Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 05:34

General

  • Target

    bdfc0265b382bd33cb5c535c1980dcef_JaffaCakes118.html

  • Size

    34KB

  • MD5

    bdfc0265b382bd33cb5c535c1980dcef

  • SHA1

    223f2583eb0e96840c8c1d58ea3c87285412c829

  • SHA256

    d48bd404f3a63f99450573c5b6648651bfdc80ec50bf69b83b45c009db4ece89

  • SHA512

    ddfa16297d5633c9440cc29ac3dd784dd9ac61e22ad04e3d34f643039374fb462674b350d4df1b7e7bb21647518274343b33befbfbce8c62e788767d8f0a204f

  • SSDEEP

    192:uW32b5nLYJrnQjxn5Q/TnQieSNn2ZInQOkEntV1nQTbnFnQdlXCeRAqK5Ake+kfv:sQ/YmlRpzLMr5p3+HzhEFqIQ7OQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdfc0265b382bd33cb5c535c1980dcef_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35d6aef1c371b639e536354b2b92b931

    SHA1

    71c10eae404ca775cd3b59f1db17d1fc933d5400

    SHA256

    1828d725858256c4c5a8d8b63ee2b80597094d500d1f9ab0d831cc48720c4fd8

    SHA512

    67940c1bb0dbe1fed3d503ce46a4d31e88f4df821310b955ad2c3529ac96e70dbcaa60f356997068070fc04da474f13ca204a747ad760b5b4e3f3e4d0fbb2b01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8320b2c78f240766d65954bc561101a4

    SHA1

    a072e6e2015347e44e1f16ea1c0b8b230e3d1442

    SHA256

    32a6fdf7d149e4c894005aea1119ac45372dab44abb4fa7473a75a3b02a71545

    SHA512

    99c227c68f386e9a0c996b0e4605a0d6ae601f7acbebccf089de5f05fbab131a0b1b978792fbc71b4ac31dd66920a75d91f047deaf660041c316668d1411533d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a32633eac9a7a446f27baeed0771ff2

    SHA1

    f749bb202866077a5a8edc77ea695b3556e38d45

    SHA256

    5f886959fd87d07b6dba05f99b8a10f0800a45452912dd1c00c35973bb3ccfa0

    SHA512

    1da9c8d1969f9d6f0b46fb6c16cc88d21a302947c2441930fe0165c754fa7dea3cd5ea98c76c2cd90c4d844b1c35dd7ad8dc6f7ff18a4225d078338b92eb4023

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2fc2597d79ff1f5fce51a7022185889

    SHA1

    06ea5fb970d867ad9e3b71017e22cdbd5c6439e5

    SHA256

    9947dd01537bc604550f190e2b3966fedc5dda59f7008f0f9f16d410d0872abc

    SHA512

    35087cdbae329206ae4e67dced2c88a262ee6ce0ac3242b15555e1b1fd57bdd4b5083a99ad42ac152bf781be1276ef624c6ad65e927e6ea4116e820ceaca5055

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    514bd39a1fa4a0ae7de84328863d6e0d

    SHA1

    8d80576037fe4223dfd49602853b30b24a88fd1d

    SHA256

    4a21fc3bffda087a1ce75c29ad5c6fc9a83bfe92b489bcf8918df614376ac9e7

    SHA512

    dc33df7c9a46f044636d2269e93693852fe17372dffe63a53dbde20a593f667ff444dd522a94e93837d8586ac8950a73567b529242ca09178cf9dc58a948b81e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c007386eeb753233c370b148ba94d8fa

    SHA1

    89f5a9a2b0898de50f483d7107ebc3307187437d

    SHA256

    e568f5c08d909aa10117d72c27b84be5c0b1316409bf8115c0885d930682e0a0

    SHA512

    9cb0152ff8ee613fa3d0de2163ce091e9866b0ea182882324929b56b51cf7887031dbce6f226e68308d0d77b4b6e790e7d134b26dcd9731a75f98656d63e06ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e26bf28511219e53838cd1c5e7b8f577

    SHA1

    0a99ed932b936aedda05d2719449b74b95c1b062

    SHA256

    2e15d1642ecbf6931f9944b05a9c70bc276884f2e1cfe1f8fd6776fc172ffbf2

    SHA512

    3d4f21f69ec256066ba50d6dc29ea0286b11debf204f3a2dab1b8cabf5add76703aa0511fe6e736089d969afc45978262cca1c2c3ee4180aa8e94866c8c27d53

  • C:\Users\Admin\AppData\Local\Temp\Cab890F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar89CE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b