Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 20:39

General

  • Target

    db2d5ba466d45290f73d56e362012302_JaffaCakes118.html

  • Size

    19KB

  • MD5

    db2d5ba466d45290f73d56e362012302

  • SHA1

    bc32dae8a17618171c5525ca98bfe4e219c12500

  • SHA256

    6c85e94c33fd7a40c4d599fd68689380f5841c12a5a3b1f58b13dfb86a0f3fa7

  • SHA512

    6f931e98067ea32b0943ecf78265405073f78e6c4113917a7a82e65122d35e0634562e7d762b8f2652ee91cc28162c6db2d9efdeea051060ba4da213c977e844

  • SSDEEP

    192:I+uY90QhaHvEQ97LLyyRIAAI5fIWHL1R4xlpNlMGDGN8uHFnqfZC1kBF:PPX+ILItIoLfIjNlycC1kBF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db2d5ba466d45290f73d56e362012302_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e7f25d6d13ab13cd47eaa74727a319f

    SHA1

    1537b829ce57a26649f2c374f7f2b04f3b59c692

    SHA256

    6ba63d74c342009ecee4ce855b6c67c169b8eedea0593167f7a25572299675b8

    SHA512

    48ff889ef607363c408dc475d9cce9bd4ff669202eb8904705ff3c6e25f05762adce30ab9b39a688131b4df223315c5ad8579b7558d72d066299373bbfd60802

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ed691bd3740872d68542854d71b21f7

    SHA1

    e0b861448c297fa85aa3adcf0238f1d081c52b0c

    SHA256

    54163914756b283ee919c65947885c948a88691075526c7a809a6093d9a57c35

    SHA512

    0857ed0f7a327b3ccb1a2364d2a45e0236e03259aa3388456c700092845346d3f89e85c28cbb1b021edff3c93e2b90bc253c4422761a0c150469965826881916

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    236aab2fb96b09228560873db8afc5d0

    SHA1

    3ed16a77b8d8d2d96fad2ad9b9dc4f54ac5b3cd0

    SHA256

    18aecd972129c602f37b720194ab4f380efef2a0b5b7ea921c289c98f7fd3f59

    SHA512

    4dc35936974483da0fa4e935ea256be1147fbb99b0755801a9f91fa280596190cd51de02ed1ce69f2cf2896c22ed90f30f805ddd91a75cc9dd21b6f5d28b6add

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    492bae23df3ac16dbbe3eed189fb13e2

    SHA1

    7daf32b424dc6df1afd6f33ccce3bcc184cc4802

    SHA256

    0c610d362155001549e35c88f3165535066a459133eab2eac161dfff4b9aa0f3

    SHA512

    0303f07a85280a39cd948149a5557c7f4ae3340d2347945929e68beecd1a58e0da32107034659674d15a31750c413c95074ac4c26886d25e0c8536c0153c8536

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74552b5c793590bc712e2b7ec25a8355

    SHA1

    c91aee088dbf9734a033e955ac46a97c247708c9

    SHA256

    9a7d1a4ca99063f088f8009fb349424798544542471fba8df65a24e1bbd8b350

    SHA512

    5fb4d55141ced3ca283e1655bee96c757c9662606e1ff5a135f29297848b2a0926e7d3d1634698615413ac642017b1eb54333f59cc0dec5bdc1b844cb6b6ede1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c8d3e59f9488da94b86eb1f9e91c98d

    SHA1

    e6fcaab15deff1c5495d197481cf214954ffd283

    SHA256

    a390c6e4cf95d0645807efb563ffdb7277054b6caaa223e233b38dcb974cb9dc

    SHA512

    eda689ecbbdf72842a8fbce43949447138d28d930d040cfc49d2b5cf8df03046f6ac3b0967080a347fbf766b5328fc474d11f6c96a77bf52574384cfa6be4115

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dada0dc944d13a3ad2055eb27eb90df0

    SHA1

    8066fcb3031b34e5623ab5cfd6b8bab0c473516e

    SHA256

    aef6aeb6d5bf6b16ed2c63d0bcf54dd3699eb971cab7cc1d52c81e0af53511d6

    SHA512

    98d5771444e7094f317807ca5a16e867be501ae432b5ee9e158998aa8e2247e3a92355d05a2c74354bdd43bc1f42150cda49da5422efea5586ed1c3832e7dece

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80a70c05a951259d43aef65700bc2682

    SHA1

    d0efe7511d3197135dd50e55210d7decd775434e

    SHA256

    66d6ffb9e22379ac2ea509e62a30862d0b7efc6cb9d3d34cb9b34c6cc8550c0c

    SHA512

    41977fb6af18b79f3bb6d338e050ad3bbe98490fe574f11ab2b0ef25bf8497de13c05d29e94f8ab12489210dc9e000a99f8ba4180e119d9812656027817902cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65673ee37752bb00cd654916aeccad4e

    SHA1

    3360d8008522912abcf924a6799031f03b0790d5

    SHA256

    de553d0d5791fdcca0139db94d7dcef68ad60b76f7c0c7168604da5886f86bf0

    SHA512

    2a00b4854539a45b7e758c5572211e525d456411bf1f5aa2cf013752185462a97b2ede0f7598d9423081860ebf47b5ae9eca98470040e3106939453ac8e9202f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f52bbcb97fbc03649a71a93d404765b7

    SHA1

    4a4cc9d6f5f506ba7a1aa7835c1d6f96311852b2

    SHA256

    52f11cd56d4cf69519c9102402a6046423fc5aa2ce6c2029fa689f3b0a72d9b0

    SHA512

    71570ed5398709d21bab0d25a985493959fc6002dd692320cf504038b1f4f244c003e0021b1b25e268d6fb486bcd35274a27fcd5434be4aa49a08273b46c4287

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a3cd1e104fde15756d166259c238800

    SHA1

    01d9f8df5babefe1e3372e5348ab86c53e03051b

    SHA256

    4f869f0d585df58cd5e5d4f166f6133b81a3e8aa4e131a07aa962771f5fc9a3b

    SHA512

    5956c704f82c0d50c1cf862f6ae336f3d4cc103196366e661e2c8bbcc4af5b21341af32a1ff5e312d876b631f175a571b6ecfa922465fce621cf6576524001e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c16601c44c0c01ae68f76337117d1c3

    SHA1

    fd4e9ac4f70c58d6aca7d9c70d451b32c21ff307

    SHA256

    9d13072c7fc2d71e3860b608098ed1babb22ea7b7e54fcace092822d67e89f68

    SHA512

    a4ad12ff96bbd6055c00089e511ddaeb4f230723446a6325b68689a213ce27b81aee88dd2f7e14eefcfb603ad4551b29c0658e132d3a98459028088df55c52b9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q4648X1K\httpErrorPagesScripts[1]

    Filesize

    8KB

    MD5

    3f57b781cb3ef114dd0b665151571b7b

    SHA1

    ce6a63f996df3a1cccb81720e21204b825e0238c

    SHA256

    46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

    SHA512

    8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\errorPageStrings[1]

    Filesize

    2KB

    MD5

    e3e4a98353f119b80b323302f26b78fa

    SHA1

    20ee35a370cdd3a8a7d04b506410300fd0a6a864

    SHA256

    9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

    SHA512

    d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\dnserrordiagoff[1]

    Filesize

    1KB

    MD5

    47f581b112d58eda23ea8b2e08cf0ff0

    SHA1

    6ec1df5eaec1439573aef0fb96dabfc953305e5b

    SHA256

    b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928

    SHA512

    187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92

  • C:\Users\Admin\AppData\Local\Temp\Cab9D79.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA0D7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b