Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 04:47

General

  • Target

    c24f87090dec4c8767e739484bc76db7_JaffaCakes118.html

  • Size

    29KB

  • MD5

    c24f87090dec4c8767e739484bc76db7

  • SHA1

    f16d1dc42456bf4f6dd86de5182ae4b816028753

  • SHA256

    f1459dfc987dd4bcf0ced73481f9088b7e17849dc858a20237d7cdc417003e22

  • SHA512

    4b517217ada007b20c24e99130a2b856778652ea492f3f2245b98498c788ca90fc95d04dbf7688a70dbc5668106700c3cc63a147971088534252222b31864540

  • SSDEEP

    192:uWT2b5nB/nQjxn5Q/EnQie/NnUnQOkEntQKnQTbnBnQtMCdAkBuz0EA3KSmdHsGM:jQ/QHNXl290e8CaO2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c24f87090dec4c8767e739484bc76db7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90af4ec35646680d55d88f5ebcf7a6dd

    SHA1

    e4b5801678743ee0834ec84921f94fa73c1e6665

    SHA256

    31c1e5da69dfeaf383635006993efca31dea43f47e4c55249de875e02e21b748

    SHA512

    fbd314b15dd0220dccc639560086bad012346fd037cffb5dc6445e0173855b755565d4db66dd6faee9e33c06015b3f6c0d065b49007b245e5d42283ad133a2a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4137eca62e7014f258649f7b1dd30722

    SHA1

    f7f7b5fe596425ad69966f1e9e363279ee9fe060

    SHA256

    156c3b76ac0ef2a1c16c10371a0075ed9a3f6398ed445f29b997ca809d73abaa

    SHA512

    2f8067dea9098853389cfd25795870b9de2c962cbe8f8af4a8ae8aca457458f3c5b0d7d92de8e4934ef3330393ff755a198e33eb937c11cd1e958194c593a39d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea027ba12be85316c987098748c89a9d

    SHA1

    6edaf9a8485021968f98a5f08a08a5783a3d250b

    SHA256

    1935c5c61b3ad1140e11943a322b808adde012cc7028291b9240912b222b847a

    SHA512

    f71327c097467d77f0e7aac3fe930f723893a1ffc44b3d0835ca27794b620bab7a6222d6adaef6ca486aeb470284fd4c8598c602ae5c5b29155777e15a3e792d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c2923bdba467dd909e484dbf87f84db

    SHA1

    d331c25dfaab7e070003d0ccd49d6acbca063669

    SHA256

    e2316b6f156afa6bae74e3efd106f175c7baad8edd8c8a830c1d779fc9e15404

    SHA512

    998524e3314ab8263cee78c58220bc47d4fac1020a788179531c808963d97812e1bf4f8f2413c34355fcbeb8d873d801036378e02596af2a82d2516a97960ba8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80d31a5f80dd4f2b96f899a1324fcb6d

    SHA1

    0884885840e6f2f5efcea5b027d8a82bd68872f2

    SHA256

    1bd5d711bdbb51bd705dabf97096f64eb0c93880b08a3912f9bd355cac21676a

    SHA512

    3699a9ef958155aaa06625121a232b6642dc69073c9b533e856a568c74cfb300f5f89ac19a7a02b300bf84994d48b30b9e351e53f1d783f60be2f0c16c9acad8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    127c846f8f74f712b0da268f0b4682be

    SHA1

    d9b9baf6ec056ae4badf2c10571eb0c05cfc4bee

    SHA256

    c1a9150c720dd70dc3caa045e6a468460a6f9ea27f3433c901a120321cb0034a

    SHA512

    b0956cc21b18a25c9725778f31548d3e989d3bb921443111707c97351464de3bc745f29908aa45154260ea10dce53061065f49099b4045b57dc5769f7bb92637

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcba67eccaf9c8290adc289849b00d45

    SHA1

    a221841c27829b75c81953d34a1ada1d570a7f79

    SHA256

    deed42ab3b4cbb79b6ed09c36e65f6f6b707f8c9deb8b7e57b2229c9939a981f

    SHA512

    8ece20ddce77499f35782ffd3e7f2b2cdb0ddcfd4a8254065f45438d452cee810f00c95783ebc7f9ed27ba71600d74a6dc71935aea42102c2a35a99ed11b7fb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95a81ba19951abce202d5458673f7f98

    SHA1

    78ae79a0f0a981970a58c55c668570d7a48c8b56

    SHA256

    929633d2991ff0672756434a88a6db8d3ddeed8905de7adf2f5eb0a255f1b6a0

    SHA512

    c081046255ed523ed990aeaefd2eedb25b4be5c7753a1992880e99ec0e1e0b5a4cb7e05d5a0d100260d6ce027f2cdb8493a617ad43aba7dc942425482787d451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7516a3a375df3cafec82caf78c823be7

    SHA1

    fcd8f9cf0808c25d9c250278e109a22c661b57f0

    SHA256

    310dab81c9ecaa2b45f82f6cbb1dd5c6ea6c57edf0fd0856ae22e71bc237a8e6

    SHA512

    6522036c87c74e54904773ed5e6d56ff899f2c1c43f7fe439c6cce799fb5bba523296fa98ab2cd9d689b0e66fa00b58dd6883f0aee6196b5d3a9091a4739a58e

  • C:\Users\Admin\AppData\Local\Temp\CabF115.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF185.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b