Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 10:46

General

  • Target

    d42dbec6364cb0b72d3d782a908beb25_JaffaCakes118.html

  • Size

    53KB

  • MD5

    d42dbec6364cb0b72d3d782a908beb25

  • SHA1

    c2febf8821e7bef0979d1080852569540be1727f

  • SHA256

    b9c614849119c3a239560ccbc0d3cc630f0cdc4ddb3ab0824b89e5eb6111196e

  • SHA512

    064f9b9df6300ce6363f97fb283f53d3afa01156a0628c90683c8138c61cfce0a5bc89fd7f0e901a935de7c6543a1f4a77fa4642f0a1d555f266b46a37d2df16

  • SSDEEP

    384:swkjd1QU7cibxOpBbYPjOOsDjihQHZF/ediSOYlZF/ediSOZeyiXdUgpxDXnc8af:swkjd7mbnjihQ5YDZjsxba

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d42dbec6364cb0b72d3d782a908beb25_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46e36d9f42c9a2046c3fe3b7017521cc

    SHA1

    1b411dd10a1e0163287a2bd020f56a1c24c318c3

    SHA256

    fd7c7b747742e7a02f15d24aacc1bf3e670836cf9c6aee4a7ec769c98c18bcb1

    SHA512

    6a0a04666c58d8fc9f2dbefcce5af97770d0e3befe1f06ffab1e9f7d427cf63c5dabd5ab30fdf01f8749bfdb6629832bf8784dd469c03790dac2a48a7e5a99ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8f2153b2ca090365445887667bfc422

    SHA1

    a92e9e856614b758d41f14123ab78245a2512921

    SHA256

    4d1746abcf0decb93be3d7013d2b72a062e6859962c979e0411928d373833a17

    SHA512

    8028170f633a339cc009f4a8c38683ea7d29ae1ab85fa81f245b34fac9997f181f70e40ce4adb6fb0a11fb07bd74942554fdf866b0bda2bc68c4ad80d1f3955a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40bfa7a3538197c8662c52dd19788617

    SHA1

    52353b3dc3f10970181becef6d93fbcdd64f966a

    SHA256

    896b4cf26acdbd2affdc5f61e28d605ce260f8898691348bbeb781eca1978196

    SHA512

    df9d30c58dea847824cc975d455ab315435c2a7a8b674ea23b3f1b7beaef6b622abec02beb877380d4f4c513509778e75625f053b3f774544f754e041e3f6e8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d571a34752a4e56233845f5671ab90c

    SHA1

    7df9b5c003198d51564fdb73227bf969655995f1

    SHA256

    45e79a9a4afb81989cdf50f7b5802245d73d4b233231b9585db8f1433ee84e12

    SHA512

    3e4c719ed43592bf3eb318e03164c8878ab9c64734798908c755241f89b0f201bbfbffe437b7cd02b45664ffe24cf7c981ae30d88770d281a3e516d046688ae2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    273e529796a61fb70d72b134ab30213a

    SHA1

    09bcf1f47d3d0e474b1125b3f39d708ad862cf3b

    SHA256

    114c4697a33b42c87389c2b7dddb5efc3af61a0f02df90b07a4ca70bad228fd6

    SHA512

    e9356bb387a16d0ef6cf9b4eaaef6b1acfd6b357af1e246e8f04fb0270c8c5dd677662287b68722b5858ad8a91ed62ce85fbbddcf48ce3fd7ea8fbca927b8d01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5585569b97bd9dee49b3a6d2216b56bd

    SHA1

    1d77d74b9da9b2ad7c21a6a817230c04a4b33084

    SHA256

    28dc7904c3184cc40d76937174e85c701c681041943d9001892fdb11d8d100c9

    SHA512

    f871e1014ea36e6d9cac876bd37ba76ac832e2201c0b625035e95e1e4e353402ffc86ecc9c5c05c3d4e5ab91d9edf72b1113936ebde5322f2bea69c8adcc3616

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad63043e3229da4b19e0b71518d31efa

    SHA1

    2dfae1afbe38106c0ed71bb16f8fe6c2d71bebd7

    SHA256

    93524ce8c66befdb64e0487475f08687ce872423247a7a6563f5471f12006b39

    SHA512

    7cd33404ab2676f9356a26be444e67cb0cca0ee5e46a7bf188d7cb39e2039a83d6a0e4c84c09f9bddd030128f6e130c87119936a600acfd5afb14c9f5f71ed03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ac89deac24ee62a03bb8c67e2d6763b

    SHA1

    1ac49bff29f484e520b23e0b43a2dacfe920e77d

    SHA256

    75ad172ebc5467975acd1e2c66d981e4a085f32bc6f66a7c8adcb46200394b34

    SHA512

    4dea30057723cba45323abec2dc38d9dd9dee1c7647edb611a2ed5693554cc5edf845426310c1cc863a9659563d901ec9ca866e5ce45fa182769eca3e277eca6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a994647ae69a4e7fab2b8e7fc850213b

    SHA1

    737d0b35047a82d59e69de195a33be4f7b47edf3

    SHA256

    950e2fdf2497e4269212bcb27d97b149c0758f060623fc679a8f41475d1242fc

    SHA512

    e52bdf502f4396d1a174a02114de0bfef84f8c58634e4f76f18acec12367e478e542501cc09cae56b3771252640dc13e9614b2ba90313ac03cc16d5985a40cf2

  • C:\Users\Admin\AppData\Local\Temp\CabAB4D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAB50.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b