Analysis

  • max time kernel
    84s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 09:32

General

  • Target

    d19f2383e0bb1fc0ce3370789159845b_JaffaCakes118.html

  • Size

    27KB

  • MD5

    d19f2383e0bb1fc0ce3370789159845b

  • SHA1

    de6992ab6d7cb31ac566c2e5a641f68d392f2770

  • SHA256

    e7d7554ac75fe77c322ee5e8945b295f1b29db1fc3f9506d974fdf5b577f1dc3

  • SHA512

    2b69522f8b0cd0b78cb9cf176ea9c5b77595c6207176e47cb27e0527ba92196c5528668d32ca6d4cd8fc5a6a89d094d5b31131409299eddcca73e52385603208

  • SSDEEP

    192:uwnEb5nH2nQjxn5Q/mnQieFNnQnQOkEntqgnQTbnBnQ9eZlm6l3TFQl7MBlqnYni:6Q/CQ/VTESnK3

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d19f2383e0bb1fc0ce3370789159845b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d57d4bbb6d2f434c8be2fa3f2a8b8773

    SHA1

    28d809ae0f3e49bb9272fe047660ff1b0cf6c1d7

    SHA256

    f51466e76ee79767b141b63a68ca1fd295789be6f16df6cb17dc45b567a62c2a

    SHA512

    f2043b07006f0837cbe1b20bc3c84b1f711e3c872cea0bcbec86e5a2a6aa3ac73642fb3746a108d0188af2fb447b1289040f3ac17d0b236186184ce243387aa9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99e9f05b72ca04948b7b995afd2f352d

    SHA1

    0bce246b41fabb588fa8a91898d8e20f4379a9b8

    SHA256

    4108ac0af189510b2abd47369aa8578b519e533abfc985d74f21c34427bbef62

    SHA512

    5f3d06d0b4ce5dbb1537c83cc9fcc42704edd907b35b9c2c1e81bda8ef8dea85f37dea2d4634bb7f7108c6fd72e4bac0fcc9d528b86803274e90ad4d3c02dc23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19ec7209e81f5f20c21702a0e09c9575

    SHA1

    96ebe439192d7ffb01db6a13ebe54460ad9d19a4

    SHA256

    d2a88bb5ff498a7e22a9a70b31c812f110daccf27eed31bb6d6a3a465c15de60

    SHA512

    40b53d269ed5b6d810ef4b06bafd5bbc203c71d50ac2812c153700df048ecd7f62e03b8f7f4c724b492e74c2447158ec99c2d9f29d97146e0280ce8ef5d2c3f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37a94de421a12bface42f7359640a7f6

    SHA1

    0fc258e0f8d0d47d8a8c2540fffd0effcf598dc2

    SHA256

    2e96c469e112d1ae1bcebbc5a222f63b0e3b240340294621df4a7c4d9bf2514a

    SHA512

    429bbacaeff2ae3e7158cdf04cc14eda25ca7b3b9d10b4d35d9fc6871859a51905839d25fe38fbfa39726299935e7b563eae9a0e9a203e9dde605a7ca22d6176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8b85734c134d032df698e13f2a5cf23

    SHA1

    839c160cbac589d3515f2bc420fa5d81b95fa4b4

    SHA256

    b6b6cd447bd25a4b754fb44bcc368d4eb2a5b0565ce2cb129b5fa0f269322a31

    SHA512

    b3e5d16eeca32776004f81d15ee8f726f130d40291f74efbb79b277f8a4b96a8b82d19e661b195989692a5b00a2f9e033bf6f1baf5aec6518bafc9783bd5c7b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e5b95a810818446a45c9e6b27fa5f4e

    SHA1

    90c0706a20ba37b52bb805962e2b03e4ea83b671

    SHA256

    3215c352c7fdd8692961218b715a110fd3d5a0370fc66a08fa5110b0d374c883

    SHA512

    df7135dc35012fed7aaf9149800052c4f67a7b6798fc5cb29f68df19d0f5600c9df8fce534ebe49fe4f4f4c9f61a8e055badf5675b0d364c185bb82fbeb893b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d204dd164fdc214cce08e033db84914

    SHA1

    70bee6ca41ceba174fd74cb18b646c310e0f7977

    SHA256

    e3941804f246baa0c46b5deb42bb9d2bb91932c65fba1ebb3a807a172ad0bec9

    SHA512

    ff79b587dee3dca7512989c81ca56b68e78e11e43788da625a342ab84ae2c04eec37ffce16ac8977274d34aca95bf7f5c9685fe64a76386ca074e938355f3c5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a79922bc532651d2911cbd135cf2b5a

    SHA1

    fa6a0bd11eec08ac8cd054b8ab0d6e06b562409f

    SHA256

    459835cdfaef565a40a563ca7082a32d219f23eafbd9ee6305dd086492996085

    SHA512

    0f0c36f69fd4b1447c008cf26b162c5c8e91ac4a341080d333362f7516edc7a5744801d33f0f9104373a0257892bc6403688d317d683cdaf3d4740239b18aa85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bf2c6121a7838d1d4c58140c04a326c

    SHA1

    2fbd86729eb8071c01a20bfb1e386c34cafd7e0c

    SHA256

    6322d0e808d325f91a1cfa09afe2a6cf6b7a86b419544d9aa4e64b4223c5b1ba

    SHA512

    eb86b151fa1932e1ebfc303969b3269ba324328226bee60a7f15dab7503d14307c00673b5dcb2a33458cc1454cb8b526cc90c503d69d9f6d5e5863a3f380b758

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce459181036491305cc5ee3a0c3d39eb

    SHA1

    11382bfd744b42d8c4801144f4aa770a320d2a94

    SHA256

    8b9314e2ab4973aa0ed58093c08578aec0e8b6f9452c41f178c24839827ed8e3

    SHA512

    8d81aba6e00a3a68cfd27556fecdabca5aa26c90892eaa26a717cc924d42ef9753a417e08c9d2a70dd2f778eec69a308e9792b2a6b918c8b25b195cf66927839

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9605e1cae3eb09b1845581d1620a1dfb

    SHA1

    8641b983fca763dbea7857e5cf63cd8bf8f5c751

    SHA256

    a166f7cd8553e05f29d64413f2029c0fbf9bc800e9bffa983294c1650f6f81be

    SHA512

    00ec0e20d9ade0bafe6c3e8d438f1a66be3c89c02cf08b36403c41ba86ac27a1c85b4aaca06ee710bae3bc9652b79bd3bd6e088b93517e5aa6ef1328d48fcf68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8adf37173709f2c65e76f9d1ce55b6a5

    SHA1

    049b330ef309c441bcfb7d8e153cd3f50867e97f

    SHA256

    8b7994fb971bca1c7eb0f57e9543c16d178d79ba4fd7fe37d6461175146246ce

    SHA512

    40e50b2938fdf5b563757589acdcc1c54686c7ef695d8dc25356d4b754d8338589941acb6770da57ad82373449751f38e91d52471dc53aa6dc9cb3aa78cf81aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93c1cba5fb7d7eacd8e29d7115001dc7

    SHA1

    9d8cbca89bafdf4d308b1b549589cad23186c7d3

    SHA256

    61dfe58a0e7a45ce08ba16ca8b895a4a96d4205b7078618e9045ea7bd50419bb

    SHA512

    4de423080d0eb1af27bc8f55b140d4e05cca3c4fed32d65e0755e430d793f9638fbe897698b6c9255165705854b489089840561817362434da0e214451249121

  • C:\Users\Admin\AppData\Local\Temp\Cab1F27.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1F99.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b