Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 02:46

General

  • Target

    ad98b9ecfd881f32499d1f9363e5b5b7_JaffaCakes118.html

  • Size

    19KB

  • MD5

    ad98b9ecfd881f32499d1f9363e5b5b7

  • SHA1

    06132794928d452dc2f37fd2792f022f5c2fedb0

  • SHA256

    61e1397dbb74c204ca23be6f2a6b6f96e917c0804cac9ea8c463eadd44511d90

  • SHA512

    1f59751eeb282441426bb3bdb19113a93ac58f55081b452640b281bbe27a64164e358d6ba6008634b58ab49faf667c5df4da4abef217f072e9d64038d0ff337c

  • SSDEEP

    192:uwcSC9ysb5n129x6G6tAEWHO+EWWnQjxn5Q/ranQief1NnIZwinQOkEntx8C9nQ0:pQ/FqlqG

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad98b9ecfd881f32499d1f9363e5b5b7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7aeb438debe750ce78132147070b1b0f

    SHA1

    8f23ebe24194975e8a9350845a02b3964023e9c4

    SHA256

    f8a0fc05b95f1b84b9f6f8f58ac5ece8cc285cf015f73dbdcaf1b39762b5a9fc

    SHA512

    8816a13232985ca16052c8c88eda237ae430bd906a1fb3dc50462ce3d84ad909b4b34ca8ed16f6e8425a8c20683968005f28702e624c41a54747789ed22375e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd761e3e670631da6297013304e008a4

    SHA1

    cbd60afb7a78dda883dd7d703b658412bf1d66e0

    SHA256

    4026c1987902730122782db67f98049fee7d2a3c7a1c8912480e93959402de0b

    SHA512

    1a05147cc2f9819d69aaaa51384f8e9108219f1439e24bd16099dcc375eda799a76e00cb2da4f351496899f0a57c1a2f430046d317ce79af7a2b1a3e67f40f98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83f0d095d951ed8cf2c30f5d15d3d0ad

    SHA1

    7d6d84ae9a06de83a9eda9b67c5674f9de89a18e

    SHA256

    7274628fd1c75d9291b11189d3bea267164eb8dd08947f7139a543391253fb30

    SHA512

    0af30f0dea1c8bdd1bcb62287bd983ad488827bd83f333ab7ef394b2734f398896b893022d5aee209bb5a6c03c642b4780cc1e6f2d4a6757868d05aee48386be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff08ce980f7f7fb8642ebd1078c7e674

    SHA1

    b487c8a40df5abf3046c7062b072d5a3f9406588

    SHA256

    8272040d5854324241278af2a0fa79cded7681673af85120a4e554cca3c19d9e

    SHA512

    0330ce4a20761d1d880988e5eb4e6659cc6bded49b075076b9a4fcd4890348d8d4cbc38bb581cea7aa7363e92aa086d008cc6d1938e0177bc80aa7973b28da06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6abd275dc14c8ddb63722d0332de2682

    SHA1

    9d9fa4efe09cd54573a5b3bf80a332402fa4b4e1

    SHA256

    0c1c1809792b4dbe048b650d27a55e98aa2aa12e9bc8a0ae92a7bf0415e3ba55

    SHA512

    57af0ae6d9d8801dce1e9dc712812dbc6b5376d39907458b58d35ccef7f88970064be04354f16b8d89ffd18a4155cdc3f732ae2ccd644ee1579792f9fadf2eb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0188a03d3b9dfe9278170f186219ff1a

    SHA1

    9829b3bd6d924325a430c4c3d6526dcafebf6b88

    SHA256

    b885097195f1f2000bf11c500f690ad88cd39f0a3df21a76d3172ed2c45ee57b

    SHA512

    8f843586db4981f893921e2b5898c71d73dbc1e469106f47e8b647658752444798980743baa249ef9603977c79ff4977aba387492309ce71d009f44933c4c80f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7972201b3dde43d90535bd64c90b6f07

    SHA1

    28132d5bd15e3c27ac0a26800ee74b4b66377466

    SHA256

    26f15b8123ede4ba67057187c4f731a4f1ba25e310a834ed0e8698a47c75c5e2

    SHA512

    d8302f88e61b97c19f94ca5946647f9b5464d843356079a33c919c2f5443b8cfaf132933115ea45dd5584f61e073db2cc67e4280f84cf562fdec2d1863c00dfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    906c9a6b441cd39efe2e337f30c63ada

    SHA1

    280700414aae1e5fa000ddc4e2435900520d8f39

    SHA256

    9b2155b0730e94d923a312b5112467ede4050b41f2115b8202ab210c180c846c

    SHA512

    dc90a65afaff6536e5ff22d371ea65bfb706148d199eacfc5ce90235b0daab253d573ee4f0fb26775ba9e5ea834e1bf51d5f50d0d325ceb9a179616f4db14e57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56a76701a28be47f883dc5b8a366b1aa

    SHA1

    599b2b3f8d08baaec2ddcfae098c232f2fcbba47

    SHA256

    6bba77d98a64569a9237a55e2dd0e5fcbc9f50bdbda325b1bea5d6acc3d091c1

    SHA512

    9bde46ca35f050f4413f32fd7cf703b8dcfea54022865fa2c665184f5b2e45161606882053ace0ab6043648179f6941d5880ea3454e0374999d47cd126ea46b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b8348885d487016f63a8e72a14efa6d

    SHA1

    2bf7fe6f15082459f9c007a19455ed65a1d714a1

    SHA256

    a30bc2a0e85914ac3afb9d688fd9ac2dcb50fa79b9039e7c66a812f884dd83f5

    SHA512

    856f76787ecf61bdb5412170de358e9bfbeec9fbf0993b6aaa0fb205138704b5391f2bc907bd1d888f8b9df119561c0e609dbe93600e68278abd947d68295569

  • C:\Users\Admin\AppData\Local\Temp\CabE984.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE9E9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b