Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 10:49

General

  • Target

    be6f3b725d2d14a77bcdd1564149edb5_JaffaCakes118.html

  • Size

    11KB

  • MD5

    be6f3b725d2d14a77bcdd1564149edb5

  • SHA1

    8566a6c6542b61c1987f63edd9b8dab31d6df220

  • SHA256

    46871148e75bc9661a24ba5fd193bf635dd1f33b8576b7edb1466123cd891ebb

  • SHA512

    dabd194be0b145d7f53eb24ce7f152ae28326edc9e6c616d02684698fb47dcabac1e650558387d6aef792a55b945d733f187da7c1de6de7ade2421a4a7a32fa1

  • SSDEEP

    192:CE9WOptucyPHrtwAtrd/jpXuTj5o7Bzgd2uJsi6V3xDlCvoW92S9V:zYOpvyPNr1pum71gXJF6V3xeoWn

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be6f3b725d2d14a77bcdd1564149edb5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f4000c1638d42ead4b475de60c38757

    SHA1

    8ea9e0258565efa27bce228b6574a155e9d84935

    SHA256

    aa6debb47190621920d8c896f4672688abc736f2ddd7e02a0121bbd1f759224d

    SHA512

    8b9e21cbf62d82a2d524f33bb1dc94e0d783d2ef1fbb2794a563a29da6a905eeb5f4b94e3806c7900db34cb835beb08b9341630893a5f941afdb89f4c292e054

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3acb523e18c5eb08f60eadb451dd375b

    SHA1

    02f8a552cd7205d8eda876f45587bdf9243a22fb

    SHA256

    120ea6b62e2256ece29b964b086921b16945b6f9136dadfb518baa87e9d1d63c

    SHA512

    26f908d06f3e72cc47c01e0acdb3f3132bdf8f862cf3b8c1c2a52b0f611c9ce3d9f011fcfbe2b22f5060996e6b4a33fe81b5fc45cf6fe8cda16c3a6acb0416fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7bba23ed5b0d39c25f02b27b3a2d8302

    SHA1

    9846a965b0fcc8be8e757fdcf14b555cf17c27e1

    SHA256

    9ef56b6760fb70f4fbbe94a344692e3c5a66e31a63d225e808962cacb6af43f5

    SHA512

    a6e142baeed38aef7245966a3eb498956da98a5dc9229b509a5d1b9b6a6e2b0049218fe2dc47c65e84159217f81f3ceb037853926f9a8b8b2153999553bc60b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cd289f1f89d07a35914eb6b6095caac

    SHA1

    fcbf1dcd26dc3c9996f0409f361edf550a1ce5a2

    SHA256

    7f6d362acce1e1a383f86eba5a76f12d0c3e207aff0ea67a7b6e8918296cf6b2

    SHA512

    68f5b36b72bca4da813228b252e396a136f6c7d41a1cb8f13220ca241d612fc04a7f78f30e7f068d8500d6413a5b8fc5efc521acdcbe2332b6c0aac64612e04b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45e1777eee8988d7dda94d4d20a81f18

    SHA1

    0d577efe3fea162cf02f198b7feb2aeb0d15d6f6

    SHA256

    adfc5b98ed5e97747063a3b130dce68a0d907aa862343e5360c3e1b083af70c3

    SHA512

    be14c678fcb139da5caad132b4fcfcca90a3d2f411b33dbaec4a5593592f16dd74740d4e1f54afdae18949019209f32d0feff252228cc026f7b3be7ccb0cc0e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90ce8add169ade37ee7910388db91424

    SHA1

    633c9557fae7f69e40d8250ede485d25eede1231

    SHA256

    dff0628eba6948dde2f99153a09684434f2a9cf3ce745aa73aebac8bf114397d

    SHA512

    c4a2d45dc00a75f44e2bf4d7b0fefc4bcc802c0052c822d8dac0be96af20b4076acd3d1299c1f9052f1a285563717be590aac4becee9d69e0bd5ea87be693fe9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55fe1d92e0dc21366b794e76a2798501

    SHA1

    fa5988d0ac79e024d64bdb72fa764f0c2eb0b232

    SHA256

    6fb210f8af3493f37e9cff8a0d181d0293673430039b05685c452863881c4b33

    SHA512

    b7a16494bf82ef87036e7ab9271bcb270b4bbcbce894cd2af4b68d0cbc07ffcb234ea30b38b4e68f7aa9237c09eae7e7f9ba747ae2b3ca7cc8d67d3b1b1044c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cc5a3ad96f4a49a4c9dfb1eb69c5cf5

    SHA1

    2217490a4124df7acb66e361ef1447bdc3661f1f

    SHA256

    6970099dd13096c1cc33f4997ce1041db9dd4853117f23ae0932018c4d3f231a

    SHA512

    801d5e4270508e47755367dc6b15e8bb173a0e79d87c7c8adcc30e72697402104098b3a55ba7ae067940319d01452ab66ebad25a36843d89aebca5751e55ff6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d08fe9df4d9bffbfacc6af9aa0cf3a95

    SHA1

    f4f75ae0fe5a10037ea8f5fcf6517203ab16f8d9

    SHA256

    d78742179644879d84b07756e7bd4f741fb42b73619aa91b82729398fec19013

    SHA512

    8b461e8f88168dc8e6c59bb8df2268ad99a6df20a2f7cf16de01d5ad340ccffc51d748c1a9659590aeeb2f8ca519180ea5ed4adefc4584473b5a9995231d1d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c7efae293dbb430eeb06f1df97461c8

    SHA1

    28230bd0ba0fc0c856c1d31c120ef8973f1e5297

    SHA256

    047a0dd2c19b9bffa56173ff3f91ee842eff486b5dec187813e9822bc304015e

    SHA512

    71a9cd3f71a0d0633067a359f0a8dbefe821f6e1d36d1ee9d962795ab72ad96cbcfb009ca40103e776f35eadb3ca9b0d5ba24b28a3b21cd408586693319a6803

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29b2aa4499ca7a924e713f723a39c083

    SHA1

    87f63ba4843bcccf4ab406ad05bb029a0b478651

    SHA256

    625a7101633022e2b438fac6b69f480a1b85e2bd7c38524f55fef16123685d81

    SHA512

    e7fc23fcd4ad61974ec970fff525a7c86994c7fd0ba75cf727699a9a211d4b007aac48c3dbb972c1c1b30ef568dd3104631d1459b33b4758105998752d3b54a7

  • C:\Users\Admin\AppData\Local\Temp\CabF6E0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF750.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b