA256

      413e57c61ff345541e69b0f0b3cf344ce85192aefbaa08c6fbefd56d63886059

      SHA512

      f8a4826813f4a44d800a9df516e521aeac58870d7c5b4820bc33d93a9e50c639459b892d94003684ab08e9aa16b9c9542314c3d74e716595dca86e6f87e91a36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f98c442bf5045a491d03dcbc919b0b4e

      SHA1

      c00e2610ce52a1183815433548ef24e8016a4423

      SHA256

      58dc53d2d6f8c7e98c4980a4223bad476548bd3ab4aa913018f32fe5c54133df

      SHA512

      e7722bc63725deffb1443b461b164cf1f1c8e55c0e0adef00e73fe16fb1cbdce486e31544f36504a63be46d6f24e7387d2c2974395e6242378b6179492bf18ab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a37f20e9749502ac23a8d253d0382790

      SHA1

      4023ddf79f1a629f602b430ff03431c79b359e10

      SHA256

      5e4a0beeaa3e1aed0d92b80f650ecf5e91effa9b2f325ef1ac6b32c4043d50f0

      SHA512

      7e517cd30fbb407b02fca30628cf4cd5f1085b0f60fe892e136a72cf26b846362279647a6cf8d6b97b039e077cb2fbc5666e44741a7877402987e27e74b23b4c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a15f30ea925922cb54c6fd49393bc2d6

      SHA1

      ed26fa13050607ccae81d2a144c137b6b6d9bcde

      SHA256

      a21cdd9044c25c09578b01befa7821602d2f1c7e383d27222d8bbfd801414fb8

      SHA512

      ec9bb99357892dbba46f381950a046cefa5f9e3c3880aa26b8a3430985911e4cbee36d69b25ba9421bbb7170731f4dbae02edc734d56a04b915de63958e2adca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d49516f0bc8bbf1dc80f9139eabc4f3f

      SHA1

      6855b8d8e5cf3e1d8e1c611626c33ab1c05be538

      SHA256

      4699e67cae009a1c2ae5218a4e1da6b6499b75ecffbb17e8bcfce1864677b715

      SHA512

      bff93321b7838df31fd06baa38e19dc0607550062bdc9351244a6546afa1046b938da4c4b6d5318c282677913301ee752de8d491b8420fdb80779e7aaf03e3af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2c18ed59592c40f8f2ac038cad1ab054

      SHA1

      ad1c86839778a6003816643b85e040733325aa91

      SHA256

      84e40d1585ee9eede09a463703c70370951f01c437b7765312d5cd77a77b97bb

      SHA512

      6677f5b8d3d0800a4c500d12135b24feaa7c6951451101756b5134e85bb4a992a8f754352bf60bd8098fc123e627ceb3fa163131f4971b484290a0cfd9e52eed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      455030c049e9bb51a896cebb2256bb0f

      SHA1

      84f5ea6f0664d0e84bc277b19d609d416ed7e547

      SHA256

      7314fb276b9715b9abf4494f37117646905ba8b9683c6d0d3e15edd599d8280c

      SHA512

      488e2c303265746ef65ed9c603ffdeb148023f5d01069b464d9867924a29f892d70579e4b1756395751af0150113e9e98b8b863b7b743c35ef1e9353afd171df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

      Filesize

      170B

      MD5

      5bd4a2f706f27853d8344759e6d79473

      SHA1

      a97e007de8ed9e070c354516e559c4c87852d5dc

      SHA256

      fd338eee2937bb7cf95675aafe764e81de5344fdca4dbbc541c70e49143732fd

      SHA512

      7aba4a9ed6d3e49dd190fbc6999d275e9ccdfd5bc52b02e84484e8bc838d35756f396f310380d007b805031df47e43beb5814e093d26c4ece1a4fbcebbd30ed1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      1723ea55ba641f3a9a9d0760643af209

      SHA1

      56b005a0ca627edf4bd9aaea5f27a1f02ac9e126

      SHA256

      77a9959dcb599366cc13a70a7da35dc93c56c284542134e96f3210495f859cdb

      SHA512

      dc20cbd53283815a24d288301bc66c7d3cb44d2c7fbaa7bd36f5bcf2ae4f384a5364ea8047b9082c93e3cfe949899d56d2579e8ae428d1b11a3800eea7e986f6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7H6XY0V\coinhive.min[1].js

      Filesize

      1KB

      MD5

      2ec43720699ba70c89f5adf211fc3138

      SHA1

      798ef9a5855d7f56b51825856cd84ce0356cff0d

      SHA256

      39f7a131d7976b1cbbf08c89727ba5c1b5c384152ed65bc83198bca315be5a88

      SHA512

      ef8f3d359eecc4e4234e18ae38a5c2e908bf352ccbe518d35cf956d8bf38b699724ef3d673c984625c2b725640e5d3bda45e363cfddcebaec2102aad7a34c0bd

    • C:\Users\Admin\AppData\Local\Temp\CabD20E.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\GOWQ4EMY.htm

      Filesize

      6KB

      MD5

      c8d3e7b305f9ddd7e8c4487bfde9e850

      SHA1

      6a205808788fd8d824db54b94a8ae52ea1539231

      SHA256

      ae7745f2ffe6689fb50149fd087f404d07eff9a23cb35f8278b3330fff7f41cf

      SHA512

      ddf2b0529786e57128831eb5fd07e02d47a562550fb63106dba67f4f3ebf2de9af2a1be37717cc1ce9fc4f1171de32fc3ce8a82fa42562b81fbaeb213444d32f

    • C:\Users\Admin\AppData\Local\Temp\HE3USBGZ.htm

      Filesize

      1KB

      MD5

      7449781f27de723fdf3a230729ae572d

      SHA1

      61fc8870d0052fcaf7c6c689220b223506a04c03

      SHA256

      48f6602faa85d8a9ec454a774f8f8116517b61aee7c19bae199b9dfefb23e371

      SHA512

      d853842d6fc7573145695d286eeea6e7a23afe4e82c078b8dd0b85d4e5e7dd09d2e4bf345bb1f273be2793d7d05e824d632122bd1ad05355bc32120dce17996f

    • C:\Users\Admin\AppData\Local\Temp\TarD212.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b