Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 08:44

General

  • Target

    de14691953ad781b76be3dc17bfb754c_JaffaCakes118.html

  • Size

    5KB

  • MD5

    de14691953ad781b76be3dc17bfb754c

  • SHA1

    765aaa1ca79938850b1f25c6c06a4a9ec4f339aa

  • SHA256

    8a42cbcb78150124d27aec9923557ffb16c42c04f8becc6286acd39ba081ae8b

  • SHA512

    46e4df6bc7725b4ed608e24744d43bc1e847ff17adcfbb715898c33422490715ff593b0a636b9d39072f626fa1d9c4bd734e1e97458233f604e80f21f956b146

  • SSDEEP

    96:pfblVtUlVddddddddddddddddddddddddddddddddddddddd3dddddp7ddbZzddF:xJuL/dAKAM

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de14691953ad781b76be3dc17bfb754c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52061431d91353ec388f693627ffa56a

    SHA1

    5cdd38697f9a6743904502679427a500d69d97e4

    SHA256

    52a1283f77b7acebb57691901f9c15fbf55be9cf7e2aa6765152f092eb793085

    SHA512

    4d5bc2f2d363d19b22572e614606410640ec96658bd6680c7898b5dd7e5a13703541d852aa04e386ba4b21de10e0aec94edf10194ba3e263d4ca33926a3a9e66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    264485d7e2760b4cd572c6968cbc8de6

    SHA1

    e2ec2415cd60e88de876bbedb47239f35999347b

    SHA256

    132e71bcb8062b890cfbb4610ef1713778f3782c697577c6d600fb1b4840da98

    SHA512

    8381e71e357840e17b331f63376485cb2b0b3fe96df122570458085b98c70ea5e0da95d85267f4e81cf8568a3852241912706aa873de7825b6e989ac587fc62b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a25878a5c5faf0e9e2d33c6e357917f2

    SHA1

    aea0aa5fa8f8714d34a661d81ec01733feb97da9

    SHA256

    97653e4d28dd8ebde3265c91e5c580b5bc38a1edcc7f38263022657b0315043f

    SHA512

    7779418d1c3c88025a97244243f745d307a9e1f78df6ba6f3732e9c34c8fc010a9be3096706fe798b004890faf15caf845aaf4fe7be26436630c0111febb3da7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6702bef5dad7740c567f473476b247af

    SHA1

    e8caf9724299f408d542e9f979d48cdc2752fa9e

    SHA256

    4803b1560aacbb95666bf13875b3954e9386397631a696a8a020c62093f18f23

    SHA512

    9769763af6792344f16948a3abe6841420cf968375f58518dba495300fcd1bd347b5e7a0e43470072bc631320ac37c7e8a263d81decdaa824d50ab86ec59b96c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    838cfc9c2172289c4e705b49f478679a

    SHA1

    19eadf35e0fe14f8bdba6322fe94c0f14b672d48

    SHA256

    8fac67efcfc2dea2a54f22f2079bb65d7396e83c5b8c1568c0d8167edc165e2c

    SHA512

    d4b42bb230844475dcf26b0b78fef1f5e8205ef5ad8eaa6964f49382fd544cfd11b65918f351e6e77bd5e2b29d9deefb25fd61f701f29dac352d3ac0a807b23e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5b839053f10504641c60365fac61d96

    SHA1

    8550ecf940ef3bfd13e39cd6720c6cfa6b932dd4

    SHA256

    d169261dbdf9f53931ab0ddc910ab7de8d36a0b229d56700a69bceffd7b7588e

    SHA512

    aa9bec8529e0458e3cd66eda3a8300889790f81660093c1f93e713216a90b44653acfb5fb98af68ce590260bf6fcaf94de85b08c3d6758a4af1fab98a1d6b58d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10ec0ae543152b4fd81642e34681336f

    SHA1

    a5ae40dc3cf25ca78b3500f57119c60c839a4b1b

    SHA256

    06fb093510e34fbc96bf9115a1f0160787f9ba21e1bf37de25b1f87a93f9cc67

    SHA512

    0190b3364bd2d09fed5778f32ea7ec444183de8f1e0d6a9344530edf12ed0493c1fa310f2307f3bce94e5dfdd8643076f6e2da141faf861646c70b429757827d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a4059fa1b7040093ab5435b8cc96519

    SHA1

    47826ad6f783d97fa7896662d0de4b1d2e5c5b91

    SHA256

    a3d721a7485b4c8cd5b21d0076688c558542354ef489024e79050f484655d161

    SHA512

    f83f388fee030386a723c7db9e7326316bcf7832c0ebb50b3142fede11403d4daf9760cbf5c7b9f60157c6d0720309b8d89e3b0dcf02674838d1e3aaf2d5d124

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6f3a1758daaa98f394bdf05c6a49bd2

    SHA1

    9762cf4020d0a24a8f20084f3c3fc922f4ce193e

    SHA256

    d28827f42837f855ff7259b9f773fddd686609d538d5cf80da506d87f37a20e2

    SHA512

    1a1f4d40326a83d27862900463ecbdad3d0fafd775f0320627ad64b6a702ec171a30a42e0651808081f6ea60e9e07620679f910fb5bc2dd92324d4fd5285b814

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1080042f4c210cd67e33c88c10454c3f

    SHA1

    1c33770d1003cc86e05bdc74ad21dac5af04538f

    SHA256

    b696d456de326ae9107221ea63dd266cb4ea7fce6edbc9ff7e63bb446d3cac7e

    SHA512

    32c7e1fc22e68503ee6cb2018a58746b12af4ab37719bd3cfb387440246172f0c5c1abf616a2db64780a5ab49fc4a2fac037057271eb86e0fd5c606c71a20329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4feb5983cddb04a3cbcc13605ce3aa72

    SHA1

    f4ca2d680f1b688793240b8c995ae615a8c8d82f

    SHA256

    6874d452c0b9f3fd43a261628986b72997afa2967210fa29d0fc6004f75a0632

    SHA512

    60965559baeab2a758616af168a5085277d30252807e20f78aab9a9788c72ddf78b31296c5f5628b58447f30e9cbb2851ceda27ae6fa157205bd2c72cc751d6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4a1e869a0fd35a8c5d2ab56b855c604

    SHA1

    580469c9a98a8cb6c1c295357b15fda32c0cf411

    SHA256

    cd0b7259909ef7fdbdd2e92d67e202fbf54acbb3d3611c570c848bf2df6e0751

    SHA512

    1247b651a2c6c8b82c3b47b13d1fa6120ebfb10854faa66d5fc767aef6cdcc43aa18c76441d7caf10c0909b642ba16cb9748348c73364196594c68f25eb959c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d4cc132beb9c18fc817d96ce2ab1c2a

    SHA1

    b80cf569f5ede6dcbd5f06e3d59e72673614104e

    SHA256

    8c21a19b7fee09f9c8213a698b027f3d786e92a946c51a60f9f387bb517f7b07

    SHA512

    3484ae9225e343c3d86f44e930c74d2642f2efabd27437298fd16e1cee857b8d3cd5bcd91a70c922b365e2ad3314b0d1d7a3b60bee873f3978e0ab7d194e9bb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee2fc5bf4baec8b0734a3f9d1817e077

    SHA1

    ec577aaee0757e4b910559b63752928ff8c598db

    SHA256

    3c960be836ba28290bc9ac109f807d07368077fc736dd00fe2b51eb47a1180c8

    SHA512

    21945d98273c766810b43296e2b3518a9bb23d73c22ff9543725a44edbc40344af82d8eba0a73feef748a23ff4ad8b2a20a6fd9e480dae0e645500c1b91c8f13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e0d5080d31721c407f747cd27d5834f

    SHA1

    edfbfeda71993a06cf91279e389bd31860d32d21

    SHA256

    3b2eb31f295d3605baac67689639d2c550c00ed1ff130d46928532a48b626556

    SHA512

    78e6119ecf645f234c801b4cc4cf2494bbaa85d4d7a19e4e4247c69359b2850d9ff608cf344378881231f7306d2511baf62eddf387a06ac4bc061b0c2ad3ad0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06d72552358c390c8c33ab0015a8a84c

    SHA1

    ccf1b09bc8bcc4fdf2e612030f4694057358eabc

    SHA256

    70f3781152ca4818976e7ef964abdd2829b9234effb7ad464659c28b19f79132

    SHA512

    e6c4d135c19d900f28872fc4a4fbfe2213165b8d46185844696dd96623dc08a264ea4fa535bbb43ffedf4169ad8b55796291b8016ba48e1f835b184d442763de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4e19ff4c6c54ea613406c50ff03535f

    SHA1

    9699ad101813c7bd092f3309d890874e407c1bc9

    SHA256

    843aa7beb5fafa33d0808d98855a907a719be11df71711aa65b1755092050677

    SHA512

    64467226196e04e8f75bd71532beaac6e98aab604e92a968ee166b3ca64342023e3fd1bb6ae2e64beda845fc122af1645a0390e34b5fc4d5e56bfe763182ec94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ef6b2aa94c5c6138cf3eedefd1791d9

    SHA1

    4c7d6992f0b6dc3e3aae0f13897d709943262d2c

    SHA256

    aa76c81f02d43ec16b2e2e0988d357a3a7f7f1016cd8c13b4fef46e9e9ce357a

    SHA512

    49341db2102cf7846f8ed2a561f7af0a8f196f8c0af0c8d2f0210e41f48e550d311f8560dc3c1ef5b6610a95ef126294eb6c7aea38fa15e67435b6a4241a307a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e7f6311cb12b9bf21b03b03d8b299a2

    SHA1

    1622aa02cbeeeae86f48a336c4c360c1562a5936

    SHA256

    698d5573917d4078e53ec560f5c9c15f2aadc248bbeefbd1895b314cb1b47c68

    SHA512

    e9d9a6d6dcec10f553a830ba220fda1399faf2d6e7ce063e932c0d1201e23f2e641f21921f4c0e9a0fa38e83144af1fe2816cf2b58b636ea225e901e0a4d3316

  • C:\Users\Admin\AppData\Local\Temp\CabDB83.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDC32.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b