Analysis

  • max time kernel
    118s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 21:56

General

  • Target

    c7b775bfd807a370c20494db37da08df_JaffaCakes118.html

  • Size

    6KB

  • MD5

    c7b775bfd807a370c20494db37da08df

  • SHA1

    63794434d1346657b8a42bf5e28d3ed70f92b2f1

  • SHA256

    4997d9e7e3804bb9345ce91b6426500c43b042f1a607bc94d9234053cc6679b5

  • SHA512

    7667bb801d19c8d6f609850b78bdb4869b68997a41f0b170743406926c1604e961dd0ae0dd7ee043c39e3e2f31c208c1b41de8fc6f5e0181ff2ca1b7e1a5ebc2

  • SSDEEP

    192:SUVkfvog8ZH7NH/E5nM1sbGrokz3Cbn1hsDQagjqcUW/Jq:HVWvog8ZH7NH/kW381Taght4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7b775bfd807a370c20494db37da08df_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ce072a009e285bf00ad95d9f2d6dbdf

    SHA1

    dec00fa6e63960ddae5b294c93c8c89f7d97d0fc

    SHA256

    b4fce7bafde55515d17a8ce54216336999eda1bf18b963fbec8a861e59e6acd9

    SHA512

    569532d8698533164b51d6b4eb92fac47584932cd79317e81f67a34f3fd28124b8765066b57486fb324f7ab86594595e5753e0c30a2ef256ce52361d1ea0c2b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bbe3b2fe2ed5c0047eceaba3e0e10af

    SHA1

    f98498ce790914cc70d67022a640613582db1be2

    SHA256

    334f34f6ce48295b25a37900218faea1cdf3e14c29d51ee174ffbdf98726f3c8

    SHA512

    9d89d10e8029d5a433090084592b87631f690a3f0f28ddde4277cbac714bdb95e59b850d3ad230da1ef262f6c62cc353d020618d34a413b3f18b6ec899feaf76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    121a3b329a72fccf006637f460bb211b

    SHA1

    129cfe7f9810941ffb2d781b3ca93a5af8a58dec

    SHA256

    f254666dc36a3a65e68f1b632f620f76904c540aa975227ab5601ce6fb3e1bac

    SHA512

    c010106ec983d5429ac7799c3a673e7a8053e87a9b97546596836e0cf88f10c66a7a72c6809563374a1baf3bb088a2f6a05d804aaa7c4203b34ab7028fb1aa3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6851904d9c128442593a244fb1e35ec

    SHA1

    14f50a406f3287a391de3b440b25593de5b6aab1

    SHA256

    625ff1f1495d09ab6fe913ca02c4d8f649a44219f74ea7acec82c0e8083f0177

    SHA512

    5a58ca8e46d7efb534e6ff09098b5fd74cd326cca1c0dc6bbb116b2c2a031c2b9c7d8b32dd8df513a2fcb001ed818dec83769640814225e288a82eec59f1d506

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6c58548abe343908e85bcf21411c2af

    SHA1

    7cec26b665270b04867d438e1155bed553dd3243

    SHA256

    973e6e1bd1078369085ff14b0ba8f80bf205c78aaf0aae42c0abbcc80eca804c

    SHA512

    2a839ce25741d78a97cf7c0bee7d3a266e1e983d071e60b134ca04d3e97f0ae4af6a34016717d63f71d780abd9da152da42bc18eda35dbcfc6febbc6966e2baf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9158725f6a9027124a740cafdf318be9

    SHA1

    0bf6ac8c2697b286aad5464f7836edcf98aa8ebc

    SHA256

    a3de8d16e73cf0a37b85e2bcc06c046f6dcc7a538e6257daef1061944ec50f80

    SHA512

    d2cacf0d01e664798c6fc3c618c0a683876c35f0eb78db6dd5bbfab287cf545aa3f56d029c1f0642b168f2bbb458da15d526267036433b4a15a13af335ea3319

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2185aa1ef24c492f33008393fa0a5ac

    SHA1

    065a8e327273a665c6b8fcb16dba7ad102d2a9e8

    SHA256

    9aca556ea39fb52e4664ef68637f761440b00dc784ff2d3b034153cc423b82f3

    SHA512

    891826f569bf2c6bda775a9cae17012add1939313d5fe431e46796cba0e62090ce0479613129652433407709ea464880203d2c7c3ce124ecb72e3183c61770f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47338000c0cfaa91306ca3efff6177be

    SHA1

    94aa2d8590526ab9cecd9146193230e92837b77b

    SHA256

    29fd140edb422d06db54898e1490ae5214ce408321f88b5563a68ab6c90fa0ff

    SHA512

    05c07eed20c8e7ff8f103600ff8d846469deb33fc33c8ba913252caa525baec514e226aa1f91f5c0d1c85d4637b5264cb9e74f7ff5cb13de48071ccb07076468

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2ed8779656eae20e0a1d30f2889597a

    SHA1

    9128859cda05b3aa54c4a9c4b57315630fbd42c6

    SHA256

    f9300812f50cb2456298d0ebfe7cadb38de91b5e461cc04bb8a2c2a757ac99c6

    SHA512

    6add2f7c0e9243a751e879cb0d6e6265d28c2696546c4dd0ed2d39304296c7c5aa7839a59840951fc094ed11ba15cf06f90527f3f975bbaaeceff143aa4722d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0efcf7346bcdf93d0531442512f47d01

    SHA1

    082ca809e81b709566c839256c77e14a6183930b

    SHA256

    41eca0a07beeee35d1381e8f2dce3368320232b9219f7dc37cb8361cb9d4941e

    SHA512

    bae57552e3a1abd0f57d9c525da1d6e8c54d131ee8578cd8d683173abaf5d2449245270ea669d565c35fa784468a37974e5a3601b2383e64b8bdefec20c37871

  • C:\Users\Admin\AppData\Local\Temp\CabC9A8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD53F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b