Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 15:41

General

  • Target

    b8337f08e5dcbf09088eb8a3472a7373_JaffaCakes118.html

  • Size

    6KB

  • MD5

    b8337f08e5dcbf09088eb8a3472a7373

  • SHA1

    248ddc39a963799d72e669f2abed9cdcdf2e9ee2

  • SHA256

    4758009e970f34389272b06e9db88396716e8a451e37e68c62c9d5d08d1c47e4

  • SHA512

    4eec07fb9419b479586fdc6c8148f2a3678e407a2f36dafe69a0d31e2ff991a87363162ae66b990e630bcc682ececa6b36084daeb2c256f368237eb815c5ed94

  • SSDEEP

    96:uzVs+ux7DYLLY1k9o84d12ef7CSTUe7cEZ7ru7f:csz7DYAYS/Hb76f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b8337f08e5dcbf09088eb8a3472a7373_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d6f8c0de4f09cc72c3512845202d6ce7

          SHA1

          cfa305808a995567d1ee96ba454c127fe718b58d

          SHA256

          daf0285e75ecc63433c977c7717e7125d0f1e566664f491bea4cbc5b144398f5

          SHA512

          4e7c295ee8878cf1c16ac539d800cbe8fc89e2a77ddf4a5550123aff530d95907349321d59c47cf141c4b9e5f139285697c1abbfb862defebf82fde678737d9f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          392bd0dcb0dd21b23b56b59c3b06a6a5

          SHA1

          77df674df02ecf39058286233bee995d8533b7ba

          SHA256

          208b98928386d3a86d34b39f4cc5472b33f1223f7d94ff9166c7b0ba233e1be0

          SHA512

          08ccc92e146d5b2004d309f48e5f33c656350a8dc165a71892af2a4be260e35a2b67bb52b563887695e5e5b898f426be60707476f4bf6f5178d0416c24b9f3b5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e8d62129bbd901df492a24a1edad37da

          SHA1

          5fa2f5c72f02486b5f8cd58f80b7d2ebb1eb63da

          SHA256

          9fb080bf6e21283cb69f50269f13fd7cf01a7eef1f67548cd1d7a56e80576a77

          SHA512

          f62aec329aa763e9363403ef956f32c446a79f9a6e70b1746ebec29fedd73c4888eb16b98e19a73710d124b88463853c5e9e70634401d548d3ac1e98e2dbe36e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a3189abe0a959998d01596ea747fe84a

          SHA1

          f23acf5c2d4acfd91da1062c5e12f7822a766106

          SHA256

          69cafb16113700981a3a21cce89c98a04dfaee5e0ea798abfdff8b98fe33b315

          SHA512

          a15bcd68b6d327aaeadc4e4111676c1963eedcc34a2254eedc255f651879a4e54a510228c11e9fac6078f8db2c5fb868856d952944ba5f2e5ff9041fecb86809

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4854dfd3ea0f3bf921d07915b132beca

          SHA1

          7e4a1d528264462ffb1dea179ab6da4f44c31a95

          SHA256

          6d564f95abcdf2241194f99493bd050abbf12a0f72be1ea85843dc00d2f895a1

          SHA512

          b23517e2ec2fbcce349b158e08af42ad0433081766be435459fe488b7d414d75ced44aebe3069bb68bc552ecda262ff2dbf63f1162c4cf33d55bfc161d9c3f64

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ed8314beafa138d53e0186b3259e1ad3

          SHA1

          e08cde6f04b46905cd406bb1b057989e81835dc8

          SHA256

          9d64f8e82a70e661f3f5bfafe777fcf2d8fc9944f842afbb0a536c5d78b5aea6

          SHA512

          300a4f6f7094bc5ca277a6d36c1ded58a98fffcc7e87b47c128b5396833163bb0476d8bfab8f849ae82d52f75e14049d09f383057a28f293f52a783cb63fa5a3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6130b4240751699caa9b82c5e31f1ec1

          SHA1

          9f5cab39911ca2d44bb0f615c4d48ba9f5204078

          SHA256

          7fb94a907fb32709c14dad3da73be176ce330a0b51e070905c97b854eb223a32

          SHA512

          85746e2d441274b12a58d4ebe01ef70bd0a952faf01b03de8ec1930b5e833ed2908cbee923d0924e0966c031602cab357b467b4d672671193fe19ba24eddaba8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          22aca9eb6399e141ef64ae47aff22e2c

          SHA1

          a552cf0786f4d58e2a1c6b8552e348636901c0d7

          SHA256

          1337ae364d7dc3f171efa892193420cf953eaeccf91d0d4feada38fc3675646e

          SHA512

          ad5f10c0840d486159fb3868245f82884ec3a008addf7b6f44ff368a21c44f4551323f39bfd8b0072b2588e10c5b4452feabf1d29a5140ed3ed37ab073264d59

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          78970ac81e979f7a51e187e5345ef909

          SHA1

          8515f80545cc7cb7e856c710044bc38de029e3be

          SHA256

          a9531bbce9096d5adc5309b22d9e868b71224aeae79a5fa7f5ce609d9fb3ca90

          SHA512

          9675d922d48666275d2707b33dc5d5062de6149f63419322e426a3bf58de04608edb1b099d44b7987e580de66d085754c708b00526aaf3ed2bf36b6c27756ea5

        • C:\Users\Admin\AppData\Local\Temp\Cab5CE2.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar5D62.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b