Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 13:25

General

  • Target

    cfa267dcd788f4a54e8b7fb438dfdde7_JaffaCakes118.html

  • Size

    463KB

  • MD5

    cfa267dcd788f4a54e8b7fb438dfdde7

  • SHA1

    b0bae98b67efa05b1d5030a1bf4191f403e6c297

  • SHA256

    ec8ebc220d8210f37a90bda67ee0310c3dc9f7da3a5852b7278ce203af5b9fa3

  • SHA512

    4fcb478ac4ee640473e3e994eff03ad5b4a01ce555b0fd5e6cfa95749a7a4f7fe9109e6c3af1ca3cce0858de8fe129c0fb777e8f4af0ea6852c50c69c8bc6ef3

  • SSDEEP

    6144:SJsMYod+X3oI+YXsMYod+X3oI+YWAsMYod+X3oI+YLsMYod+X3oI+YQ:u5d+X3B5d+X3/5d+X315d+X3+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfa267dcd788f4a54e8b7fb438dfdde7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afbb567d94880a50f7d1c3225035f3a7

    SHA1

    16e5da68f44dff7f52ad8aab687e9824bf131a82

    SHA256

    f168ebf6b73c70f72f1cb4c477a1fb5347423519fe0db3a1e37776f59fccc533

    SHA512

    8ed3246186c48ce8445d7453669edf3fd2814eb719c904860aab721ba1521b3bf24b22566d4e11e8516414633e064c3a8f2bc9b00c68a773a332592a5d70b96e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0af755520529a7d68cec7810a91935a6

    SHA1

    2f88e64e437abf55960c4fbff0b44ec911496c71

    SHA256

    39446c203eaba68073c79af0f11b18a534d93abb386248b00ff81ce642b7e779

    SHA512

    d8261ea8719b263f6ae1b87bb059eb828cb4327fb79ff057a12a462d351c6cc8b3c56d666849e4bac0e4599e71836362f77a9bd823ace7a6f46c38e4a1d83000

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65b7ff7251c491ee10b5bcbfbce94928

    SHA1

    9ccb42605368b6a042738be111c4373173596fca

    SHA256

    170e33b57b3ed93ad7390132aad3da73e9ee857c54d22f3ab48a02438829cd2c

    SHA512

    f61ee3d9892debc3926c4f4f9dd5e03f26242830069cdbae7d642cf29e6552c4baac0531596b666c6a2cbcf0e618619300cf3551846327d4b64d0b3e04d1ec69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c0903304f71ed6c2416f88baea7739f

    SHA1

    b185c21390821141ecaeb030287f64552fb5afac

    SHA256

    b1a7c451d6ad56a06ea8dd90ac270bb8f61215188003f49fe3bf7041810d4bd6

    SHA512

    b85b7d00d27c22ccba63d566be7bc4cb40b1bf6d824d3a9dd9208364d50e8e5ebd62f731c6260e25a2c84c900f5c654e5ae2b575eb011f13851b1f449644e8c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0bc18b05e2aa37b16e0378b336c9e55

    SHA1

    5ff72f3eba073a0977baef10087bc25b620936b1

    SHA256

    4f6a9ef503839bcd7710c6afd88924826cb85619852e8d2ba7d73bdf52ed6e23

    SHA512

    97e5f6bf02f77c1837b35233bee0e7a98f90623bd78ae482a1d1e47240dc3e0da528433a8a6ced327441f2128198154f6fc5c104a907c3b2c87b9e1ce07df060

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    353e765b1025393bf698864e2749b7fc

    SHA1

    8ce57d9eedbc4345a903cbfbe691eddcd2ab719a

    SHA256

    019a3945c05daaf5f2c2bdbe1f7d7bf6a37fd5154763b7f66605fff63ab155cd

    SHA512

    748857e4b15ad8a846305256d6f3e91a5815ac5d90b6315fa701747613268b933f31274d8cec587c7f82e538f15fa0fb80ac891193292ffb8f424c3ffe6743dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eb77f4f7072c38400eed1ab42481737

    SHA1

    41e92b668d08b631d3dd2983cd171d2224f19a63

    SHA256

    909dff0c0c364b772f5689a872cce4acf1d3164508c19cd0dad0e759e642eefa

    SHA512

    7054d7b2fe6fe28c6fe94caf598c2bdad33fbc05c6fb11fb64223d4c27c23cd6a97d8bb5ff769805463cd341c5341c2e1fc54e2a9ea04295467b8a430518ed7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6016713109bb00d62954b1c861bbbedb

    SHA1

    a2c6f0d35478e8286a606e242855ef0e2caff1be

    SHA256

    f9ca1d8cd072c06f32b18d847dd70b9e1a639e2c238c83f0fb051fef2b6c9c9f

    SHA512

    84ef77b748ed9011d9520f1c01732bb6129b58d108773c3b44581475790036265a1699feb7d0fcd91fb62172c8cc2a120a07f91c037e5d338e0c16e67c5516dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccd1e54c90cbcc025eb67f1ae9140ee8

    SHA1

    feae03840f5d35150374959d6ba2eb013caf50d3

    SHA256

    dad7df0000d8e8bd3e76f3b8f2771e71d572a733580107b8e974853ea1a2b08a

    SHA512

    87e69af10bb520478ae39b00efd3005becd9cc329e8a95951b2bcbcff088e5bb24d446c1b90e4afa25cc62020dba30d4d54f559a9b15b079fde42820686efee8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9037df9c9dcddbd3d45361759e6212d

    SHA1

    ae5f73f3f598d60fa47ee4c267103d3ace99f014

    SHA256

    068f7daa0fa1df8c47b2124ae29d34f9ef26b7522f6be6f40e3d07b4e1a20e4c

    SHA512

    56ceabe4834bf5de92f5b33b2879ae6a69900076187f6cfdcf1300c2da7f0a0d219d6a8c887b340021bbae4ee211d69d4dcd372066f079fe1ae7047f5ff43f8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f86ef1a46f68eac5d71b6189e43b96f

    SHA1

    ea351dfc0e5fff94f3f454b4b475b835d7c68e00

    SHA256

    ccdcbe77b1f785e38f1c56b79217f1ca3ab3f63351c123e1ce510924085bd16d

    SHA512

    a6bc623c801658f16cd94fd6ceeb82be3a85914f3ae82de4b528cb6ed03d08467354e5bcf38fe1ad12102f9207722599fe1704381ec3fa604b3c3ec27c085d76

  • C:\Users\Admin\AppData\Local\Temp\CabC1CB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC7C8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b