Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 09:36

General

  • Target

    d1a0be762fe71e3d1e695733d97ff19b_JaffaCakes118.html

  • Size

    18KB

  • MD5

    d1a0be762fe71e3d1e695733d97ff19b

  • SHA1

    71dd3b037bd7d184527a37d51c43d1ba9a537984

  • SHA256

    6f673f35a67f6224947591e853c5aab1d18801301c01ef1f0a7787480e78400d

  • SHA512

    20ef04d0ac19d65fb9b7b1c41a924ce1f0396dbd216c534daff7ef71da8b5c8b1706a28d7eb215b3eafd15720fe196e00ac8dc275291bf39bec92b99248d4a88

  • SSDEEP

    384:SIMd0I5nO9Hb0gEk4u++WkDYB4sv1gdBxDB8:SE90gEk4u++WkDYB4wSBA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1a0be762fe71e3d1e695733d97ff19b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2524

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d32007cf8c49bca6311e740e9b9012e1

          SHA1

          5a5107a312b729507ebeb255818b38f1f3bba2b8

          SHA256

          56b943cf8081a3b5e53edd057273fc1b0129e94e32fa9b8680c61ce84382fde7

          SHA512

          57ff594e09a6a5e389b6237e954ff476437eb9ccf4667f61c384283dfb458863da3f16c13cdbf1957d7bb3f9b833e5c6ba5c59f66b71b5406b43241a92622178

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2c519e448e23831f39818071424f1089

          SHA1

          df9edbed93a8acab98328817bd7757ac3de168a2

          SHA256

          00b9ef435de7cba2eb4797607700e819dd3006f4b8d2b5a6f017a1df0701091f

          SHA512

          f5ad1bd4b24d77f07f41e316a50ba9f8888ba30fff22d7f0be8af01a27faf7f868b71795a74f22b10960724532bfddc696edc776a571942e7ea552f3786295c2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fa04c80510c6160c82262413b2e99b34

          SHA1

          ca8e0ecd733bfc8307b85d797694e192c88d8928

          SHA256

          2b768b1456365ff76c228af6b3123ce6a5cde6aa132710892388b12fe15c637c

          SHA512

          404c6f7c6c771676f3e3d64b8e955b50228c8f37dc93dbba23c04e0b21cddb9a7373bc97db9b5c1f8a33f2f332db32c85f883f5d4e434b5186639d7fb3c6fb0c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          74e5121e6d63447c54f3d798798a1998

          SHA1

          4e119e90757e57d1881aeac177039236bafb0e42

          SHA256

          0a6a30643905eeedfbedb17cfb0ce7a0b570646c20543dd5a06c46a0e777425a

          SHA512

          3b5478d3642e92ea60bc0b02d259c6c915d5d243237030ff27343435fa221c5d3d83e0dc90d5152cbb3670c234b9d49699fa7d06808b4a952973262b27507c4c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a656e2ca8c97735132dc3b700825d3e2

          SHA1

          9e7da2c4151be47504e43954b76167f62ffefe8c

          SHA256

          9937609453e1a6ed1682691ef9a6790e603f8aab1565da1f60e37819232ec0d5

          SHA512

          289a4df92b8eef43ef3ee66e3b96a85097e3c0f1d24c46d6f0d2e4787a94f5206edddfa9c4c4e61fb3f5180a77ef3332009e28e01f193832f1c32e3acde481dc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d4c3d2a4a36679e05acef7b22baf884e

          SHA1

          ec58f83679616776971b9c1405923670f00a4bf1

          SHA256

          1b679fb37af8b6b9d4957882a36a797ceecd955fce1451978a23f2a308b6b1fc

          SHA512

          44a068dd3cdad48216d44e0aa2d2976b70a134abe1b385a700153d1c518f9bdd817818fd9023ff79a7af3bfeb745abc16d0b3cb106ac731f76d7e972e35dafef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0c9d0d6b6d915637e89ded16508b7869

          SHA1

          6ba5dbaf4e55b99e6b054441f266d0a4d5cfaefc

          SHA256

          457d86a3972da0a867405ea7022bbe3e7258fcc20603e74319e6895a848d80fd

          SHA512

          12a3dc5241eebfd510988939e945db81534e5cc776d043555055fdf5108606fc63387d86644ab34b0f8161759cf1868f95177fa9c960f7c670a7b9e61eb39666

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0e4c1c57796c2c06e301df41c5445695

          SHA1

          bdd4b025789dec47dd14b78ffca5d0dafbae40f8

          SHA256

          2edb40a55642987154427d0f6cdd0fe325c97779e2372c9ba09ec396a274d032

          SHA512

          976e7ef655db2f6a5f5c00f8109ba6dff7ea6550071f93c9424d8badb2d92c7e33a46c19b801446df80f1365d73d4fab67e319789a8c033b07b116b0094187ce

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2dd68e4680154f8e2a6c94dbfa0ed233

          SHA1

          d5258a949cb6cf762f28b8385b8b8436f07b7aeb

          SHA256

          63edd28559984de5da600724520c22b8dd2404ab56d00b4e5d0686cc2b3639f1

          SHA512

          a86b71ae5298e990685b76f1038cdaf3cbcf4d7328dc3b5b6a46940c4d21a0ee19b8bcf7da2e085f17eaae1f5107cc910e830296fa7e71de9fcaa3cf6ee4c1d2

        • C:\Users\Admin\AppData\Local\Temp\CabB857.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarB917.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b