Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 01:56

General

  • Target

    b5e836042989da1bddb0bac99ff68fce_JaffaCakes118.html

  • Size

    28KB

  • MD5

    b5e836042989da1bddb0bac99ff68fce

  • SHA1

    a8bee61190be2f645d4bd5686be6840d2dcae5d2

  • SHA256

    895d4583e3d97847d26b0b2a9387eacbb3bb35819d71de2b81ae2d50e4ccc9b7

  • SHA512

    bca06f5721c89c7cfc7eb13346a7ba145b3fe3f99d7d9ed2ab246f02f09167e4f5ccb88ec9e0cc809695c99eb1ab3d4fdeaf54c8de7da84900c2665b4d6a7d19

  • SSDEEP

    192:uWjd7b5nA70nQjxn5Q/+nQieVNnF+InQOkEntu4nQTbntnQtXCzAIaE2WcwqHA+E:cQ/DxU4dm/

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5e836042989da1bddb0bac99ff68fce_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c2a810bb73e4837fd94b1c141cac5eb

    SHA1

    c3af4d6fa3524373307ba9cc855c9529eb7241bd

    SHA256

    d86ad38af83c0208bdc7954c4e63f458c7d5fb0f4e88373d10457aa075479661

    SHA512

    ee5888e1619afdce70f2d57bd1452832a66e84c856ca8d1a5dbc8853b5877fc233c408d1a3ba8bc0d647eb2879bfcb9f6822257655332b6ab5fdc72d586987a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    106f1acd800ccb275cdc401c3a1369ee

    SHA1

    ee091a4f66b70b0490bdec187f833792cd958d34

    SHA256

    31d02946ed739cd10ac70869922ee5e723d4193b25797bec619a3b60f1926fe3

    SHA512

    efc79443cac1ac28eac87912cd9b79d4dc8865767590a7c080ec8ebd8be2d4470e130c1f356fc24214f895ba7d8ef0b1e844037713dd605858cf85b1dabd9645

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fadeb4889c32785e45935444bf10abd

    SHA1

    6a9b7ba02baaef9af4b18d368676178c800adf8e

    SHA256

    b31132aea651726df75deea2262ddec5e106e39dbf5a2ef2b20ab3fed5ffbbe5

    SHA512

    6c00b4f087bad4a8099202d7417ac04a379bee597270e0b81636852499c40d2f2df2242f521a3cc15816893533a209c3112fb3dba4cb27bca63c6d2e841315a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c866a1774d5d538180c498fcca6f7a51

    SHA1

    082c3be8c9b0cc7ab10e9df78a7a3fb56697a69d

    SHA256

    150e00f57b4b03ab4fd14d0daa60c6c4945b6229ffc8bb376a7b4a3f43ee766c

    SHA512

    41b6d5209227c6a9f45e88dd0c2fd872e2c282896ffec8c813578707535193e71ee72cc4430cff3289e551dbea7c8d86bbd28594f9f2c0841700fb59db7e6ed6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef0b8eef422f9f35d05e373583792b03

    SHA1

    25a934b517ca4880dfb4814a9e036cc0988b8c25

    SHA256

    5313e92361e2b4eb29f34cc7600eb331e0ed086b7a6ddfc1b53d3e5f6ac06804

    SHA512

    124120e805803cde57218fe79af7e18e7a5aba2b23aacff7d7c5c1401d7dad6d37a3f5e42b5017b4a1689c951f35c0e2ffa80fe37952fde64fdfc04fb061a5e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3c9396bad73b632de13fa75e2eb2da4

    SHA1

    519f341bec9b3cc22e674bf877ea3d5b57f053c1

    SHA256

    094bffefbefd66a648db3804ec1765087823d8b1b73d8b6bea09c039e3e4def9

    SHA512

    961de0f46708d1efd9e1e1e6ae5cb939d013893d3364a8c3984bab6ca12d8beb0202da0edc088f5e65d35d92c63fa5c9e8917b639d58020c78e483d5a0203414

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3dbaeb7c20a150c2402b935da7530ea

    SHA1

    dd4729b165f1f53f5ae662617bc6202ea2ee1f2e

    SHA256

    130542845c05a19a174de48ab44a1f8020132db8826126044ec15a270eff668b

    SHA512

    7bb16783cae48a803ae15ddd8ffeb488ee20c6b8a0b1ee02b4dda7b2972803df1a1198d5c1792808f0faf5a60f0efc8bbb9315a98b53ef665b940fa8b7455424

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d973d07f2b8cd921df055f8e858132c6

    SHA1

    9745ecc5a4381c1721cc4a68f205ab0d450e3d60

    SHA256

    e8fa297a88c4d3e6388eebe710d28da6268e6da334d46be07004a5b9b2df82ef

    SHA512

    0ea6e4c6f3dc3182e3d3ae0a5a0777baa4c4d08ab46622f70070af02b3eee05380748870cda44616e2f700b7b49acbf327db556d72a7b709d5e046ea3e851ef6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c30b4d13b1f45ecf5f9753177c06c90c

    SHA1

    47dbd39d508f257919bc04fdf69e4beba497b528

    SHA256

    4fbb9a71dde24854e571ba0523388406c47286a2dd3c55ef0571bfd8c941490b

    SHA512

    6104ecd27823ccbabaca8b3e509c8831cd64790eccabdf1898b0ebe6977c75521b7d40c9fcb34d97b955b2ffc9f3c63dd87a6fe5b9f47cfb1b3c892bcc61165e

  • C:\Users\Admin\AppData\Local\Temp\Cab236A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar23CB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b