Analysis

  • max time kernel
    84s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 15:18

General

  • Target

    d694e5702fca8f19486b9eefdb98d393_JaffaCakes118.html

  • Size

    44KB

  • MD5

    d694e5702fca8f19486b9eefdb98d393

  • SHA1

    082dc79419111691b761db9ce6671d0bdff48fb5

  • SHA256

    3298d65406b1cefcb519bc2d887ffdc6410fa944a7e41501609c29873d630078

  • SHA512

    1d9462e320e600d4c46239771ce7c25a8b575d98f7beeb2fff69cd18f7876fb3c615a848dd950aef46b540ca86d2efbae3934c5e8f7c768923aa00cf8674fe11

  • SSDEEP

    768:jvoSFNgygrg5gdgCgzg3gVgF2J+QUebmz2dGZ2D928zZ/Xnh/XvZDc6:jvoSFNgygrg5gdgCgzg3gVgF2J+QUebT

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d694e5702fca8f19486b9eefdb98d393_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23df0ec40740c183c2c253666fdbd540

    SHA1

    2be282074f56f5bef0ec38e649d43a89cb821789

    SHA256

    7a86e1f648e7ff7316a0ab6286de935c01468c1577c3ee2160c135b11bda4f30

    SHA512

    70ba1de5029c20f0f2950239e9d68ba1a9ead2f2d304340ebbc79111af1d6965e904a49869b4c5c6ccd0ed18b36801701e0d765025babbbb9ccf52171b7b07d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    524b9e3077704d817077972127b85b3c

    SHA1

    d508343cb7a26e5293ba0d3485583e17d91f9cd7

    SHA256

    b94ea45e77f3c3738277d4aab15a63fad4ea3e399fbe4edd3e726e2262a830d6

    SHA512

    55273a83278cfad8f63b007d3313a15333b256a946cf0dedff041eedd867655353ab780b7eb2476f13f1b177675da81cac4d70e1dc4fe16793cc42a19f745d14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a9bc08a7df3b391d2153389a4a4c3ae

    SHA1

    89cc686814fa44ef9488a12d33f4f340028c7766

    SHA256

    5211e0a10a152bc29fbb9e0fbc047047e4f259737a86514f9ce0d4cd5c50bdd7

    SHA512

    c9e76ce66f2d06884e451c136fec7abbdb4e3ad40acb9eb2b9deb26c0a38a0c3b90b36eae285c6c7bb82b9893961dbb296739fbf8e3248a8ae0833eb777bc1b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80a3469cc7cc518bbbc1d0c9f531d71a

    SHA1

    b41d3038c3c3b1f1321b3e28d601db5770809821

    SHA256

    268098bee27237bb30ec93546dbdbf337b01ec94aa27d5608b25499b72b230d2

    SHA512

    973f17b5a74e54f47625b0478ff0bd97f7db8bce81b9d136ac3e1e93e7437b17c53411968d8d706acf3d05d2c175794757561ae89116c8befc36b7495a089adb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cebcaf6d7f98b0c01a193fa926fd7db

    SHA1

    24aadfa2b3983c4cb3a01d1a8a75d50eb8eb246a

    SHA256

    79e31087249a650a8ad3471b978d6696d47e134a4741f04115ec5bb9d92b8eca

    SHA512

    d92f54515f936b4587be0fd445ee55d9663c6f1e5c2ebd073e688c4a1793024a2d53619008c45a4b3176a417f909eda38735326912e5b25f486503781f91787a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5f9e61ea47a18a35afcbe70120fc0e9

    SHA1

    d539eed65900bf29c14bf25023bc473ffa2ac77a

    SHA256

    ee5cdc914ae48a36e0db199a30ab25e0d92b56cae88085b37d24ac61e61e6634

    SHA512

    f4e67e3b3a6986b134b11552554ade77483a5b000326960f2508fb8658ad8836310d9e0a752e19146659c338ab62141d70c6d6098da1d4017ede6db573045cb4

  • C:\Users\Admin\AppData\Local\Temp\Cab1B7F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1F78.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b