Analysis

  • max time kernel
    120s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 12:45

General

  • Target

    d1f6dd92a5d5734d8eea5299089015e6_JaffaCakes118.html

  • Size

    118KB

  • MD5

    d1f6dd92a5d5734d8eea5299089015e6

  • SHA1

    b262f9409539432337b75129e9aa4986981f96bc

  • SHA256

    e9deb97d1298b52d742923e2667782baceb7241eb0e2697974a916d1d770a7f2

  • SHA512

    19c617453b24f10afa9d2f6339e201e64539f54646628e737356086dfb5c86b378f345ea66262a44ba2f8d00528f61ba82de773f82fd52e0c66d411e4d8684d5

  • SSDEEP

    1536:SdyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQy:SdyfkMY+BES09JXAnyrZalI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1f6dd92a5d5734d8eea5299089015e6_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:328
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4d95dca3af3ef196568ed9d4f395926

    SHA1

    8624220bd308c106b847f9a3a548d553abaadca4

    SHA256

    0f59b8ad573b32fa00d1c9086a6d926104fc9c307cacce563b713333f7ad2c5f

    SHA512

    c863f3a719e354d9d1e87759d243f8c7cd351c7c99d27eae39050d66597c6da8c277d88d2bc016f5ad4b85cec97cbb8f3e8d7a4d474690889af31223a273b3c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de289a1af10fb47f22c7de3a8081461e

    SHA1

    fee22390fddff88f362423f020e86351effb44e8

    SHA256

    03abea4069934df30c40bbcd3e13ae3844f479513f1fd70c5313097b0666311c

    SHA512

    9a0ce158405c9c55afb9806dd15c7329e83ba238a4996ae8b60feeee381eb565726145477bd10ad95c1db0f599be25a9e77bd6712094dbc65bed85f2bf45f927

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fbb4e76e74a76351651c07b2c6608fe

    SHA1

    e078d1c99704276576a4dba837f322c4dce3b465

    SHA256

    8b258d45d413b990ac692bb061adfd0e9254f468cd911437aa2e9bd76eb11bf3

    SHA512

    d034cc7c7f0b8242b5c61d9e79431ff9619e02f6622f5bbf27bee2b6423aba8f4b77a62de2ea34b9d23c7158a98cc92d490a9ab6eac173abd30a31623ee89a49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6eedd7487db6eff544f52840068f32c3

    SHA1

    560a4d2e8428d0e6ba1eb0dda163ce602011528e

    SHA256

    21746b9a836e0b520ab9b4a7b32f69d99e0d8891f9db34ca871c0c6f344af8ce

    SHA512

    d8f81971995af77efd5e780b7d7d789630047b08040e038de2ea3d55c6a5b1bc059728a01ec0d85346d426bd9d5aaf87d78794748196ed0f02eed1b5ed6be603

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae36ec01620d0555be55a01f533a7919

    SHA1

    ba41f7ae7fe39df35d2dcad3a4590163b05bf42a

    SHA256

    bda2fdb59536be14191e5260454f9c6ed415ebb897c6781cca8d3376caf82aee

    SHA512

    92321888f65109188bdc3034abbceebb1884073df133918e8eb0dd9de3d01819712c8aaf733139abec76c844e08b779f182dbcaa509209ed6e78274ae8801293

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8eedee4e6e46a4e0f269bfeadef83cd

    SHA1

    d38752e22b486ecf9fae1aac00d2190f635e7df0

    SHA256

    8a50c8aa437a02a5714b9e225fa234576570972aa5ee4ffa8dc8b07474f7aac4

    SHA512

    8144934f496d6b18ea0aceb3a111701c7aada1811920415c89472e0473e354ecbffb7d670fb3f3683a0972e44483271de647e834f3d270a71d8263fe08e546f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcaa4fdbc554c7a81c6ed5ee678bff30

    SHA1

    618270acbe95b83744f610105041abe6f289faf2

    SHA256

    cffdb768eb928dac85b30b8e01626e279abdec7166d7893dfe316bf5ebedfa94

    SHA512

    e078e03eb75e434d4ba6e7e0fedc0287b2fee5d0dd81104abf07146ad546445d99d1040a7bbccaadba0c6d8a47d4a5808c515b36928f5218fc043501e1f81030

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42d164e6a763bb59263978baae1ef448

    SHA1

    b2d7bbdf0997bfe3b813f244eab5a419b8c41760

    SHA256

    04ec416326b088a84c3239acf92934c5ce009cc9ec009f8d493fb9fdba062827

    SHA512

    9175c4492990648e8ab80389d91d1a19693a87603c70584ad50aca751040ceb34da9aaf8ed92bb12a1cb640cb6cde951beabe4df7ca0fee517e046bbd0fac13e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5fd44026b3b0384e0a9a92791163fad

    SHA1

    5950a1919b41ed5d574e3987c74ab97628a2d041

    SHA256

    da60fc300d0395c9b9c1129d591d4c1d963a47b010a8dde44732a2c37369ddfe

    SHA512

    5c7211e172786142e90f6a3162e0edb7d5ea0aa449f79c4ecbe65dd07b9f3d69c8f23441034c9b6513c50fe25071bb30ad55dc03428e44be43f36c618e5218af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ec30be49ff5aed5330c9e7f016b9636

    SHA1

    e0fde15c6758e54df6e18ae3a868d7da3db989ef

    SHA256

    66db521c1dab45c5243192c5a13149f1503382a7c38c5894e111d5439088d4ce

    SHA512

    af27fd1511a0a1eb14b0b4e31dfac505a6cac6c43b2eeeedf70ec8bc36bd727afc4a0962ccd32c84ac2579071d57f604ba6bac129aaf49bc9d9909a63ea82c23

  • C:\Users\Admin\AppData\Local\Temp\Cab2A7D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2A90.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b