Analysis

  • max time kernel
    90s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 05:29

General

  • Target

    d3a621badfc98be532b60c9071a72c0f_JaffaCakes118.html

  • Size

    460KB

  • MD5

    d3a621badfc98be532b60c9071a72c0f

  • SHA1

    afe287f27a109bd8060277e31e341676b8774e72

  • SHA256

    7055351c98e90394361fc60212921745b6852bb9a1a0d967b4d65416c8e32f35

  • SHA512

    8629af98c8a026b485d80e2c38f78c9e34863aeb406d7adfafae8b7b97dd41934f8149481e4a91d38ef87025b6ad4e2601b98fb86ecb06bdb72bdc536cb07f44

  • SSDEEP

    6144:SXsMYod+X3oI+YNjsMYod+X3oI+YEYsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3f5d+X395d+X315d+X3+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3a621badfc98be532b60c9071a72c0f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a675d4cb95c337ba4ce6a5de0917da67

    SHA1

    1463b4bca0d6255cc08f572c9af26efb6ea6b365

    SHA256

    627bfd72a1d3672b4a4365b75f585b4fd3cc1bc8966408ceac6964ccbddd54b6

    SHA512

    683aa9509a26499037628d879c0420e59617e371e42f30c5c81024770bfe137d766e505d4c196da13ca92fb02992ffb6ee0d7d760cbe43239164eff59df2de90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59a59b2a7d34de555b1f03022dde5db3

    SHA1

    92a5dd25621d04eb40ab3812fbb4599e59dbded3

    SHA256

    67a21fb252c26c4a806b112cb487426cbdfb52edf788b2acdbb0349cd329e1dd

    SHA512

    7cd1663468bb21c2c2353802a3a375ce0cd9f4ad44a53cdde31c0d1a950e33341c47b7840ed1caa9751067230ff0365f554771364d96135fab8e725508c9ba39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18cac5949f3870dfeea529a49484bf43

    SHA1

    1fc6dac02b9622213d583478faff6b1339bbb252

    SHA256

    020cd4f0b200d96c943477e969343b0d798bccd9ca89866a5eb88c6a6f319dbd

    SHA512

    09e26b1e36bfa80168fcbba50ecf735d64f09092cdb4d85e72dc833b9f45e1dee7f001bbb252b6ebb73b92311d4d7f72d2af37980682423a75000f2c21731fee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a10f5d52bda00d5f3bd6106ada88d51

    SHA1

    edfa224b0c62ed1ff6d7dd136ce158cbac8d3f8c

    SHA256

    4179184f53590d281184096c97c97762a506f785273e7dc5f06a05e0aabc84f3

    SHA512

    3da85544696837d737567de85c37d3d86ce993fcf94d2e2319a03c871d1259260c4209cfbe4e4cc658b7b730db23d83a680b0adb1913064b2d0495a72ba399c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    983d64f0d0c0ea2b3544d597c99820da

    SHA1

    6ecd3fee07ac2407317545fcbe152c30acff00a8

    SHA256

    86aede1da3e16264f213b61ddf58b2e058b76312b42f0ceec3311291843e49bc

    SHA512

    a06a3de9f27ecf8a0eeac242343f7a5f2891f2ff1aed31ec81282a62f90f710dbd7eef1e9df11186187f2d2d4b0b4c4165bd4f2836107a485ed0ac9821312aae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0530d2cc8421f45ac27522db54e28804

    SHA1

    f53dbb6e5cb29f5930bb0b5bd070996fa25ffd8d

    SHA256

    f41c813bdbe4e4c3cc72557416e9e22b803a28e63df1d64b8a89d57f788daad9

    SHA512

    8e5db306c95a3c5a454c0c12c12faa32c79d4e50c9666538a4a6506cc32b5b3776ac4fd80fce11fd373aeba5aba744ce9cac270ea970fd6cedb9d458c2e9a411

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df3bbce8079651820b347bf26451b364

    SHA1

    a393f091c8061eeeaefd4e59ea0c3f5cc1a19b11

    SHA256

    f6b4d90d629b9374758c2e008e8b978ccbac4ce974cab9b0d25c49ea86b13c19

    SHA512

    f893bfdf60110e201be64373f1231f512bcab066e9fe1a5a65571687000d01628730162817a43d4b6f5c18d4165c848f7910a0b4d137e9d1d79250f93fd50663

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ceaf3e1814bce1caa640c21fb5a06d40

    SHA1

    23d981d2d4c967929fbc581670aa7a4c3d003acc

    SHA256

    93026c7cc3e25fbe956c44725ce73c7d9afd7cd26372fd2649785cb42128beff

    SHA512

    07e2d39ef556a7e53bd6de070995591ca647eb0ed46f60900b723d7ffc0a69820f2c94c071b12f2505541464862827af3ec9b4e0e7f2a838137c6ff30ac9dd96

  • C:\Users\Admin\AppData\Local\Temp\CabF403.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF415.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b