Analysis

  • max time kernel
    135s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 18:08

General

  • Target

    d6d80a5ef6c0e6f7597b747645beeabe_JaffaCakes118.html

  • Size

    28KB

  • MD5

    d6d80a5ef6c0e6f7597b747645beeabe

  • SHA1

    86c5e1c927fb9783b7e8410758dd2121380d8203

  • SHA256

    2f3a53372ec0fb694ee7260f3062f0a8adfe7f4c6eea59fe7e76c9ea560fcf1d

  • SHA512

    583606b2bc9fbcb4c70ea76e5fc72d805ee309903ebd7ce0791566d1ae69fd7f2c8866be188de841dd80d3643a60d3804be2b5219ad7a83ed535f8dbbbd32187

  • SSDEEP

    768:Zcd9QZBC7mOdM87pC5I9nC4WwGwbwCcPd:gQZBCCOdf0IxCJwGwbwCcPd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6d80a5ef6c0e6f7597b747645beeabe_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3d9907d88562820e62e87b52740446e

    SHA1

    cb3fa53953c8dc53eda41723dd155a6a5f2de3de

    SHA256

    7028ad02d07b797d538eaa1a3b144b43ac43c9f18248789ff38e5937bf1a11d6

    SHA512

    d5b4926060633aab057ace91bafb7cf0f5440b01bebfbdb6a6efe2198c83e45fedc31d43983d5b83da6825307bdf39e0f5b65861f6e60a240e2d7e1168e05340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06be772add75b3d30cacda868e7a924b

    SHA1

    da2a3d1469c07fecdcea359a8aa134b797085283

    SHA256

    211520be66143237ccddfd70efb49a891dcd46f46aa5d499b5ba60c13f7bb3e0

    SHA512

    c4fd381dc5ef7e5ad3b2689edcadcc2640ea853aa90460f045dadb1e5d748c4c2f6dee20503ee04e362cef47104a7a0d5251d21ff43366aef7287dad5c73de34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea670ba4cc28732f041749f0b5998f4d

    SHA1

    89677d0d7dfbca8e91f9da02a0218a500f068430

    SHA256

    fbd19f65817ceb2d921f9c25b070465b7afaa0479fb38db22575d46101115af9

    SHA512

    bc8ceea5991621c5fa8a115c6839da0e450fcc4ce56eeb30a84733853c2d9d82092b38b87ce86b463a86cdfae645116ea0ee0b28b1ab6015ee52073c9ea5add9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e02e31b4c8ba38dacbf5a8385834871

    SHA1

    14f3dc96c2bae9a7b021ac7d49fa42e4610fee36

    SHA256

    d9120dad80af715682d7f08d66f4a840944788b7692c1ee2fe2d407de819a548

    SHA512

    48191dbdf90b12d1acffbee392230fca45cc247d4c39071669c6fe2791678d349f571b152cd59aaff3475fa1eae7f2b9d43b557dd16e12dc1ef9381d54253244

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ba9fa66f3d4a3c7b5d301a10b921432

    SHA1

    21967b18cf3f7781ad3bd3f3d850ac3694903c32

    SHA256

    44df063d0978b26e4439cd2b3f17d8f4de361d124a1352e61a117e5f3ab5b7bf

    SHA512

    8455e0aaebcdfade0baf922adb23ea93c6d287c985f50b9217dcf0051452f74439882389e4c982f9b67874d0f93c67f4b27e6fec1fede72e5d9cfd52790701ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00ca9027eb22770238d68c225e1b4bee

    SHA1

    d8dd133d18403062b51922eea4c3de1565b96c90

    SHA256

    5a5613070dc12e27980d7707c02f0a53c2dfe3479b5d22e97b79e73f35b40acd

    SHA512

    c14d63c1541fcc8c2e0d15dc595b3918b50a869c333a3e438e08972d55dd19dadc663b12749793c9103a4f8546619830cff465820e25861f74d6740ad4d5f690

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38fbbfe3708a4540c5a7be663ebc9001

    SHA1

    84ea538c8e0ecfc8be122f0f6c18e4cb2cc0d7cc

    SHA256

    9c40ac04d829dec91be0da0287cec96eafe5e9668ac59ba9d5dc62371aad8ceb

    SHA512

    0a52cbf401e72859cc801a6a61be21aca30726de21b16a0b72da86c06887cb1876e6377d60ccab72453523a3b205378db68933f248f9866a46e0aba7d97289a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac6bed191db7f39b578ab2782aafb235

    SHA1

    cd002d73a89ea0120648e7d495d10f8bae0d9d1e

    SHA256

    cdd1cb0ddcc6f4e36fca1cdf8c4c5174846de32c08d1506bb5573106a63589de

    SHA512

    11c39a188203597cae4007443ba918454cc64b4980d20c6391dcce3bacbb5cab5bdfb9cd9c475c99a6635e7c46c432d92435c157e7693d0f491633361a2f45b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7753405a3aaf0a66315dbc26cdbddb2

    SHA1

    cb90e4b080026e9f49a60ef857350cc71322f95b

    SHA256

    76ea312a37f345034c7f31b41be72187cc3ba08a7a158389761b0c7705325236

    SHA512

    a1a6564ab31532aa0fe8dd64dac2f0af6f1191d5bb007f5ccc83b56dafa52653186975e8514443e940b00c2f062b1d136206c26f459545c685ad265eef52f650

  • C:\Users\Admin\AppData\Local\Temp\CabE477.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE489.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b