Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 07:45

General

  • Target

    d16bbf974be84c4ca2737cd25b3812ad_JaffaCakes118.html

  • Size

    14KB

  • MD5

    d16bbf974be84c4ca2737cd25b3812ad

  • SHA1

    f718e21862920c3a29aad38de9e550b0800ea865

  • SHA256

    9844200c1fc32dca77967c83033908ff034070543411ca34e7fedac55453c41d

  • SHA512

    63d298e026539c088393bb2b939ae0ff9477647779d2ad1bbafbac732b43bd0f6c5dd4c25836492fe8a248fa47c0e331fa4d09cce28da3b320e1a159c330afa6

  • SSDEEP

    192:IvkdquNYk80/eqj3zqvZAJ5LsG2+cGXP6qn2bMdDe5L9g/ss5oIJOy81anhYmP:Jdl80/e4zcZORNcGf6K2Iy7haOy8MnzP

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d16bbf974be84c4ca2737cd25b3812ad_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa3ed4a4d911486fa1e97136daccede8

    SHA1

    71e7a9a6f3ac8f16b2acdcb3a898c13a95d93701

    SHA256

    1a49bca2d24c64f1c0f9dfd425ec2404987395720801f76a4d04587469e78c94

    SHA512

    423ff6678760b9dc869f604e3686ae0b29c354f6adcccf935773a8eef177dcefc1eabf997504c8451214b0e924df0c61b36010ac93cff35bd157896c3f9d5bca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    187aaf45212e530c6667f83f72020040

    SHA1

    05cf02c02e55036474a21f580a36757fc3f38192

    SHA256

    1e022bd4999d19bb75b75d6630d3754061d933030dda4bade647559570a06cb8

    SHA512

    f68d6b1c70aff6bafc65fba2d4d10661196baafeeac4f6ae557d325055b386bdeae7ffa5dc3cadaf705d4aae57fcb388b9beaacd4fadfc3095b2dfaed671c69a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77d4c3eef705383ffc92f7bf0522c57e

    SHA1

    437a0db97f53c47cf9c920333884205199230d32

    SHA256

    bc9630238203a8b531ff47d008a3b995a603179fe39ffdbe57a53305751efddc

    SHA512

    def6337af21d37daae033a07ee8a0fec9094ac4f34d8c8487c31d3d20fdd11a07149260f0d7fbb6e3e1a745bb7769e4e16915e6d1771bb8c6d45156292cc4710

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bea15ecb1c9d1e2f1b41c68b1285901

    SHA1

    b89ea6fb925afefec32c7e83b29c8abed58aa23f

    SHA256

    aa1980e37a92ea96da2e88faa73e34cc2e0798c809925f9c13bb61cdbae0b7c9

    SHA512

    b981a705047e737664d5cbdafb9654c5646863d78e76a9929af8ba5c403617a186051153c63f8874471b0afdc77a98f3e7d8fa2c0f8f1fbe9a4b3e04c19eacbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34a89cd0e120576bf32ab8226081be95

    SHA1

    457ee68a1f86cde1d9cfeb5747463dee0c55f9df

    SHA256

    24d1aa4acf6a495cf4b548d38cb84917633a1cd2b5d62aafa53bebd01d24c60d

    SHA512

    4dd5037515d31f0962e6e9e90892548c8eab052cc228ab8c33fe8951fcd8c08c6ca40a2f193b3fe3bf82abc82ca75e4459041ccbaf5031606e72734ad216052d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aeebb9afd94e3d6793fbe23bf266df5

    SHA1

    4e95d4c9b2bbd30c0e4128518c8e3f1b63d2ff62

    SHA256

    706df0c0b2821bfe46216b41d535ce280d2f789b91a6851aee2816c98cd46e9a

    SHA512

    ee18b5a1b3a4ab182b0a65b5444dc9567a10e6db5ff542846cef1933ef3e7232fdcba56fba06b20a9b868cc70b1de3a02e7afc01276311066f7083f2fbdd7459

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34dc3cefc7a93f3ac1633583f9db9afd

    SHA1

    790e712ec15d08c9863ad9fe8a16aa62c8b70865

    SHA256

    39c54afda7885cf7e916aaf720aa85fdcfb2ea586855ff298d5c52d7234fb947

    SHA512

    f0a9d9a820aa75c6c4a62da8256c9715cd48744bffa94b3aa884d8da8af02f64bb9d7ee0b411f4194bb07a22a3bf883ac4d2d338662a799c3afdefb8cb1d9492

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3304006397012374e79e6acf847033a9

    SHA1

    ec889ab83723cb2cd36a732641591b034468cff0

    SHA256

    06028623aa7cd02c12d1fd688cce047cf0eb223cd7fea9d329e8745146b2d075

    SHA512

    9aca114e994a3278b55fb9f587da5a00ed2f56db4012af17f9d7350c6a8045cd2d41f03810474cafd03afb104dbb29961f405ddbf67d71ac2be9be7119a1c067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20ab37cf9b1f47806c731a8c9af51277

    SHA1

    478d8ff69bd7aeca5dd5d527db6ee036e093dbb5

    SHA256

    752f08724e66f1f51ba2b5508b7eb3946a13365678fda87cf9b1c571020dbdb0

    SHA512

    4e87b62b0583444551f3825ea7e8f43a44d01a02399274b019479bc99e3edbab1d7599f33462863c90623511380b04a36e5c457e7d00ce2df16f851bc8d29f9a

  • C:\Users\Admin\AppData\Local\Temp\CabB472.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB4D3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b