Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 03:32

General

  • Target

    c232eab4128a2823d80c8a88f6065d90_JaffaCakes118.html

  • Size

    26KB

  • MD5

    c232eab4128a2823d80c8a88f6065d90

  • SHA1

    23fdd27619ea80792c1c319364809797722a64e2

  • SHA256

    4af62a63ea5095fc8c9939cbcd298fe7d88f7ecdeb51bac9e1c322221538d605

  • SHA512

    07e6308d05bc95b99f9b5c7932382792e653b4deea74fc664c9fbbc4835f01e7ba61fe5515e8a8f91c6d697b71e3f9eb126a598e8ae33eff04aa2f7c3519fdc1

  • SSDEEP

    192:RY5ojYqb5n9nQjLntQ/2nQieAnOnQOkrntY/nQTbnQnQT+/ym6CrE+3RQl7MMnFg:S5osLQ/ZOeaaT34y

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c232eab4128a2823d80c8a88f6065d90_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdb69a7a26e4d563c13928a494bb0691

    SHA1

    32c8b20f6702a226b08c009854c7035223fdfe5e

    SHA256

    238a6b72e9bdcaf1c886d4ad701f29400cf36e1cc07478cc616f0254c43c97a9

    SHA512

    2b22fd3055ce5d63b7468514db600f68ebcd539d1ab88d147a573cc4c86439dbe3784c3808a594deca6f82c3b33236c980a03a77148d978f5cb66b81672a4ad2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27dc42703c900da48c7f1b4b3dbd424b

    SHA1

    1439215db6ba6dae5627245ccb22fe9c68d61750

    SHA256

    07ee5364552b1e5dc9b97febfc767c7175ece2201a2044d7b62fb9fe625d9880

    SHA512

    1f67c784a8844af19e8c5c368d874a99c235aa877b96c0d26cbc01c6d053186189161ace19f697bf11e75115fb046b8b3530b465d59bd1ce8f42dcb347375d67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d89f822b877937e6b871ca5b049fc5a6

    SHA1

    6416b2e6c9734923ed86e1623bdcfec7151876ea

    SHA256

    bd5d32c2f73636d7bbba73ee732d7a68e6d302e5b65b5f828f19547508c64b45

    SHA512

    f8a39e5afc1860d1fc2c845d1c345abd9ef36ed99f5ca295a79265ef0202d0a24c9a593b654b0f0200ecf5f6f3119b70a5e6a72f84e1733da0740f35f4074c7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9977c4ddf513ac54414bae40362b4a3e

    SHA1

    42a30167d29c617ea77687386ac8a5297e6e8fde

    SHA256

    624cfebff0d57b9eca922ae9600c7818fef1e721b6223bb2a7fadc3cc125a96f

    SHA512

    baa16db9cb1cf3df431bfd6f1fe98f5b7c6cd9eb155bb6018442ac5d5a7b67d28a6961d14a34ed80868c1987a8b0c7c4df7c482f1d7f98795f7aa36158a0d4b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5c5c1471452fff6496b2edf1dedaf4c

    SHA1

    7b797328d524fd814423d0f93facb726580c65a7

    SHA256

    a1d5f5eaba78576c25fca54a1d122e2612f49e22b2d2a50d4174a417ae28cb01

    SHA512

    c9c553281c2f77ddc6761a65ba8dfaff9d4f4fe9babacc99afdd5b07788977a3326a55a404ef94427ccf067fc88933201fc1af914eee1f44bf0443470cdbc733

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    060826fe5a45a1454337aecd359982f2

    SHA1

    728441274ab2f03cd2cd20b0831ca89dab88fb70

    SHA256

    13ce5c10f52a0caf6c970809c7a06d361c107b1fb39824276ed8b825ec77217c

    SHA512

    cbea3e1a001c0a3309c91017d178c1858e0196bc9ee370873bd6ed6d129c3948a6df34d13fd6ab707524a4fb234adb1ce27327ff105ae3200f10886c6519a344

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8162b2e0ccd2f66c742a02b9bbd24b8

    SHA1

    ecb70bbf1c9d95703585ef57929ac120ad76b8da

    SHA256

    6bdfd21791e9457d3d677d70e36fe44ab15ab7bc85a520e6d953067824225591

    SHA512

    e07aac10a3c82a2ce048b006ff8813cca7404eb6d24f7250a26ac56c1314d575bf03715ec5f81723b7533079fb21faf81d68e67eb383a192c4733d4ff98dddac

  • C:\Users\Admin\AppData\Local\Temp\Cab20DB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar213C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b