Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 23:14

General

  • Target

    c7d2dce0044cc7dab219f3504eea733f_JaffaCakes118.html

  • Size

    23KB

  • MD5

    c7d2dce0044cc7dab219f3504eea733f

  • SHA1

    ea28f44d5c994a84157d14cccf69b40686130122

  • SHA256

    2b4192ef256d39f8405df5a43554fe725898e6655bd9938aed104772e6b52d7e

  • SHA512

    b293afc40c8eabf0ff66fab84eb41c90a1f634e95f0f7474e54f8d7b6440846c3b4f578e994da7c7da4eb8ce10ad1df3df13c3c1d8c3e98dd915521acf83c410

  • SSDEEP

    384:e1CCu/Wli1oE/i4fKyyLk8kpZsQIFVn/u4zzu4GO:15/WI+E/imKyyLTkpZsQIFF/u4zzu4GO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7d2dce0044cc7dab219f3504eea733f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    d7b288659c26a4decd3381b07c6e2767

    SHA1

    40a0828fef5030c1e3ebe42e7d1c8c7036c8d69e

    SHA256

    0833861971c2181f1e4cc35e68ad338da12efdff890f183bbcfe9d14f3cdecf2

    SHA512

    8371d2f4948be92edae40f2ff8ebba421d8d97e9a0d52e5c73ace2190956550c2918938d22ec4ad8a52cf9936784a28e0f5bc7d8ceb9dbe1e952552c81e9042a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ea2183c68fc85c71b77a97c29ef4500

    SHA1

    4d02a367d5f8d8e9f33a0a3044eda93ec0323414

    SHA256

    09387d3273824a068b984365e1d120c1c969c678004daaa3be5dcc2c922838d4

    SHA512

    3592d9c914c0591b32ff49ea1f5b643cdc903dca211e5a5d4aaf6faed2f16e138ac6cf71e6972e3f0a2c303a90b9e797fa79f3ef217d4437935cb8651aaa602c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05e6c9a454c227bd0857e22f868528dc

    SHA1

    bfe01ed6d038ed20369b440bdcc38b5e87dd86a7

    SHA256

    0d14a2c0878b7a2ef42220345acd8fa5d495d0135913e2f5d6365eb1c35fc7e2

    SHA512

    f8b5ea25ae0e83f37876ae373573c3c2452d65cdee5168b9c7909519ab89bbd0e290553c385d36fc1a691e1cf5c0c234d49133f801d3f8969282cefc622b6b36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ded80db743db5d57321db266fbd52285

    SHA1

    2e8f623339bd3370bd6cd27e6111fdde86f86f41

    SHA256

    56a08b3f1f980eb9356fb9ffaa066b7040f08c1d3406922b009d0ebc14aac05a

    SHA512

    e16bb4c043066a06194837352aabbfa84eabf32826d5ae8ef47f8ff4d8eaf3155c40e8961a47f77bee73272f46af87d1c917fe75144090a9bde2e7c2421596e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3af513ac38b320958069e5190a66a601

    SHA1

    b880a1c3a2efa7762b221433e20a37690c05cf78

    SHA256

    a00488d4cb4bc6beef64701d8dc1869cf787eb6135bca4c109f6a017a9e68f00

    SHA512

    cce7ac2a8597351b42b313e12484b6e65c4a288329d86cb28255eb91fac66aa15f37efcc4b356b0ea6a28c3fcf1776ef09173d138cce291bf15294b3e81b4a4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99887986dd4a77b203beedb6d6f35a55

    SHA1

    244a9148b1b827e9e8c30bdd12064c44be916df2

    SHA256

    0c6345b5fc7267e12f105e9c7911f95c15645f82f883649146cdf44c2dd3c677

    SHA512

    299f420812259e5f62c45c571ce582e5aa4d61293d8702a42eef39d3092c51bcf53084f1c023bc5b9c0c16cfd546d062f6971e25ff0017db7db1811be5eec2a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff44bca03f42d3efc73ef17239ed6203

    SHA1

    fecfab0d3d460aae6843ab6082346c0cd5b7e630

    SHA256

    a5e0cb07a7615d54722307f83ae8345fade49ceeb6e24df71bb83140953bcf6e

    SHA512

    41f04eb41429a7974b509564d0b804be9099575c0556de33612ede41d07d4702dd92bf9867ba9491405628f148cacf52fc7a1b61f107e53e4003ecda63d43e89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9cf0cc5438d2c35edf973f991917249

    SHA1

    9edeef1d44e69ddf72a7bd5b35f1f995d2f50cfc

    SHA256

    d41b31422f3289062c5a23378d435c7ccf662436620bc9a6b5c4686fc06aa40a

    SHA512

    ee8f80a81c0a5c82c5853293768f602c47a7ec6d59831825cfd7045afac71518710c8601286642099dffa6ead8c7763450b2287aaa131050c9b8f9a5a15c86e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    38fcdba252433e87db72df96f20ebe2c

    SHA1

    ae1918a760f1e67fbeaecf578ede1d4539c85a02

    SHA256

    271e899dfeeaa99bdc2362c7e4d5fe0aded7d7906c892892d5894c53ae0c7034

    SHA512

    66790cccfc6ef077b2b6e28dc49b46b9ad7cc12b4ae9a950dc896e4f91dc852dc3dabffbf1f8f07198ecd8a2c9138149e656e6866cdc81c1ff9aefa4a6c01032

  • C:\Users\Admin\AppData\Local\Temp\Cab733.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar735.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b