Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 18:04

General

  • Target

    daedf8aeed389569463b4d7c41fa837a_JaffaCakes118.html

  • Size

    12KB

  • MD5

    daedf8aeed389569463b4d7c41fa837a

  • SHA1

    af8e9c4e0a8c073be26ffa286b07d058e9931379

  • SHA256

    716d1249247e5bb597ef2eba70af9d9f344e0de320e610b7b38dd55bfe30643c

  • SHA512

    61ed83d047656d689ff580479d4191c017942cb4ef06ce065e83f3b4265ac40c8d9f033fdaa5217f676b3a7bb86daeaf542c09fc4c1ccbff2ab5c8298faed94a

  • SSDEEP

    384:xy1R1QREDBeVliOhlMvU2ee7Io48EXcRfjY358CPRrMO77OM0TCtxYLuZ4mXYHb9:xy1R1DeVUO8cz+Io4vV77OA2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daedf8aeed389569463b4d7c41fa837a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b26e95b2007ec0d7139866df460d2d40

    SHA1

    3ff5ab906f90c75c9529fc084f0578c945f056c7

    SHA256

    6ecb3c80bd2964f37f75a1f4fb68ee898c5f3bc7bbf655a64a14956efe9f95c0

    SHA512

    532d04af31a21b89cf05db727b57e954f1e1aec4ddfbddf3d504382b709916bfe70646942458349852199c30699c005a1639d8bb46b13d92801f816dacd163e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3399b8fbfddc77d100005b163327c512

    SHA1

    8aa10680b8af49e507e428de58824e97452cc0c1

    SHA256

    80f7959c1f07001be3ec2389b405b0ece4f911d8beae2371fb56b25a2d97d119

    SHA512

    7904332894fc67f459178bcab9b046295b7ae7931d7b977ff0560455ff46908d41ad4a80e09e56910e02048afd4beba4e474edba44003360fa5bfefea5962274

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaf674b92d4674df7911d156962de5a6

    SHA1

    8abe52ac67f8e0c562b87ce40f6f230c7c9ff5da

    SHA256

    0211eaa0ca1f7e19481ebb163382db79fc84f325c06ff705516085e1d6b5559b

    SHA512

    2e36642b8b34d8c4dac7e8c5378fa90e457fb8d881266ed5463d9a889abc13cd11551cd372f95ab5a9b933f519be6eef9606b44a3709818beec51b6ce5ff90c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11bab5d44ac99176886e59a1de9a16df

    SHA1

    cf6e697bf43a4cd78f28e31ebe5a01b36caeff2d

    SHA256

    6eef1843498c60d6da8c065d294876d3d4fe2e3d8680aa82022074fa5311d98c

    SHA512

    3441f689789b14bde7f27416b737661ed7ed3937565650c659984852372cae30ae68e730336c30547b417f3f82df7e7696125d93c9aac9ba48b6b99b5a53e0ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7c9584e0973048500538646d398f552

    SHA1

    f24ce18e67d0e14d749eee71fa75016a6f1730a4

    SHA256

    9fbcf8357256a7dcca1993d0c7cf920a317721baa273c4b55ca4b64f963f76d8

    SHA512

    ec1a07888c70c47dab1a479c38aed8fa586e8142ce8c6624dcebafdadda36af2e6b9b2fb7ba5904c864c223b6fba08e6e323d84ab21933f1a9d49cc084a92ef8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cf06fb366595a2fa314b3559fe6ac54

    SHA1

    ace59d9ce47f73be8f62980e685868bc03f8aa47

    SHA256

    b5b6648e8563f2115352b3d842a4f9fd26c7bf36ef06001c73ccf2ec5f44880a

    SHA512

    251a9486c044738354123fd5b6c4b6537aa842c7fd2f632c8214a2d4e83e75a08155e6401888aaefb2fed48a2006a31033ff477bb67c566bcc1e7ebb6f75a6a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6af9f62dedde2b9eff2bb96d179817c

    SHA1

    c78f597c6bb6a03c6f5ed81d3c847a8b44cefd1d

    SHA256

    6396b6fc7de88b609ebe3b48eccd19a9675805107ee1b7339d93d4672127ad8d

    SHA512

    c2954f1a4e1f0e75ee63a0ddfa45ea1e28e39cac897ea8c49316a59e73a1ac5ad5ed98907abcd6ee76338c1e3a0e3d247dffeef02e6e491506771bf245e4101d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a188781746db40361286ca491c607eeb

    SHA1

    239d23972a4ceb11c7ea697507e077cd7a1797e4

    SHA256

    f7a62f1d0f60761525a77fa838b56ac72c77c1b4362e23759a1725bdfb649d49

    SHA512

    e95e21e67de325a1637dc4eaf917f7ecd9f6c2e1097e4872bbf5eda7cdce6fc28b57bcbf4bb57e8c087831a8c9adc88e3b3a759a191c3e4b96bd2d537332e414

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47a21a66c86802467237f62eb2bac971

    SHA1

    19ed81fb607d7d5650d7fd130cd0c094238b78e6

    SHA256

    7b6e9e6db142f3a0cc512370cd7374eb5681e77565b3e1d2c9e82e0a12330cfb

    SHA512

    a3bd9d68dc793222425e003d4dcb369b387a05cd1a446bc409da9a4ad1e2339485ec31bf08406a9b55d5a6da8e9ed6f3777f58e2c5d18261cc1ac5fa8d6a662b

  • C:\Users\Admin\AppData\Local\Temp\CabD29D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD34C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b