Analysis

  • max time kernel
    130s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 15:39

General

  • Target

    d69d0f73458797429991b40b3206dc1f_JaffaCakes118.html

  • Size

    142KB

  • MD5

    d69d0f73458797429991b40b3206dc1f

  • SHA1

    0dc88ff5796b8c615c49c6715e573cbc2a754dde

  • SHA256

    6e10967623ad6a1e599695cb76751227e070bafb7af8f80c5e0c36c92dd37632

  • SHA512

    6512f5b6fdc8bbc2df5babd97c7e6f58b7d23730ce754ce924b98148525f46656ccd64e74bfa94c346f893296a9ecd4fd31b2a7952e3fea04fb1ed8e8fe75f51

  • SSDEEP

    1536:ScfMJSv3xaTXx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:S8JMx7dyfkMY+BES09JXAnyrZalI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d69d0f73458797429991b40b3206dc1f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b32b06ab1eea7d394353b2d0b9d06b25

    SHA1

    043ba2a816b3a2fa2538321724bbf72ce04e3632

    SHA256

    3d90597589ad16f23094b2a294a1fc2244a2602bd823789ae235f62b2fb56022

    SHA512

    3100fbbe56f119ff70908604bdd9cc202b770f36b4982ea4ed868f2914f8344c13358f278a30341155e0ed75ff38ca3e00299d5026704e1ab94b8474788a84f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f44462aa7ad595455579586ef2005bb5

    SHA1

    f9cecf15a092a660885ca80e3e7b22f5a3645de4

    SHA256

    9881fbcfecfdeca08d444f5af3e512449fefa51cd18671af2fe31e8d670966a0

    SHA512

    9b8fd4d583dd43188a6376a963da8f09a927880a11e4e18cff05fd2d8ba89893dda3effee59cec8d7e473be72c4716b3ecd0aaee590fc10cbccba2550e4306c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a71c0cfc2c858b5c2b92577348e58571

    SHA1

    3fb280b54af740efb9b17c181b55781b2f71a71a

    SHA256

    c7b2955a53a22781c38396b3b9b168c7dba3baa8087a30dc71a049876e85629c

    SHA512

    7dd288afef484471f0c00dc31f5fe89df39621b39c8a57fecdf7c57fe4700656c7bd1f2d5f1d6821f55fd1eb4a8e4e69cf8d04ee9787104327e8d0cfe6d6970b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b6fd53ac5f848b3dfb1a33a2c691257

    SHA1

    07edbf6fafb25a576776ebb7c6d2869edb81dbde

    SHA256

    70c2b15bce70881bd81b50af81fbe76e7e1231caa159143ef5672966dd4d3ba1

    SHA512

    997dae7162a866185424ebf6dc8a7a5e5159beee3c11e14b88e12155d264316aaee6c224433657098cdf1d1b113e641473796751bf97958f1783a58136777630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8af6748b9b6f5d5ce26f31796e55ed7e

    SHA1

    1fd310979ab403975d2867178c0d880038835a79

    SHA256

    51bbda37c55de5da6d3310d4e828040b1caea6c0897f77acbbd54327e4673446

    SHA512

    cf97ee365dd306c6070aa0c250f4f149af99a9d4f8d4a76b1ca24071147fdf21b24527e8672775844801311a5064aff2aea1ce03719d0064cc06ff2642b7d6f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    907dd08a9f381c3c3fd62650acbb700a

    SHA1

    1f380708db55c6664742e244ad6f988cc8586675

    SHA256

    4c54638dafa9b2c2010cb623fb66ef57fe719bcd7b77ab56876e84f4b5f48e82

    SHA512

    28297b1d9ef64304c4ddd70745e627059c7114581666f1c90fe5b7c7bbe725d5226a03ee112d57f1f9810427a2e3ab8cf7a7a75bdfa2b22e1129cca1e1641bf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffdb8fb4be5f62994d3ffcecc302254c

    SHA1

    27bae50cf4ae35dcee355d05aa7efc0efe48e3a0

    SHA256

    b3a8abbc3bf352fb0c6a1dbb5ced9878f70a6056e852f325163b7d3484ec98eb

    SHA512

    39b5477c62bf444215f33362091ec580acae0b3baca4a43bcc6e78432a74d136af3fa98dd7af1975154dce1effa702f3eafe4f6bd731d87b4809a501df520ca1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77dca12b6a60f2b61fa289a9378a150d

    SHA1

    a12f25c32d17193aadb68047f9f9d796adda1e27

    SHA256

    0d3a6086bb65cee55c4c47d24f63b2e32fac29c8d6bdc120e66bc3e46ba444d6

    SHA512

    14fbd17a8e96a97cb3380168909d9e0dc83f5177db1c895eb8ea19561fa52b096f049c47f6f654bfc66100b8d3f3714cf13df8a015b9089550e021af5b1d68e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48f41ada8a38ca7d67647df2ae6aef59

    SHA1

    6113f74ca1972d6b9f4c722cca5fcc7dc6608301

    SHA256

    531bcaaefdb5b8cc49892e94cea1fe9ba81d17d2c83f2a4960a16bc316cbb1a0

    SHA512

    83f5a8725e1e9d85852dd896cfbd0b6805774bf813259a0ace3eff3d986f040548cc839e2197d4edcc9e94c74d2c96c9035dcf43660aa41569b3aec1a99b917b

  • C:\Users\Admin\AppData\Local\Temp\Cab3DDB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3ECA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b