Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 00:11

General

  • Target

    b596ceeb8718d2e87301ec3bcb263b81_JaffaCakes118.html

  • Size

    121KB

  • MD5

    b596ceeb8718d2e87301ec3bcb263b81

  • SHA1

    8f37d189107c031a661cf2e4a51a5063fba66843

  • SHA256

    32bb4948396eeda76441d0587c75c93766513da315dfb835b9e8517bd1fc84d3

  • SHA512

    9b2a5fab47f047fdd4fad6f59646f52c91ae213ea2ddc091f7e37e1619e3a37040d270f36f70d9b7d67df4a5e79a916f51958b66e1dfae4468e168523e5eab41

  • SSDEEP

    768:txar1DROu5vTNDO4MQIvqNHgrNx8wBoPtXj4aPr7m3uOlap55imPTFKyyDcc:tg5DP5XMQIrH8V94S2eOO55imr0yA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b596ceeb8718d2e87301ec3bcb263b81_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a17508c302937fee51e735def3eb918f

    SHA1

    dcc45b7845f86dc9ceb3025c9cf2b43c42edc68d

    SHA256

    3d4c8683c6acae49ae4cdb13aafa32191e35623d2bd4e28279173781b3808632

    SHA512

    89cb5eb00a1e9001684bdfad4b5ec99d582b64e26b5263c6727dd2a3acfeb8b8cf662be6b7a4437f3d982484e1042959742568347cf1e09416276fefa218cece

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9beed8073e5b5f99406581c0959ea53d

    SHA1

    be5ec8695f0416d4956b520bd9c1ab2cd2b5ec3a

    SHA256

    d66503bce7dbda51ea351f24d21f1c9137782be9870a362d8e09734ecaf75e9d

    SHA512

    fe3eff41b99a7f40ea240b49a91ea4fab0f5f66bef82f6790b85e48643f8d44179e7c14f4c174caa5b5e8913f8a2304eb130310b504b6bc507bac21fc3ee608b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bba2cd54acc94fa8800ea4fd3a9d5be

    SHA1

    7e20851c89df012dbfe00649b60721c68c70daca

    SHA256

    cd11d58819eac2aec503e5bb97b5595331e4a1a227ac411e16bedc796a7ec2a5

    SHA512

    d62e5371915bee3d19e20eab6396430524b498a3c7e4f6ac586332ee61ff7a71ada55a42eb3531672f2ff09cbf665e7bf66a53fd06058c33e032a880f861408e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ec233b19caa9baab6e1a2b5a83b265f

    SHA1

    1773cbe6dfdc117fe499f6a8ce9a45e56782ead4

    SHA256

    3866021d2c8430ffbd38e84995c5e12756d203c0f228e89b1e1988178d76b535

    SHA512

    a6818b6bfc2f2968595d340c58fc5890e8436341ce50841fd35424bff4cb6bb4796800956d0afc44f4aae7dc52a866cb991d9639587c33382fc747a98457139b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28c14cd78d7b622eadc5d20f3ff013be

    SHA1

    848fd1f326eaab9b8384266b34e19b7e840c56ab

    SHA256

    71e81820b1430c7b3be4d7282e03f3689963f2e92db27993d9ba75a0f678e871

    SHA512

    d755a503633c8c3f33a4ec8fdc5576cc814200f74791860b9b0a4038b08ba68bc8d605d6e287ea60df1126934503e9cbe271cfec7c7debcf5247bb6c4d3c47d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed9509e7b4c2d3691a7af4a0eae1e81f

    SHA1

    88072baf212d1e56dce388f38d6075deb5feeebe

    SHA256

    4f5a6465d02775ce5773d6bee16680c76847b5b7ec8ffe5c751160ca8ef1cb0e

    SHA512

    301f8995130b73b2a01c21beab14c87e51b553dc1796a2161b3e50603b70f95ad296b3f04205bb48839cf187b97c231b6127fe96858e949058eda5636fd006cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a21f12ae66ca6106ba94c0da79d4341

    SHA1

    69fa3be061147187cb1da80f6cb7eea2425813a1

    SHA256

    054ba2800babbbcee25711af45516192f17e6a86de86fc3bda58507aee0a76d9

    SHA512

    066a8f5c4ae475801079fe6522c0725fe560a5e937cb6e64d0ee895d7871754a64a1b01d9ec4c1e4bbe59c99d879faaee51b3b79f1bd3f32a1d70fcbaca8af5a

  • C:\Users\Admin\AppData\Local\Temp\CabE458.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE45A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b