Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 00:08

General

  • Target

    d750f20d851768709a79645ea972c86f_JaffaCakes118.html

  • Size

    8KB

  • MD5

    d750f20d851768709a79645ea972c86f

  • SHA1

    1e0c2e88cc27cbff0bfec01c2179d22fd2226529

  • SHA256

    2f0dc662338437af8609567515bde21fe7db15b64969d57a772c169f0e064043

  • SHA512

    c9870de27eb0abc4cbc2f186bbb0bb2a471ee4933deab047ae7c056e47604d7fc9f0e330a688b4854e8a43d929edcbcd2dd3c3180a2fd3b5e11b011120f0f2e2

  • SSDEEP

    96:ByzVs+ux79ILLY1k9o84d12ef7CSTUzBkIIwvzR4CIp7ncbZ7ru7f:Ksz79IAYS/HvOJgnq76f

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d750f20d851768709a79645ea972c86f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e304c18f03a63fbdf341a1ce55684a0

    SHA1

    b726315a101c619077a1d8f0312fc51406895c37

    SHA256

    8dfaf99df7bce201d827ba13fb05922305f93b956f294e01c37a94ec9bcbecbc

    SHA512

    186d3b772499b1b0e42c15cd94a1c9ffe2be5fcb04ad348efaade09522b86cbf700c68665f89f73fc7f33c623d9e565752d328d1423dff60dbfc7a536602a64b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd15bc483552154bfe276c6af92e8fd5

    SHA1

    1b2bbf69a3088a42acdd3720ca429ab27daecd03

    SHA256

    b2927f012faa043b0f92a86f607649cf028f9294d99900581137e4ca3cc97484

    SHA512

    624333f6b64d569a1647e0462e993fa42aed8182c0f953312e05af85a8a3de42d8c4b0575e7bf37927743d510f56cc93dd8012d97a64d9fcd236fdc772b6e4f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e9c0525629122ef4a28496be377dd72

    SHA1

    751902d69179d6b97f305f9daa268ab0a5fb8c14

    SHA256

    341cec42f4e6811f136d5451ae0a44c389b59433dd6e94038a31d2d0f556be72

    SHA512

    be3d0ba93db5f44ff559ec52cb9dde6311616a7f21023574e4fb8165ac41d3d23f646b5d12ed7fb58f111c8cd1b23206e6b252e3f72fe897bf92082292b3c1e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ccb5af7f85536482350f998d1ca09ab

    SHA1

    76e5e4f8615463093d34f5d5472e8626a4e4f840

    SHA256

    69fd4c25fd2a65771d3d09a9875d84c797ca0ad967117c0ab2d1d57c828b9889

    SHA512

    939203ada1dacab35ecb8f8b71212aab27f25ed6113c42ce246e865a3bd27c0abb1dc04763858688905e977ee6a26ea5a5b9295054b9c4e10740ca347ad1b2f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a36bdbc68d634e20f274ff709b34a25e

    SHA1

    d00a6ba6e38e1bba5f99c70a4544cdc6bdd5df07

    SHA256

    ba4029abfe8606f71dc86678dbaacde1d55aa4f5a1c499e4157037c83947a212

    SHA512

    755aa189a511b0d048c82b4bd35192f476b9cb92759f9de1d733608a636d25c910465926eb6202892d39f9d30053480b699571995291aab86b71a970a4a81bc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63c2b38d502741da302ab1fed599b760

    SHA1

    ecc4ecda64d3b6da5e70285526c0407fdf0f5505

    SHA256

    23e748073b81ad0329d3b5a593e21c94c4272ec17c027f5ca6f7319f6d0d2829

    SHA512

    4d31390bcf0c582f38ce071e7092b452870d9c47da5324d15943e34d2f02583099eac5246085505ee8c96b0ea3b7a6d87156e17bc581d32cdbb37c785e8f5a88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27634a8aa6b546ae34183529e00d60dc

    SHA1

    88bed8c85951605d40fbfc8be4b7ead98f7f4120

    SHA256

    86d998865411aa00cf9d16308332df9551a2d635f42335850f3bcabe90dda5ab

    SHA512

    ca8bb37e7343d9513970878c076e5fef5b4711486c44bb875a65ea90647bc72c5564306de2e6c9140bf46cdd50a56204b66b83b985746906e73f90d60f8fd2e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a555088fe79596c5825a1c8a8defc4a3

    SHA1

    267924a30f2292ac6c288e8c719920f84219d003

    SHA256

    067279aa380a2249bf3fe44d197638778e53faba26a0da5b6bb313112fbd0557

    SHA512

    54a4674550205b51da264b0dde3720e8342cbe532dc15955b41706c0ebf6714b4a194daafe05b446e1e85e5225d28e8a58d3843c33e96aad441702f17fa5699e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d7f2f594b0b1047f4ee14113103aa14

    SHA1

    54f91a7ccfc798abbb37764595e974705faa13f2

    SHA256

    f544279bf008c21a4a09ef82eb296665ae1708a4c8b41e5592b6550b3b26c60d

    SHA512

    df91f4655e4a76ba284fa1fdfc05ebf59c0c096d6eb3ffb0a6e87c780493e368c2c814e955541e36e876aacbc267cfd9faa0185d9e42bcbb517cea6e926a0e47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c19f714b6175f7217d7e4133b2813601

    SHA1

    fa99e68456a572aedc4ccfab8e5957cdcc7b487b

    SHA256

    1dd87e2a330833a58b30998b264f00adef85119246a97f5664c49f85c58434e1

    SHA512

    f8c57a161b5d3099444ca287b2d909ce11c5067acda606e2ee0fbcd7d1fbb317fbc47000451d14fee9c1a9ccd582ee0552cac1d8e19c8bceb8d063046cc9916a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8065b3852082a04e0a279bff1d175e95

    SHA1

    77006430913a30581cf36a23929967e6319257d1

    SHA256

    fef625b5e8c330d507ae9042b9d23ab2775e0f862322f685864b966538d8262c

    SHA512

    11a37dc84c6b4694ae0076146c7983260eaebdb27a59f271762827ad09c70888a40fcce99efb1b957f7d1d977f1243b5964266a1977c32703b79ef6c19893e24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    998550f1ea6bbe9c158af2063958674e

    SHA1

    6ca4937f8a3e6eeb62a1ce96b2b961ae2390b137

    SHA256

    25188fbbae1bba1e8b691f04702fe5104ca91c90fccfd686aa074b1217083d3f

    SHA512

    7f8e84cf96a8620a59aff7e643553469b06c52ff3c3d5b040b515374be66ea33e18f03ee370212115cfa006a3f0ddc4600e1233c63675f0c24fc4b250334ce9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05560f790069f76fb6dda99b5e16cce9

    SHA1

    a194da683ccd9296271f74ed1ba2f67b4f49c4ca

    SHA256

    ea1e7c4d2fe1f7ceb9158be6d002800d9be328bee1518956b317dcbebf5e9931

    SHA512

    f923c5418543607ea00a6382aa5d0648555b0a683d19e44f38b3dad13dd44a552c5c0530a494c14944511e994c5614c457e5813f8977eaee4790073403e21e67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e82d54f6a4fdf28e51baacd5ab065f59

    SHA1

    47ad1dbb755d7704e3cc03b5a71c3edd227d2a7c

    SHA256

    3ca174fa263cd731cc7b249ada1ec4b5f9e1b6a792413162da5cf8397dc47cd7

    SHA512

    03fb65aa65d6a16b4ba2f575dccc25e9348f49c69b673ed661d938f937e5192895c1eb1858ff193cee0164c512fc6e0adba3df61ecfc59f7fabe05a683f0cb4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f93414d98db6840f6333bdc9dc839938

    SHA1

    e3bb7453a27114c240353334c5843105094efdc6

    SHA256

    b2261ad97b6a3c64dcb0ed85141e49b752ea3aeb8bfd9cc4309d65fd510e48c6

    SHA512

    c56432c8c3239a96c8bdd288d0b124d0c6ec71882a759640cf1cffc443e8faab9bbacec04f1e7503baabd3e74136b53a0b55c0d2cb8678562c7a384efafd8928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9f31a6d9f80fb1fbcb50a2aa8f7bc86

    SHA1

    fc5a0e6be582983b0fc22fbfc58a7516844c51ca

    SHA256

    808da22ff4d9e529ff594ca7320a5236ae0a586cc0d5b3268e19801f9cacb040

    SHA512

    fca9036a79d12d1d0059030f42575677bcad8e2993c20fa8c0b8b9425e670eefef2c3aed3420b0b50792f7492ac68e8ef3482c83ed9b86e43ef1dd86c917071c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b75fe9e11c1e6fdb2ae30b033cac384e

    SHA1

    b1f58a6af4f6fe75b558eed4844a574746561d79

    SHA256

    7de3ce6a154953ac916d06fae605b3dba9c9ad40c5d4d72da7f1a6af03f5d8c6

    SHA512

    ceb99db358025b865aa60b09e92f039877cd5c55bf44f3a74237cbd346e291cacaa02fa836e3ab1b93c2615118ee293782840866319e7bb6a2c1c3fea4ce4650

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    563ade11676c1521bc397e4524409e9d

    SHA1

    cbfa349f3eea7dd39aeba0a6772ae1fd7de1878a

    SHA256

    8088fb270526ffa0dd78e2dae41d99848bd4a22d4209adaac17b68991d516f5f

    SHA512

    12069e3bd2b25e44f1605ce4f94442480a2cf52e53747d134bb605636fb7907a5853b60da140f67b53d423fdc1091a5a571e9af7f4c2a89caa5a2cc447075463

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c4efce5399075f2094fc173e14e9a6f

    SHA1

    3a7e27e7fe1814f3bf2ef840095c989735cf9ded

    SHA256

    2ce038226a0e8f02a87638cc8ce192a7747ddb1c614beadb3f5235f273e0ff9e

    SHA512

    b996951302574c22c1191dc3a0d60771412c2fced40f41d17d078f6b8265f43023d10cf004d3663a8836f2fbb7bd9144cd3a445dcddb802e8269366d5c286230

  • C:\Users\Admin\AppData\Local\Temp\Cab50D1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5180.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b