Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 15:02

General

  • Target

    bed8a732a9f40a3e8f1184b1ac44f45f_JaffaCakes118.html

  • Size

    27KB

  • MD5

    bed8a732a9f40a3e8f1184b1ac44f45f

  • SHA1

    8e5a94f772e9b3e478d874888eb1f7d404d85db4

  • SHA256

    91d3dbfc2d080ee52da0ce87245a11c3bec4adfdd91e550f1a99ffa47af34651

  • SHA512

    ef5dcc402be78cab2c786b8ac7a9b16e660febcf2a02e6d706bc144660b6a617ecbcc5b0d46d4e30d8907b982ee60760680101c226b874d5de493a75d73951ed

  • SSDEEP

    192:uw70b5npynQjxn5Q/gnQie7NninQOkEntIinQTbn1nQ9eLPm60/VvQl7MBbqnYnC:oQ/0uxsVuSZyX

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bed8a732a9f40a3e8f1184b1ac44f45f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1316 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    961f66c06a41591b6bc0a7f7072b93e0

    SHA1

    d09eb2cc1dfde1279c70c66784f6395da38fe3a5

    SHA256

    81780a93d2b7f7a4b6884ff48992a088f0f704cd7ac84e70f5c43383fcc2fbc1

    SHA512

    9c8ba0774db859f980b247c2625b168d88dbaee74bb38b494b3133adde918beac5844f815cdbde9d2b80671b8cd23d3fa2bfc044c93569e0536700ff7f8dcef9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5c07868928306667c4dd5c6eb918d83

    SHA1

    5bd841c0d97d0f972406e11a13b9dbe027c50aba

    SHA256

    e5c13ee282536b8cef70a04665f3235fdf0bc004a8a4d53251c2f2889894bb3b

    SHA512

    018b0475f5b947737fed006689e00b0b234790c99fa1c51d5cf61c4591562930586f44ff86d93e0a4d1146a189ed37d4b4a440dabcc1b99409712a2e0adcfd73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    975a204ebfddd5ea8b98548d6db5a822

    SHA1

    15753d8689084d996b80d789e94c6a3d713c4eca

    SHA256

    877e67bc0f821ea291399d05f3dc39ae2e55cd8c85f9aa8b53edd20567d09074

    SHA512

    0da175e6290dd1955012333edd2e718c4660c56c8569720d68e35224767c0939e36776d297ee9fe703ff922f90d089fab35202a9b7f05513e9a7381911a85133

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3aac42e42abb52ca73088b300cc38dca

    SHA1

    ef448a858367f9b1b748d1745d9d05208821c5a8

    SHA256

    142caf57695e7d4c6958e015fc6fddfa97c84f1ac4fd126203f41e00093a2480

    SHA512

    a493e2986643b0a30dda4af48fcff95608d77a4c7052fcd971deaa02ce8db44e5e00d2e38ff4e14f398678c2a2f4a16dda7c12967c45bcb7f65eaca368ded7ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6eb34d0f3d627816919bd1adbb02e2e3

    SHA1

    c519619d76ff6f802d3e3c7bbcec2608b3599ac0

    SHA256

    dc6328266cf7764787a425e4025f24d5935fd6893ab8b4e914b713733da568d1

    SHA512

    a794903d42abc8e6f5040fd231678a4f6f79cb90b62f8be0afaac73bea1018bc71ed242d2aa03c5d00c5391eb0718a3e36dafd19d87c4bc1ff3c88b8838970e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f24b42674a32a3dbcb91177551d967d5

    SHA1

    c42bd8efccb49f92ede043ba80840be315a38693

    SHA256

    2207ad11cd457a6c148a45d4b3e54de193bef4d86fd8a7f4c62b497b331d3e3b

    SHA512

    252b9e758223eebbe8d5979cf6659c2e8dbfe1942a6e968954711563ca49dfe5ef7012b7ff30636fd078aef5d35d37fc1c3cd9f4e892e874a9c14ac452f64da8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b6211d6631d37d15fbf6da13db7c0f7

    SHA1

    614f55e811fb9933f9a572d824901513aeddb72e

    SHA256

    4d595b430d5c1a9962c49fea1c5ef8fcf1440369628d5d061eee45fca08006f9

    SHA512

    31bab5bcb6f3f8eeaa07020e987a8aebe8da334d41914be39c7277b46a10a18913cee3541800ecc4cd071612d9d4a0b6f963dadb7f494af8c7475881d419d7e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a7cf86461a50245c50ab723c0c8a623

    SHA1

    98b4b878eb13a8c79ac4ccbbc81eab15eb105edb

    SHA256

    152764d7158592a4ba963962fadca1631e78c86c3bef64c07253ab343718c2b2

    SHA512

    85111bcbda79a7dcf333f8dfe39e50e51b61555cf9c7355a575bbc9980dc84d433525ba97a679231f4a3c40deda65b079f058ad8ff993223f4d4ecbb5375b9dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2650aa1c73739dff30796f21d0b6b69b

    SHA1

    2e1a889b803784722bb1946f2614eb2663a7172f

    SHA256

    f587e81783006bdd27d90e31d36d7eaa4de93183951601c65cf2356b13226933

    SHA512

    ab3f882a7f4afd1ce7240afcd145abc73a6147b4d52fff116e7b7c84eddba42f01e80f7f1d4d4d9cb18fab9923e18343d1d73e682c333d320ad32a2de7a5de43

  • C:\Users\Admin\AppData\Local\Temp\Cab5F51.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5FB2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b