Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 20:49

General

  • Target

    bf6166445fe5cd7a68d823aa66de14a1_JaffaCakes118.html

  • Size

    25KB

  • MD5

    bf6166445fe5cd7a68d823aa66de14a1

  • SHA1

    eba00b2f7a05365116a53b8e367984b7c40c5c60

  • SHA256

    62ff27b9dc99fc1e626b201d3137e5e56c259edbfe411ff8a69a38f9da92e396

  • SHA512

    b5274b0e42c63d2d7f66d3a5b31c075e7b5578ca271e642cc5ced69b0d4d91cf07baf0df40e5257110261d6357989ff56a4564baa784f511a473796c7d32a1ef

  • SSDEEP

    192:NgBo7z4yb5nKnQjLntQ/enQieAntnQOkrntIPnQTbn4nQaMCOqAZB1EJuwuXM8nH:+Bov42Q/uNcqpOCO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf6166445fe5cd7a68d823aa66de14a1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7bb5a8856e25f3295f2dafc5c199556b

          SHA1

          3af548ad6a0cbe1412aecd9743edf08cdba9ed3c

          SHA256

          a788e489f709fea7daf308d933533fb596c3ee171f3c880ac9f7bd8dfed5fa63

          SHA512

          cc713201f6ab542e4fac77a8900a9c4571d8af97b1f9536cee91a7b3c78be292bc61326cd2d63905295745f7cacda47842f0dc71eed4fa2c912e7a097673adfe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          14eaa628fb7042f1f653df97adf36ea1

          SHA1

          8d30a6af52605637cbac2204db9a18fb282040f5

          SHA256

          fa7ff85d6369119d6609229058324f63342d5a96eae3be49463899037b549c15

          SHA512

          10d39602474507931d0baca0355821bfe2193831ba5030e3f213134e0510e8720c77b644f2ea5909bf181b76206959a1dd69fcc7d391ad528b7d0b0d4477570a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4b925f4fcbb1a90b63839f0612b92c99

          SHA1

          2f2dbcde52c4ac974055827311fd4c9a6a8acc31

          SHA256

          45348d061196019ab6dd411f692b62255310516ca92c5c08dfb66bf819617c60

          SHA512

          ed312712db9c7f2f75ead672bcab64d8f80466628fc1536b639f76f8872fa06cf7ca4e03fff728e86ec57ff52586f2ed1ed4ccf7ca1bab9d7841ba49e11fd057

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          304a00c90d255850a8c96408b4a35152

          SHA1

          f4688a5371aafeed90cec4aaa3425307e4a8f14d

          SHA256

          c77a4263cc142f4d70f0587c6e37ed1d40f35a0c09fcfa0654f51958053f443f

          SHA512

          e7b10131dc61374bebbc950ea660e10b33fbf04881aec9c7df9d0fbcddaa873f3b89309ed98f1784d8eddce774883b2fd80abaef3c0086d5ad71937f7ae256a0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5357b034cba24b9ee23dbfd61e61d517

          SHA1

          1627dd4049e4bc6bf1620678e7a209e042918fe6

          SHA256

          0fa77ed6d518f75bbe7bd536d03c67d34dbe2d2f078afa52195b8d367fba4689

          SHA512

          230cd203eba3f1efc424d0bebebcf59ecf4a7d800ba206728dad92f8f48c12c0895c1f8d79cae424e4f117b77370051849c7cdc55b679f98e37d4d240614561c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1cf2b583ca74dcd74c94bdaa39122301

          SHA1

          8d8f10e3f9099548a85f21e897ad17172790caf0

          SHA256

          465676b3654881a035a2bb15f901ee0927e461b96c80c02b01c21695f68c8c9d

          SHA512

          98236ad2396979929e9cc0ed9a650d6796f901928b056156834834530193afa091fdbac600baf41031c9eda7449190652ae3fd0c41c05eb7195a999bc0c8d60b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e9bfcc0d5e7fb025096d8c8cb8654727

          SHA1

          42ec3381a95cc90132718d70e5dbd0be5d6c468d

          SHA256

          33a694d15af0ca60ff6ebefad1d2d94558d012b64b40322d6740e829f2082826

          SHA512

          2eb3570ff311c17b6e831582a82be44274651f2f37a87f21a2cc785ef9956aa4e30222197d721d3f475bb1f66bdeaa8d68eab6432a4dc5325edb7a74f1eea670

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          29346255ec304d12d67b4881b65beee6

          SHA1

          03fc50d8a3c8f9e2e4cfa83235c3c0126c6e6d66

          SHA256

          27d168b627a128caac5c09180afd322c98b391a0c2dafdf00e753614a626a57a

          SHA512

          5b93cd3611bc2738a5c75770e8228bb3d93b9d5218eeef50a25831c907577e7ca40732541e1af55c0fcaeb330e97f867e32243429f27db22f9791f070f7d43a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          36f10fc36067a4d9702b2541adf3e083

          SHA1

          97e6304c16f7e58387f967e0b31a2637d4d16ef7

          SHA256

          7d133291cf1a68dadf22cecb3e33d0cd2a3db55b60c5bd382cae3bbd78fbabf0

          SHA512

          db4d22a3abde3bc399d9282649f96871210ba05e42e3a4ea9df310c7f0115481a1173d483c8ba55b0e6d89e474d73b0b2237daa9adef5af0d96dde422e796f9d

        • C:\Users\Admin\AppData\Local\Temp\Cab3969.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar3A57.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b