Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 03:39

General

  • Target

    c82b1d5df07c1a6c0bd38b4528d4f54e_JaffaCakes118.html

  • Size

    34KB

  • MD5

    c82b1d5df07c1a6c0bd38b4528d4f54e

  • SHA1

    3a497a47832eb0013ca64491eff9fd12e2a44318

  • SHA256

    5498b10118e8fd8fb80b9dc98aac793d7ef29a039aed89e6221f9867f78c7bcd

  • SHA512

    d17a0c160da5e3d3c3a4449849f300a6ffdf7e8af81c96060f11fe52e760cfd6edaf0365035da6a4070feb23c167438407a790ac2f88f3a3eb54aa6036f002cd

  • SSDEEP

    192:uwyxPUv8TBcCjb5npINntBytOiqtQtnYUhnQjxn5Q/XXnQie7yNnzb8nQOkEntlz:KUQUQ/7TuI5ouOtKUB73Dwot

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c82b1d5df07c1a6c0bd38b4528d4f54e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:600 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    73729b2962f3ced80de2d955b03f4a68

    SHA1

    608662eb7e43212f7278d54f9c1295e5b64f0123

    SHA256

    b2aafa1bd5dc1f117aa912dadbab13d7b8b41d5d4382dc75fee0c281467329a3

    SHA512

    7f040e313ef0911bad107b71dc0a4d42fd1fc98e8314564eb5d7dd3a4059d65388c968ff3c765eb629d94e65c453c20cacd3c5a81eb346769e11989a2ee7e6ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e687de5c8f9fc4c3efde82d71180c783

    SHA1

    478031c59127e71886bf0eddcf71f5ca446afbdb

    SHA256

    b69a51c7b5f884fb736a44c74f30631284b87da13890b3487195d621496a1b4b

    SHA512

    7c3cdc19c2c5ee9f9dbbbd8aac2eeb91ea16f36fbe853769f6f78239126cda2062a84e34af9ef559d95430c55139a84b32847ba46189cc76517b089ba4f3b8d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    772fb4919b5e5dade455790e2c0f208e

    SHA1

    957fe6ffa48f3f1a277c0ee540db6608aaf1fc81

    SHA256

    bcd560220f2ee62504ab1c34f834c1473026d9bec2798d2264ea6e3113daefea

    SHA512

    eb375675325f69872bb730aaf900211d5da5e5cffcdbb618af5cd502f2403322912857aea14401ba232e32466f03aca2258692e39281ce54264bedf6718d476f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8249647bc3654a18f5629824b094fbcd

    SHA1

    c31aa6eecd273143784225c37151b229431f6c5f

    SHA256

    80f7f4f69b2a1f7012bff41979412569fb43664ae7d4dc2fed3f2e87e604f0a0

    SHA512

    aa7534980e66ab5665183da35e4a381810992ac7914d00911178087875ae9b03f8a9ebf6157092a9001c5daa14d8e7484706ca39eb2e7b578b39987545e5744a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    85bf7162e38c6f6f670cafd5139198ba

    SHA1

    6eaa704191f5794534d60f8f4e04a5d70b8cfdc5

    SHA256

    d93af702a5ff86861e6f9ce5fdca51d4a68e7cfddb2458dc6f365a1b8afb39ed

    SHA512

    41e401e6653d7b1a88bfe6c5ed1be1092aa9a6a9fd9b2cb5db6d672bf25d9562e097ed0988fc48a497c68ad052bdaaee01f7400fbcd8cc008df60e6d213ac1ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6718567e494fee1df9004fc50069f3d0

    SHA1

    f2c7ab84e3d254418c2cb3e189f1eed5653fe846

    SHA256

    09f6f5bdc40a0d816a276a02812a210c078508100c838e4c5ed3fb99dcc540b8

    SHA512

    5a3841c112058c8d32f4f4279492bf74bbb13e2d2618842287a017e965a267efeeb0bd0b02829e08449ad8d72abd9d6b4a81b75d1cf5f063dffbabcca0bd00f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    cb376d9a59a349cd5a1287c192593617

    SHA1

    2d24da71a3e18ab0d4ec9d78609fb696ec24abd7

    SHA256

    05f99db94699a7bc4e33a275b1021310c592971146fd35aabdfe59cc27e7b778

    SHA512

    1ddb29f0ce2f289dcb16cdbffa3a370d8b1ccc85b8a79961a44760fd23345feb6669f1c057ceb684911eb7e7740c85fa7613c755fed11dbf5a5c5c699b115f0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    41cfa2549458f484f4541f6ff2d09486

    SHA1

    807c268f339c1df75f1082339dbbd7674bf6a0e8

    SHA256

    628779b8516044079f57b1bcda9a04ccac655c1515c920588d673fbaff71e42b

    SHA512

    ecce346fb13b1483825f0cf595ff196ef2b43f42681d48f64f4fb08fc6f33cf9f766ed098a92140d1f0047497488a0845878aad3730702223521d49a9d8d2dc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e8627c92de7ee423f56f749d53b485ef

    SHA1

    5cace6af4471690316023f53202068e321a453f7

    SHA256

    6b942f0bf036dc86d4c39f94d0f83a034005fbdde988e56584afe14a178038ab

    SHA512

    6322f85337f9d7b660c221752b1adcaa8587220ed9f274050261de296c4f9e3c6e954d33b2ce1b82c6fa721fb3ab1676e37f4a1ef2d26bbc4cc9070db9c413ab

  • C:\Users\Admin\AppData\Local\Temp\CabACE4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAD83.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b