Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 02:55

General

  • Target

    c81c40aa8cf3a72bbef61c182677d623_JaffaCakes118.html

  • Size

    218KB

  • MD5

    c81c40aa8cf3a72bbef61c182677d623

  • SHA1

    5234def8b03c1f0a678f89258819fb6ea8cee38c

  • SHA256

    5bf2d2bd66491bda1c045828c361e1b3079bbcda052efe6495c357e1d408f0dc

  • SHA512

    d8578cf5f98bc664acf92f82808b2c36bea466f18a68d380ccd3f48255f74196657fc73a03a54c8326f88b9fd812abcaaeeb60b144b6ad3d0e4de667d7aba642

  • SSDEEP

    3072:SS7xc9QgdXEL7myfkMY+BES09JXAnyrZalI+YQ:SS7qQgY3sMYod+X3oI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c81c40aa8cf3a72bbef61c182677d623_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1668

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          433fb7ee3d45fa0d137af01dda9c592f

          SHA1

          350bd0cec37f40e62ab6b5483979ed8008243361

          SHA256

          ea914e52b4f16742a725dd8397d67c01c2c204bb37725643634c3f142fc473fa

          SHA512

          7b8a8e715e33d88d2bf2dada41d9061b95d2098fff0f7b91df429191ad60d49e8305496593164115571055f477b0a56fc255607886cd912b6b512dd43626eb30

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dac9c0ba570d410a0b1ff627b3c2e94f

          SHA1

          7473a34c7d99bf7a4a86d8245b5a8ce89f855b99

          SHA256

          f36803bcf7e11e3524e8ea8dedf51ad15dc49bcb17d0e301d1e1ce52dce830cb

          SHA512

          91c198e95a577dd3dafcaa85c36815ef7f0276ded14b82f4087c195c548a57df2d05ab7b0b6562bf666f34ddd6ac27ea6185fbf841f73538c39cc8e513dcbaff

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          78e61a4bfd6ade3c33ad5be727decc3e

          SHA1

          845618b5841fecaf78c6171e04c5e9ff4025edd8

          SHA256

          26db7ec71bb4553d75e7e82ee9d7bf3f3f43f90f40628552cc153d6b00c4bb6e

          SHA512

          f8d47968916de68e7eb59ef8ba4b3fede4c265f3d96b72180a12a438ae0f7fe188a893ec216afe2f4d5dcf42a1e3792c8caa7bdbfbbd79dbdab717ceecef36d6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          492aaaf19fc7b40bb18b3f81faf0a105

          SHA1

          9189c12b4c54490009fe70d88032c72d870b92cf

          SHA256

          e84994048b4042b07c3fd89e4bc4d908f9dd23086fc381bd37d8db73526efb43

          SHA512

          1b245e74f553f897e6f6917e1380bd58787aa5b8fd089407e91d8d9b67b7ceddb8b3d8e264d00d4f5851f333d684680446065589c5acb873b48a66f9f9a420d9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          db4431aba56e4f83dd0639bbe225211d

          SHA1

          c99d2e5aa54b5dd0d6bed1f476c7a6166ff10581

          SHA256

          83e0d7c0bb640bf6c1029860bd89880b145771fa8e11f279d538247bce186ed6

          SHA512

          98e80cb0b137f6a32d073310d38c0f3e2d7f1446af1077b4cfc2ceeed099ae466d34ab551ef33dd3f1da0b1f6e30826e4ecd2c4c42bbdfb3c8ac99750fdcaf3d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1bbde28dd532ea175bb69b4b35e3825f

          SHA1

          c09a3af388108d3c55d8761c4d51dfc3bb73fa2a

          SHA256

          94aa5dc4583d326341857f9f6474c30aedae3c7e2b155d5045ec42a7ab242ca1

          SHA512

          dd4e831e21a67cca62364eb89bff1de781cf12d00683a49b7759a16f7cd850dc9aadb59ca893caca06178b67ed67c0058bb05dcd9349119d9c5e0780548e72e1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4708fc773f86f37d1cab9fec4c7ba002

          SHA1

          d72bdc589c7cfa05af00f5eabad613c7e16ea0eb

          SHA256

          edb28b10cc730122dfe287ba400f760932996a6d57e0bb7b270c75cda50a5e5f

          SHA512

          3245b472010f9e291274c0c8424b817d688e350d5220443fae77e906be784585da5f901a3ae46210c2dbf75105decdcc6db6aaaf46ac208d0fe24dc97a421bea

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c3b1a20d014fc4b6c7cf45cea8081796

          SHA1

          10d27c05d5eb7802cfeb6516b0dd9ca177595074

          SHA256

          12d05da75f6303a5f9b9a68292601f76b765991e37eef78a185c8a94cb5116cf

          SHA512

          b546e5631f3c7b0407f8b9fcc5f8c5d3e7fe03df73cd0c4cde3e982c6bb49ddeafe7206701f1b747dc9d22e0ea4abdb894b778581bf51e9573b7658f9b2eb0c6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a0c1d968c26da29d655a158e9aae28a5

          SHA1

          6131379cd9a6d7e208febbfa560a4fb9c7879718

          SHA256

          7c780468394b890b469878c8f0d158061170b2502d3ca6839ae8c4af598cf863

          SHA512

          a2163f19b46ea16c5b8cc0cea12a65e357169cf1fce565fcb16d580199a06d90a8c206c6170a2128119f47a6b37217e069a71cb51d6377b1c691b813d068607d

        • C:\Users\Admin\AppData\Local\Temp\CabACA4.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarAD45.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b