Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 15:06

General

  • Target

    a30603498a35682fc3bc1f4172514302_JaffaCakes118.html

  • Size

    114KB

  • MD5

    a30603498a35682fc3bc1f4172514302

  • SHA1

    ed7c8c1e27441552484f304476d925443c193d1e

  • SHA256

    680310bbfb4ccae4044c6d738739271884f2d1d7314f4d4fd92675f6724c4452

  • SHA512

    742faabf0991837e625aaedb5877bebe43b6f208a00668abea1893954b65bf398d378f9378219aed40eefefbd3bffb79866762d134e7f6ebb7be5672f2215a14

  • SSDEEP

    3072:JmLEM969YHy6RYlpcusg18CfRUXARD5VoNm+KSv1sD34NqkFdHh095FX6F:ZlpcsfX5x+KSv1sD34dHh095FqF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a30603498a35682fc3bc1f4172514302_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84382af2412cbd8e2a57dba6592e36bc

    SHA1

    b72d9b71aa7fb8b364cdea910bc8ef62ec1090df

    SHA256

    295580e7e2bf281524778451dcc8d756db9b78d1c41d44ec6389451c29033e02

    SHA512

    3d50b1cb921d58606a425e9cc1a96fc99bbffc25301b9bedd49074a0cbd910ee8c908c86a8469c45636eb31596ee544ac90ac50844a8b11574f5ec13cedf99db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    061f9b433bcfb9066183a91e40076639

    SHA1

    fca5ca61050732445d5523115e776adc5f0dc14d

    SHA256

    58a7e126a1780b9916066bca6690537c9a54cf7f2f863bab6775f6e719d559b9

    SHA512

    ee9c8509ca375c3671a642e5e51c32c2e92ef132a8dcfa927dc8bb080e6c6d73ccfdfbd05155f499b0add9b18cf7b56ae2a3e620cb0877038d378ef81ef65066

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b142118f02422bdc52fa6576532f3ba

    SHA1

    7ff57f5c58dce72f89798ed439e5bad9f611a5f3

    SHA256

    ad902de7204513b22b0a1c0cfee0524217db2e08e08d331be58f9db3f36be1e1

    SHA512

    172e31aa815a7c1db27e6c73f0d5ef3e6ee9fb1fedf1204f42bccf89428089f76c52257e4cb2990b7ba869a77e3bd9bc0eb49a59bb4929ee15a886644a705492

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54bf69118bd8134244d78c0f5ddde97f

    SHA1

    902f201f54d942786b71faef41d4dfe214c9f583

    SHA256

    b59f4f07fab69d4ec3132bcf26610614e3695dd7e3f163dee7c4a9392001aba2

    SHA512

    d77f55fb398bf281dfd16526ebd831167a05c95664cc355f15e029f34dd3a7a0e036414214aab1a6f84821f1f817b31b59183d118cc08e49fe6e99bb814db8c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d9f37317c635307e58ce68945bea2bb

    SHA1

    9ea8c58b6eb93888306647fdd787c2ead3a33dd4

    SHA256

    3e518eafd564b840f70dac3b57e9a92c955ea8da8afbd9d03883cb7a841dfd8d

    SHA512

    3927618a8d9fcae884111ba5d338a9bea26c18c0d23d08a858ce878a6b155a7bfd373463ed5369a2ee1124bcecd43571f4fe78f7f687f4f70d1923e052f48f5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4999c58e15b283fff22d33980f63023

    SHA1

    fa1d9a0cb8246d49a07868663190f0a049ca6e77

    SHA256

    b52331ae3c9d30230465cdbc5e4862050268b6f93477a5de0e6c6ff0c878c542

    SHA512

    1f3cf48bd56bbcbcaf46cefc8b39361453f5151d36f2f4d4bc08b4b36dea7d70d7424c860324df0ccbe62892ad3215944bf4b9e4541d5106209adbcf77018318

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddad851bd929043b54d7c9f078d93b00

    SHA1

    87eaab8958fc2437cfe3e8289ee94972d70c2422

    SHA256

    ca6d403c12dc1120fa751e5af857ca2905a8f3cc85e3a53db7c988332de819a4

    SHA512

    44814bfc51f27d3c770815a253c9c76415147b4d7bbb1151adb6b95dab5ecba2f13a221276d69ed58637cc3e6e4a020c4a42ab30ffa869ec8c3ff804c7e0c638

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86799b953cf0960a7387d060f9dfe35e

    SHA1

    b4dd968b76517528d40b44a6b627eefadeae7d4a

    SHA256

    c61a5507911eab9f481a595235bbce3aaf07de84cec98bb132de1a31c0587a1e

    SHA512

    1504ba7d0da5679b0ab133a6cf7435a1d770c40ddb244b8b56673cb8147bb680f4f2c7e3cab3f8e8029c33339ce224a9e981e05359de62a2f1b2ad8731c38cb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a563e73c58f1f2faa7a0268e867dd68c

    SHA1

    ae0670db23fbdcd611af22d35071ff913e5704ed

    SHA256

    0c9273c5720f51e00c6c74e54634a5952ffbf5690896eaa1e5208fea22ba34a0

    SHA512

    2eb997da1eb11900d924d37bf7783c4b3f5d27745384f204ff6f914930430e758c60943ea4a18153e6bd8f614e3a1297151757ac49600f4c127c4466a8c850a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5afc5e27aa6bdf3c34dd6e85f7407c8c

    SHA1

    99014e2ffe43b238295d0eebba3c9df5034a9070

    SHA256

    adf625d76ec6e7db698c29b82e9e5204bc24e1d95d2b73ad2d1e20f21b900ccf

    SHA512

    ccf6068f3184eeb83b3ee6947c19caf629ea6657b9b621483e08a6ea7514c9fbd4e040eb3515e9247c9a4444249dea5f7523dd59ebd3821e09788a5909d1e36a

  • C:\Users\Admin\AppData\Local\Temp\CabDFE7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDFF9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b