Analysis

  • max time kernel
    124s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 20:20

General

  • Target

    a3febb8307f19db6256aa91cc7e2f3cf_JaffaCakes118.html

  • Size

    53KB

  • MD5

    a3febb8307f19db6256aa91cc7e2f3cf

  • SHA1

    88c25482ad406ecd0dc601a315556e0a65b1a3f8

  • SHA256

    c9a3b2fe35f588d4cec0a3a2e3957b8206a57dc90a4e1f16abdf3456f91f324f

  • SHA512

    3c99564512779631c9e21c6f1261bd76ff1bd6370f1eaecf5f98852ece32c0c93ce8e788195f15760383c874213731b2522bcad82a7bef667bb29ad5f9c6a6cb

  • SSDEEP

    1536:CkgUiIakTqGivi+PyUcrunlYy63Nj+q5VyvR0w2AzTICbbQof/t9M/dNwIUTDmDj:CkgUiIakTqGivi+PyUcrunlYy63Nj+qN

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3febb8307f19db6256aa91cc7e2f3cf_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df4059f17053e31a62b134c8c2376d7c

    SHA1

    1373191637a47be712b6f23711f925377725e64c

    SHA256

    897d0096cb81613a86f73d8a42188a69725da4f6c9aa658d3eeaba2e0b4cdbc8

    SHA512

    2337e87ef423e8cab328ef6ba7307332fc509700f018bf2b1e849165b6f5bbc59ec94090573a70e516903c8938f9ac892eeef3f2b46664fa0840f02da8ac320f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2463f8896e5dbd8b05122b4d683569b

    SHA1

    49b9f23a5b45f8065f438d3ad1adc6a8794d2533

    SHA256

    130160e751f405b9bb7efee21e9e85a8386a2972da5217465a4e70e9ead8e574

    SHA512

    2082d7b10d1bc89016ef3f21938e493de004cdd29ae8a9ac81005ef3bfce38332240450a0f0a2bd98d8304579c9179ad734e42ddc687ad1dbbe0d071e4146793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6cd6dc54c4bf904fff487fb726559c0

    SHA1

    0d038425449f66bda500f15e2040bdc620a3ecca

    SHA256

    6f32dd964f5e6e95b99d43baa1acb62a6163961a2467cdf41770867e6f4b4ad5

    SHA512

    54359c294ffa0b6a74b1c6cea983e6f85c687263b8d605c612c23e648f75b3a77395e2903cbb2f984813d0661eda79261e4ba58ba5702e0f216a7aa64bd4d0c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e72d515f888dfc79f959ac991e5b007a

    SHA1

    fc59db56777df2c0376ca26002534f9d87d78c75

    SHA256

    98bc20b61255da7c7c54d21c9c34f3552454ecf81fc071eaf2e6ab30ec4bc87a

    SHA512

    bbb7f1d8a7333dec12ddc7cde9c245fcab934bb669dab0a09c8e435e284a8daa8989535d9a8abc72dbebb868c7d4132b0a738fb1a8cd22ca0615dea57e8c0de9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d793dfea8027625530c753e7327216c

    SHA1

    38bccb15f6d90ef2d6c01b021be494d3e3a96492

    SHA256

    6874d38ae68dbff581a97a7693623e88cfdb5cb81546b64ba5d4676451a75a43

    SHA512

    a3985832e984b155d418a968300e2e1aeb41a786a3065a34e4c81dc0294ffd1af3d22c0fd1f32144e3c627d50d12f6d09153bfcb2ff79084b8b619f97c373fc8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\glossar-js[1].htm

    Filesize

    706B

    MD5

    67f3a5933c17b3ab044826d3927d0ba9

    SHA1

    5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

    SHA256

    97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

    SHA512

    03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e

  • C:\Users\Admin\AppData\Local\Temp\CabDB74.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDBE4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b