Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 15:39

General

  • Target

    dc88033a7a6741825b4f6ecfb31c4e0f_JaffaCakes118.html

  • Size

    20KB

  • MD5

    dc88033a7a6741825b4f6ecfb31c4e0f

  • SHA1

    c1a6d59854cc4ed4bb50b4bf48c79e032f2c209b

  • SHA256

    1f757d16d3cd31b034bddc0bfb6f8ef116273459a8690241489c412b72ba2ee5

  • SHA512

    42a207a18b6090c5ce4b8e7adcd1d3b47a8c6b66f12ffc7d09f09eea3385573e52393b15658f9f1d6ca2ee0a8a6c85c02e6ca2cf9530ed4ac5c1bf141a9f4fd9

  • SSDEEP

    192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIg4ezUnjBhyE82qDB8:SIMd0I5nO9HDsvyHxDB8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc88033a7a6741825b4f6ecfb31c4e0f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0b10cc85153ed2da1fe30edb1629b27

    SHA1

    3a7a8ff32c42c261a266e0ba3c4f9fa91e36e14a

    SHA256

    d44ef55c2e32466ca26ea596338878a129ce78080ee62edd99a11a34576f0dd8

    SHA512

    5436a267d0af1218d536bdf65ccdcdec7b4259661c9d7bc23fdb8ec17c1eee76edb172dc42f202ac2255f25a60b842a1cfe1b1ceae74dd6a0de9c4a2d4191479

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d2c1b1f3b36f598ae50bce80d99681f

    SHA1

    39e045df282354bd72e138b668b672776b753014

    SHA256

    70ac4cf5e28d92d5e75b02b8956d69cac36de2cb1992869be0e16e63cac9756b

    SHA512

    2c8572fe205c7371fe86a02cb524cee6aa7dd7de8976384445dabd06224267b03311d90d7a5dad78d0a3fd19bab31d6ed7bde74d636ddd6319f61ff7741665a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    271c89f1498fdeb9d3cb244f9b51e897

    SHA1

    bb3bfc6822252bdd5c3d4c16c2afda258d93615e

    SHA256

    248bbda8a2f183460f808f0e1201ed87b9da5c1df79d74e4354a5099ac1533a1

    SHA512

    3f1727be05204d305e2729dabee86217d4d6317b5f4074b7d9fb1fcbde357aaad64b1deb346a617809a5879ab4e07415bfd9030d6b48fa99657db8c734ff6006

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    721db55259ab788d9f06713d5991dbb8

    SHA1

    5bd1711f828f360c1113d7a173c896eba98d19d0

    SHA256

    669f7a89b87be928e99e5325cc1d49ee872f3ec53502dc176056392891ef2dc0

    SHA512

    3d2b729f9ebf82d69df40054a54e1b002e35aba0fe6c660a786ea02fbf62f5d2b8bc8e3ee79525761cebfacc5cc70f6ba63b87d3dacf86bd54ed6a9a6f312e81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37cd914eb210ad5b618948d913a35600

    SHA1

    7b53b9ae8b246090b262d5edae9e09589b33aee4

    SHA256

    61db6ded2aee6eb08fd875060eeccbfa3bc97464b3f13579a244f9294347f0ad

    SHA512

    c105926b44159024b26de4ce36b8022c93242fe01be3506607f431ce6a9f64364d933543a5b38c9c3aeb71ab59c3ae4e1094f709777d22efa823756e2f7a628d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6c3e0825f79aaad2b86ae6297271aa6

    SHA1

    4496cfc79c52e014b965c9f287e632e2de2d0e2c

    SHA256

    d794cb1a8389db553e8c361f173fdb26dc86976a5fb4874b63ed18b04d8518de

    SHA512

    6d625e44eeda85cd4f2c310b6467a6a7cce6258de50ffbf9dd8feb1773281d47df34523dac67cef9bc52a82f0a53205e0176f3af4aafb270f867cb05fd7672ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a83cb5bbba4a27b14380072c4eb57d8c

    SHA1

    e7b67fdaeeca06e588ab6425b942e63512e3c666

    SHA256

    77a08b907148bb9b1837879733087e3e97d9c9322b4c80f06099c26735e19ba0

    SHA512

    24d3ddcb29989632fadac0d05ecde1d62bb546f58ffc8085dc969da0e41a3f1e3818cfc430d443436562698ebe2325b44f9c648632d9344457fa016f0dbd46f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc2ad179116baf49367a7704519288e9

    SHA1

    76aec6d0edacc0aa8a86449c8ea2291fcb9b486a

    SHA256

    35d569e927a0010dacbbc80e8052c075bf30a4ed340083ec7be2f4419bd380e1

    SHA512

    02e88dc6ae0478d1f450457b080c1a4759e4fe82af44aad77bf97d41ca731ccbc50193684fe8947e27be8322f873155934c4cbdfa1d9c6158b7318cba7c88839

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0954b54974c3d9c161c8d9631e201574

    SHA1

    a0f521686a8b9389cc66a4c8a72da1fb55150eb5

    SHA256

    4789321e72337c3d6ab59738257dbd0580aa8a9de68c5cad13164506ae241d44

    SHA512

    bcddd2b15e54fbb31ba2b0cccaa03a964f946400e74d95140dbc24ea00fce740510a616501a52b49cfc1940ee56b2ded152ff7d256ec13ceddc092741995f7e7

  • C:\Users\Admin\AppData\Local\Temp\CabA621.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA6CF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b