Analysis

  • max time kernel
    147s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 19:36

General

  • Target

    d4fee0b08de506cbc7e7dfd6a6a0b763_JaffaCakes118.html

  • Size

    139KB

  • MD5

    d4fee0b08de506cbc7e7dfd6a6a0b763

  • SHA1

    7d39728272daacd90cf8f0b533fa303754db4393

  • SHA256

    dc884dbe7e2fadd2ed73f258900667357bea93bf1f24939932122c4499d2858b

  • SHA512

    35f1d97e12dd06715bf471cb2b655dadf3e49448a37ec685d970b5652fa0e85bf95929f8853bf80ceb6ce1f83130e5e63e9c05a244db782134e30d810face02c

  • SSDEEP

    1536:S4P4UIlZQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:S4qQyfkMY+BES09JXAnyrZalI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4fee0b08de506cbc7e7dfd6a6a0b763_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c677caec6c2c4da2724e9e5c54f3f56d

    SHA1

    72d35c72ef7b5b1a8bf87ab00bb8495bf1582fee

    SHA256

    60f3e9b9b9c7e8c11eca168f33f04d9cc0c30d80310d5b1d11dd9c079d36fe54

    SHA512

    80040a76b6165c957d3862e7b754d7b8ff9535edbce30b312802c249c8cab0211b87c47c98e3a05fa449dae76f1802a9c3b4712ea80a6bd8e3ca1d88c4a6634a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb2a75576314ca2106b96e40ca028c45

    SHA1

    f7ef06659790dd1d0df582b26ce01401debb0c38

    SHA256

    8b12f704fb11c9eaa9c30a14d91f836c333693809c4977814955f30983d123a5

    SHA512

    953c82167913ab11f24eecc5858bede835c5e8795be44cee7bf6b4bfad3fdf08acd67d44ca3312788fc3b335a1f3f7e88918cc7e7dce9e86c13950beadd657ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12412c51b40aed395d0c863d22ea7e12

    SHA1

    a7a7f908113f77b1f26fdd132c6e36c18df6a9b2

    SHA256

    451ac8e6c754ab4705bb9bbdb58606135acc175568785ea99e58392718a05fad

    SHA512

    187ca30363c5da91063eb5182b408a3213d02aff239b2768a6e10bbd57a6289066378063c5b88f3d4abf38240846b28418cfb31a32e7353f3feab97e27c91992

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac100f345440052af71c597e69058db1

    SHA1

    59d768bd65a6c704c05e7fd59d4fe69690e6ca3a

    SHA256

    2d13ecfc34763a17b578e9cb32d51af73cda021ae63c72c00feaa40020cfcd24

    SHA512

    ac5f78e509eca9eddb186557390780d7ebd7b672542ea9a6a1674a90048431c8d8787674507258cbce1b27e2fd42463572afab28045ba9adc616582cb1935a86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa960caaed7b2fa62c5d0e9767f35ee7

    SHA1

    2116998d99596ac5e7ed17f2d56a9a21e5d09abb

    SHA256

    f939835da420d48b86fa134023da270536679b02a04622b44835484f189bda09

    SHA512

    bfa6591c3d8677559d103c2875d49660b1ee9e9288e52fb797b70511b04d89893a8a1c5466c5aba7de982307300835b5dac480ec6be08c7ac4efb91545c273aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb8f46dfdd18eb96065f07b4fe61391e

    SHA1

    61b66fdbd4e704d1e8e46dfbfaadf416204d8c50

    SHA256

    e404ebe24c0b5e25e16f6e082b3444a9a21d450e4f15e0958ff03389de360ddd

    SHA512

    f87b77cb73a7a11930985eb833640ff0efe42402c77a1dc3e67d1755c4d1613d8589f0a8d607566da9d6f94eabae9d9f617da885e865cae42e55e52f245e1670

  • C:\Users\Admin\AppData\Local\Temp\CabA72A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA79A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b