Analysis

  • max time kernel
    143s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 13:39

General

  • Target

    d66d3da6457918ed638e006c7b1d37d6_JaffaCakes118.html

  • Size

    59KB

  • MD5

    d66d3da6457918ed638e006c7b1d37d6

  • SHA1

    7fd931d1439a9c6c41605c8a8ce007b90ce90830

  • SHA256

    198ff5d828eddcc37da508896436c1ded20527d18520bbf85c65f9531c557883

  • SHA512

    9c3dad3ab71cd4b2eee7c5e980312cc10e1e4e028103b338a1c6b8e5c49976bab6e269a5ae1866712c873cf566568553d40057bdb97a246691ca3d73c21d4202

  • SSDEEP

    1536:gQZBCCOdTKp0IxCMan4+REXCM/AGP9t8dYRM6N+EBCPWSzxUdp6zlZcTjhbyttrn:gk2u0Ix/XCM/AGP9t8dYRM6N+EBCPWSB

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d66d3da6457918ed638e006c7b1d37d6_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2750b08ee0aaad1b54beabf893a30582

    SHA1

    3607022c6d6b873bc252df59dc2f008d19361504

    SHA256

    43bfe322f03df0fafb54342c74b483071ba99e5fcb2f4bd7b09079f88946eccb

    SHA512

    613ae4d2bf76203c4178c1a86354958a5e3b9b2dff3493770a0510befc18d85cb330f6a10cdbf1d59e8c3efc49b0d15dc4e39db9f003399716e0b144646c224b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abdfb588ead2c9a635fa2d56dc9989fc

    SHA1

    5b972837624d1483727b955a2cb2c5d790dec6c1

    SHA256

    04a211be3de4d5a23acfdb4fde1b6f44e15463ad591c6280f41c99dd5bab9247

    SHA512

    b1ad74e2a26281dee115c3e9d3240ae53f11271696b3bad7fb7a672e86a77c60457e09e0ad9706dbb62efa366c329c38471c372db204664e2429306ab042a3f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0688c9f7563d25c6d6dfc5d37f2b68c7

    SHA1

    a0fd85d9bdb71c9d49d70c89572800c9127fa2a8

    SHA256

    7384be2e2340c9a50b15bf44a61d473f917a3c5ad1469d1729d9a9bebb2071f3

    SHA512

    e800a06621d59ab9c656886e0c6e82643a447e1ae1b8f672a3718e8fa093f9e60be0dc58f7fd0f5e283f33492400e58295d1332815abdbdaee47ca6cde48d521

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0ea0d7f85d556a8f30022f1dcb3b809

    SHA1

    2d2806f050424b5e2538ecc25719b6f974dc3481

    SHA256

    d486b162b2057d3dc09c599816bdd9120f9580fb0f250a9757f1d5ad973f625b

    SHA512

    55afd7929eb64b376ca32021a8fb45f62762dd75716633d1aa91812cf813878ba942cea40421eb486e05cbb57b8245bd43381c710e07098173b89ed91963472a

  • C:\Users\Admin\AppData\Local\Temp\CabB119.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB118.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b