Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 11:24

General

  • Target

    d1d1965da3453715882d953e1b59f8a2_JaffaCakes118.html

  • Size

    31KB

  • MD5

    d1d1965da3453715882d953e1b59f8a2

  • SHA1

    0e4546520f1eafb070cb96abfd711f9610af8bc4

  • SHA256

    f5c9fd92120743103dd53b66b79a8fe5768a4d3dd9ba6ce695eb9322b9f7bf4f

  • SHA512

    9f05c2475feedf5fdf3ae0f699033210d617e8fcb8aa79a802aeb53f97dbdfd834be53a6e1d5f4767cd730ae3a58f464fd84faed2c970a044fcf04c2a61c1ef8

  • SSDEEP

    384:5fU+IeSSsJoio5IZQ8mMPeVmC7K633zmK2s+n0Qrt3um+qIYot3um64HC1nt3umY:5f8eEoX5IixPmy2nn5IfCdIwtfm19b

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1d1965da3453715882d953e1b59f8a2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8cef6ad4fc1ed739ad763c40519f9c2

    SHA1

    6f27ac4ed968eb06823e266df5b1fca5273afa61

    SHA256

    cf5c74d77fcfa1bf1fc58cff1b4a6fcf8133ac900bf82f24b3ec9c83b9abc074

    SHA512

    21a346f0804c74ce40b86a02d40db102599e4d3b67036dc0eea4a08c6c4a5951dfd07d8931a8a5021ac18a0431f3bf5e25d839c67b1dc7d7aef3c7cf94475aef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0fb04c3a18d247cbcae929c7eb11c57

    SHA1

    9a27b0038ea3b7d126a1feec36371af6ee5dc3b0

    SHA256

    37075779ae86e442053527344c1dd4dc019c76c5dbdf40a0083b4e6133be271f

    SHA512

    318fd0336ca77cfe03c1d0eccc18d7d1fa0838d3e3a3262989bbce6ad2cd11347998890a301b70ec49cdd59c5999c87cf52fabfa2f999d2309402d9c36e9b136

  • C:\Users\Admin\AppData\Local\Temp\Cab22.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b