Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 23:34

General

  • Target

    d745606f580a166c6119d9468cdf919f_JaffaCakes118.html

  • Size

    202KB

  • MD5

    d745606f580a166c6119d9468cdf919f

  • SHA1

    eaf3362f11bf0c8b0a912313ddb1fbe80d0e5735

  • SHA256

    cba68a4425ea573e303ab0d2d026a019cf8baa091e9434400643110ba1f84f6b

  • SHA512

    58aeb7d2775cc6789bbcb71c8981a64d6b8f42a1ac91d17b4d40ed223f9fb9d0f7235b9c9aa6aa1f47d802c89d69672c20758ec72b67d2ee450c6b4cca615677

  • SSDEEP

    3072:oPDpjyVgLkGtGX6OPFNPO9ifQNMQpdh129ImEM7zTSCHmcrqmQGzVA:oPDpjyVgLFwfQNMQpdh1P5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d745606f580a166c6119d9468cdf919f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe
        C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://get3.adobe.com/flashplayer/update/activex
          4⤵
            PID:1328
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:472078 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d0baf5c42e9e5db4b1eee9c9d7d9870d

      SHA1

      478d8a0e70d94f5c997f822541778dedcaf48b1f

      SHA256

      873b5e34b868990f4ea0435c4255dca5372c20af902d4019821a3711195539b4

      SHA512

      a684c26bdabbbbd7acef66cc79ab29e449a304d4661d69df1d655c4a4d7862a73e8f41be970a045353c694117efc5527880106dbf0a77e2d832f2b8a0988a90c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fb222bd47a8dd7c08ce29b6d8d8a3cfa

      SHA1

      b5b442c6718388873ceed9ed2153f93f4de6fc26

      SHA256

      04ac725b72198efe66dca008ae8152f6d4d5d67b322d4e4abf28adcfa4dde7ce

      SHA512

      3af30d63656df2cc8a88da1a854cc735a69c7fdd66b2ee87cbbae413cb11ea985a49ca267077805fe5feea6ca5925fc06b42ce38b3291b55244c421d35724c48

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cd82b78f236bb313de4e54c8d9ddfef4

      SHA1

      5b48ff33cbb60711060a8261fa0e4f1f8d57d6c6

      SHA256

      8700b468a1d93b387b252d214e0af4c6f04ec7ab67acd35a1ca7d4774b671163

      SHA512

      ae8687330d9b1d9b9fc548dfcb7c05bcc0179efed207b250b0f0910f37a7115e022d6e64c4a1cf3d9be4ac0fc16988091b51f948bebfdbdb697d45c19eb88418

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4dc34d538479d9044283a7b157d525f6

      SHA1

      49df8e2aaf16dc56af1143cb8c25b70169d4a2ef

      SHA256

      cd0fa0902a794c4c06e25b948cee30c91b2a01cf457d595ae2d86e6c71f65c79

      SHA512

      d7a4c80d45b089836e4c79db1385dcb24d6758a802ce9c2d9a1e7f3f26966b9a801102af4d0e468d31b18e6ff39cd4a303a6840a3521a2e6f36508d4b072cca8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e977b9e6847d9df75b055d2378ef1b21

      SHA1

      ae8aee4aeada6162d2cb0fdaa2a7f922480a2ab8

      SHA256

      66af2f5d470c0525acbd1c90624d933c3648377d0ea0a01d7c673f928d73cc6a

      SHA512

      1cdabfffe9fbac6353b1dcd31296dcb42401e23a0a942111230874c61b24f0f6dfb56f5b15ce4271cbca7f1263b068dac5cfdf9fdc773e7e2e7ba2c13ef3d028

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3d30ac9d4cef3ed36b04a2f081ee7fcc

      SHA1

      ef6f2b672ad56afcde52c5261cf4f78b23b49251

      SHA256

      7578f7c9c6aa9c49acc3f7831789bb10b68656afecac1f8fb6cdf4c790f07e75

      SHA512

      aa1170013f97fc14fcfe4e02a8eafba31e0cdfe0c597ebb165b970f9e09d48e5fe0ad5642fb1aa2cefc9543c02b4d7e29fe43bfb35d7863baaa74ed59c61e180

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5d9b1a6a84e48f02d04b125dac9d02b9

      SHA1

      2cff1a09abe05d51c986024103ea63fbe08e727b

      SHA256

      a1d6386ec34c61c067f1374a4508ad3fab8f027501769c7af2e01969d60ef90e

      SHA512

      d5480545fc0f3cecec60b1d89bb9c817eee159971a2769fabf19d7dbb53c0f5033228f6b313e950376d1364acb1ee52dbf0f152783a637a5e58aa1c8937e8d36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a2c9e271025c873cdb02f66fecfaf1f3

      SHA1

      cf2c9da17676f786bd9661d31411fad5b6a23270

      SHA256

      64a28a9bdf2ad9bff144e15a4b9649e28d423ede0061db6197cf3309f40a933e

      SHA512

      82509a881408c08b66f0fa86d236e26bf7b6d785a99056af83c63d4a60d3fd35c45f111a5fc3c064d07b86d806d8dbd8cb15fefb3ceeef2c551d5c8a29a90d46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      04d7f95fc2b339865e6355a050944935

      SHA1

      4b37edf24a68dc2db3c181f01511ea9d4a18c7ba

      SHA256

      9ab0949bce49b69f5d0b4976d3252a0040d2f7a253c38a3bec816c294a55dd23

      SHA512

      b1e118bdf2bbc6102b00e7f6d1601a9777c53679ad613d34920eb3d489b2b49683d8b1ce27f9492a24faebcb5540eedbbbecbc99ab65821834264677811d8b41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      75d2ca64191020fa00f86dc613fc56be

      SHA1

      c9f30daf7cd252dfff2e67a60fdd69d5220a36e5

      SHA256

      c52e126ddc921b4f6c5da7aff9e0ca434ced2f76408c0c2cb4cd83cd82bae717

      SHA512

      1e6a7b13be3d1c7220ddd54edb5b97779fdc2881d517db336e3aa2e2809c5edf145dc56014c3ef95153446036361e55df24d332594df4d4616497c0a16007bb3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9251ef7240fa45c15aa5da5879e96424

      SHA1

      b7b6b8a2a00b3fc098640a0aec0d5ce30d201420

      SHA256

      57952715700f8218229d530f76d1f8fbd793f36c41dce3defd2f97ae6fe7379f

      SHA512

      c31343a5cbf1ff699af2b2ab5c7ea2311e51141ae67cacce35f1b98bb3a036017c56f13543cddb2d90c4022263350bcc2a1359c2ee5a65faacff9e61a7de067a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c3d0bf62b2458d1336cae5d285cabd00

      SHA1

      9e2c2334cf1ba16cece2c831531bc70fb2672801

      SHA256

      a5c4877b7c6a0880d3d2a78e41c7be4347ab09c713ab035b57f961158e85d8cd

      SHA512

      362c5ab96fd7850d402f223d70b1bc0ca354ad0dbdde1e5436836c64702cdb5620c509a8ad15c8b8a26bba0ce26acf44df27599026a58d5f598efc40c7e5e1fb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      99a3ec11e2e6940b849a87c4fd245aaa

      SHA1

      4551beb058d0b501666fdf96dba9d88b283a2b14

      SHA256

      bcb01fc6fea443d5485c2047ce620b1988fc5fc792ca195bb7ae8b7f58ef5600

      SHA512

      bb76a90e713d2549a7914ead23ffd97c1c8fc1da20bdbb9d5c60c19351f0e3223d1267256e9bba8eddc089a5d242808d4df320bd8416a862f2bc0df181623d86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      160e4479179fb8dc16e447f9430eb8c7

      SHA1

      d6e9c1e561860021435d91b44b0517230b87f74d

      SHA256

      6356a24281a0c71184da6fb097e79607fd38f8d608b07d0dd7342711d53296df

      SHA512

      727da180405bd20063e9bb15c206070c6973244f365ed00447040c8a2bcf1d45078f2fc7c89ac571ee3bae91e485ef0a7a4ec3a437007bd6716d5c22147f8a95

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      77a61fd9ca9ea00101e7bb8a231c8acc

      SHA1

      7d5f39cf98e7a649bc94c7f59006d4ae311e2a61

      SHA256

      d9ae5fb807ecd625aa50259f18c168d95f2e06cc8370c4154ea9cc29a214a25f

      SHA512

      e44f49f1272ebf3cf04adffdda6133f4d80785727e32745af1957fcbaae3f3509a48e5596bc69e7b2956c76c6ac3b1ddd02767aa0950136535e620bc4a6470a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2b97b549ac2a5bbb18a98cadaff81b0f

      SHA1

      ba7d7a9399c0b5a5f2ad8794d341d72fb20e497c

      SHA256

      04d9afa7d85e33db2b266b7df7b2034227192514b68b8a112cbe307ccd3c29c5

      SHA512

      5b307c00c7166daf942514537c4e32b48ba1d4d317f0863fcf8cc6382b583b1241402556565283c32cb4f2556f864d2e6d29cebc4bf398ff24fba0c7206c6661

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2dc523e04f96301bd284ac8f7856ad1b

      SHA1

      09b53752f030daf104019bf4405691686cff4eac

      SHA256

      d6c8a69e54eab058f2122919f21ab9bbe21bf0bf72a61cbfb21609dbc9f88765

      SHA512

      a8c71502d2cd92687c6a14563df33b5c70fb48a1b0d0f4eea761bb38b423943fcae52e1ffcbda6d7a1747709efcdd8ce43db82a713e1aae744c3a8bfb649bc01

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      24934e5ed2ee8034589660e402a1c2fd

      SHA1

      b8c5e8df20b0d12b014092790c0b05039499bb17

      SHA256

      5a8874194ef1def010be7444810912e516f2fb21b14325f630def2c1fc65225f

      SHA512

      517a0dbe88f7e69a6cb88764b994784ab015f09dd4f7c883f72d91e0e7d86dedc6fe120f720377901ef3dda73c7bd47434229bd8d9254d322a16525de70aca20

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6dbb9fd1f68d84d1858329651cffcb09

      SHA1

      b34e77ec081b6b5886d03f8e999e2840bc3217c0

      SHA256

      9dae42f37589acb19c0578ff1bdf5ecd07a97f850bca629e7521a2854387da88

      SHA512

      6b5cd2182b8bc62413fd07c30fa97da06ed96cd5e9e22ef97f4e065640515ccb3c92155ff6025998645fd4907b78081588c31813915cf4a8b5044adadd7d7e92

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      53e1140f26b678db874da622cfe22b74

      SHA1

      5c90f635c13630fb9ee8db41d9c7da4e1e796eef

      SHA256

      849cabee2a63d45858e7ce122449413ee0e921d1da13b2856e67a7daebd413d1

      SHA512

      d673fcb5f5dcf0b95b0e64b391a9f0f73778eb23a98588d09067bbdc59b6ca23c299f6bb870fb2af21e655efdd1f59ce816a3504cf904d46797c9e66c10c5760

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      882953f57caf0589e19c14967c7e3a63

      SHA1

      cdcff8f5b4e8906e65e340973f9316fbc32dca5d

      SHA256

      9019b6705e5cba031cc8f80e7cb32603fa2aecda4dd085b80b8d59009e2a2cbc

      SHA512

      fe967aa465136042d0ad735743774c8dfc2081202d25c22468a0627185d73ed678b098f1cb74a15ed1a3bb51884337cfac0a3e773b86bac24757266edcb1ffbd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f41be75c754e1707c7fad43be8e8df71

      SHA1

      231c2c5d04e5346f64fe39c23c23a3add97f5a3c

      SHA256

      c273a97cd893a0d09e3346e46a7b2cc5686f7a1a06412fe727393ab144bafd7f

      SHA512

      b7861ebd4971ca44101f5ae982c6027d7d0b08ac6d7e9dbf0e152712f84b763bfbc18880c1a05f041b4cd0da08b814d89d6f1d6708f1ea83ab0ac0387f6ea018

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\swflash[1].cab

      Filesize

      225KB

      MD5

      b3e138191eeca0adcc05cb90bb4c76ff

      SHA1

      2d83b50b5992540e2150dfcaddd10f7c67633d2c

      SHA256

      eea074db3f86fed73a36d9e6c734af8080a4d2364e817eecd5cb37cb9ec9dc0b

      SHA512

      82b4c76201697d7d25f2e4f454aa0dd8d548cdfd3ebfa0dd91845536f74f470e57d66a73750c56409510d787ee2483839f799fef5d5a77972cd4435a157a21a4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\errorPageStrings[1]

      Filesize

      2KB

      MD5

      e3e4a98353f119b80b323302f26b78fa

      SHA1

      20ee35a370cdd3a8a7d04b506410300fd0a6a864

      SHA256

      9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

      SHA512

      d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IAE3FJ0M\plusone[1].js

      Filesize

      63KB

      MD5

      65d165a4d38bfc0c83b38d98e488f063

      SHA1

      1c4ed17c5598a07358f88018a4872aa37ae8bc07

      SHA256

      b1320e0dda0858c87971f7baa0d53063ad2a429d232fd06b0067bda8b9eeb0ec

      SHA512

      abf4c755d88193e7e05398b6f934fc561d8e2adbee7d2170af399e145e54a4a8a93988e4af4e28d6240c0bd1bda7035ae97f67a85a471088820baae8d89f3d41

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\httpErrorPagesScripts[1]

      Filesize

      8KB

      MD5

      3f57b781cb3ef114dd0b665151571b7b

      SHA1

      ce6a63f996df3a1cccb81720e21204b825e0238c

      SHA256

      46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

      SHA512

      8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

    • C:\Users\Admin\AppData\Local\Temp\CabA8CF.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\swflash64.inf

      Filesize

      218B

      MD5

      60c0b6143a14467a24e31e887954763f

      SHA1

      77644b4640740ac85fbb201dbc14e5dccdad33ed

      SHA256

      97ac49c33b06efc45061441a392a55f04548ee47dc48aa8a916de8d13dabec58

      SHA512

      7032669715c068de67d85d5d00f201ee84bb6edac895559b2a248509024d6ce07c0494835c8ee802dbdbe1bc0b1fb7f4a07417ef864c04ebfaa556663dfd7c7f

    • C:\Users\Admin\AppData\Local\Temp\TarA8E2.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe

      Filesize

      757KB

      MD5

      47f240e7f969bc507334f79b42b3b718

      SHA1

      8ec5c3294b3854a32636529d73a5f070d5bcf627

      SHA256

      c8c8cff5dc0a3f205e59f0bbfe30b6ade490c10b9ecc7043f264ec67ef9b6a11

      SHA512

      10999161970b874db326becd51d5917f17fece7021e27b2c2dfbee42cb4e992c4d5dbeac41093a345ad098c884f6937aa941ec76fb0c9587e9470405ecb67161