Analysis

  • max time kernel
    130s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 13:31

General

  • Target

    c8e9f0ad7da7d0112dffc0284f825353_JaffaCakes118.html

  • Size

    18KB

  • MD5

    c8e9f0ad7da7d0112dffc0284f825353

  • SHA1

    79f8a9a23e13a3f9bba1412f629b90c3ae8291b3

  • SHA256

    cc8caf5dfb48cd54d9184cb9cf6bce8a41831f7b5b522ffec1b5dff9bbab139d

  • SHA512

    a974e94fe35c1a8af9cf1230ebbaf0dab949114f4eaa29ca91b4899b223c96e7b5567a778ec4c0f2f317f6921b27ff703015a0897537a73bbe34e04100935dd3

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIH4xzUnjBhTV82qDB8:SIMd0I5nvHVsvTuxDB8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8e9f0ad7da7d0112dffc0284f825353_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f84d1056923752236192eec0b76e929

    SHA1

    aea95bb48185bbcf7c1f65dbe63f2eb7bd75505a

    SHA256

    0fe03468bbb1a387c0f83db4cb8a68f0e955b7885e658c9da0cefc2f963fc030

    SHA512

    f5354a6c5e6f0f6f3d333042f43ae7b1e894c24150bbf857076b1ae2b6cf4adbb55ef2fa736b758f5e1d1a3b3569e042f0812577955ca1785f48b43f4ee4cb3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d729e423adc7f027c2f729f22b0c618

    SHA1

    22e67122572033fffd20b1e5a132ca5111898a19

    SHA256

    1d5d11711ffd599bd1139de4fd9ad605666ccb18d8cae80e1c5862b9be88c044

    SHA512

    c1ec775f8702b388e0d26f9990f027ebb907d21758455bf71b4a390d7e2598eac6faaccbdd6d109cff9fa5dc02897a3fc4f48ef1b9d9d7e91cea450c4b45eabb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c07e206455e87b7d8194600eccadb2b2

    SHA1

    ee32e63483b56f797a655a7960d53e4fa470c1ae

    SHA256

    c498232e6e467cac1ffeb6642816b2c19766a6078a46095054a2b93143c7f86b

    SHA512

    33d235db9cd0aeea5dbbba1d327ee91e0b4bbfa15d1f1242e09843b41ed8c0cf246ea6f57c872c7763969ca60bca3b470bb99c3adae5cf8526ea58bf77b964ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca3a7886f4c18751fe5af729a8ebafc7

    SHA1

    5eeb329f5c361a120e886ec7775705543e3449ef

    SHA256

    077a750c4bfc7792e11adf5ed445755f11abaee8b4db7907480e1f77b38395fb

    SHA512

    46c8c0103f0b165a0a7e7c8070e10bf6cfdc2810aebbf5903fd37d7ee67576abb6eb37fc5ce7386c6879b208956627634c799d18dc6ccaab5f75780a63d489c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60999976c39f4cb3d7542a61d3e94180

    SHA1

    04a6720aa3f0b2722345746187e71d6c22717874

    SHA256

    8962fc1c0154bbe891528f148a4fa51ea60ed8a59c0563413b04c6bcece261ba

    SHA512

    cbbd7157e5f6fd422e0ecfed2c110375cd9f2069e77e93a7b71a5937afd5144822269a5b0d6bf2622d2bdbe773016ab14e089276a51c80348b9bcb530981964e

  • C:\Users\Admin\AppData\Local\Temp\Cab1DCF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar238D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b