Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 16:55

General

  • Target

    e09dfcf3767348d69fd6b36c14fb6052_JaffaCakes118.html

  • Size

    162KB

  • MD5

    e09dfcf3767348d69fd6b36c14fb6052

  • SHA1

    a3a29eab1354a71f571076d461e9575c31f9483f

  • SHA256

    f83c26a16bc6871e4de975b21d62206651509b02463f4ca91b413cbd000b4488

  • SHA512

    0e3e7e25ad0fe8d4f8e9fb07e4884fd4f2357e48e7969616902a7946e2a8a9ed2b1eb25b653b867e6f1ea52227095fadc0a0fe10f3a47b1c79c2bb4fcfaefd85

  • SSDEEP

    3072:SfbovXUBwCB1ac5+ecz3B75wt+ar9yE22qR/fG7VCecZoyfkMY+BES09JXAnyrZ0:S0vXUBwCB1ac5+ecz3B75wt+ar9yE22k

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e09dfcf3767348d69fd6b36c14fb6052_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2260

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          97b9b6565542d829430136626d6fb762

          SHA1

          6efafc57801ac930eb1127c5aeb0d47d4e3172b0

          SHA256

          3cdd73ea25675d51ad58a5457a9fc3297dc6f37fc994c6e9ae9f51548e69d9a0

          SHA512

          30fb633cb077ba59b6bab8543c346c200f1c6b81f0c00bd0533d78812785d61f4944ff216303a866cc96b287e3f5336eb0265c23cc34d6b0535bc0286ac6378e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7886106c065db6bdec7fe35475276af2

          SHA1

          bffe27e7cfdec27afd6e32352eb16802a506f8a5

          SHA256

          9f6be8b0aecc3086f39d5548fb54d3b11845929d7b08fcb0a3762844e88345ba

          SHA512

          0654174dcc8b5fd4d8844a145c771ae5c69657d97ba87953100b8cd2bc9636f5b78f319b9cf226de08939ad75c3e83017ec452efbe6ec3a6045a4d4f2f3c68a9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cb0f7cf71aa52489a88f9fa01e150aee

          SHA1

          25f186086248afb82a8ec05abf3c294fe25d5cff

          SHA256

          689364b8f9eea511a387f95910bc3595945c9987e70fd7da75c97d5f6a46c555

          SHA512

          00d4adf4200fd4a96b6c3853d077a83572c7c9dbb755cebe87d85e5f2b77dd74ac37e2f3a2b9c4b3534c92c7e4afb0f88e00b15e49880c76afea892d5c043201

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c06f6d25020aeb7d2ea71536e6207701

          SHA1

          f99319f331197a8fc507c0790a6742a70dd8dee6

          SHA256

          c07dd2ad808640a1c29441f3831f6fa7837b90435da7ad2041a51d643a843e4b

          SHA512

          fe1447efaf0b26e65f712d32491b28fd13a79b07643ec406abbecdf5cbaf5393de173c7416de8c715c6624a0550e8661e3da0b072f3e6a2176c1b8d8babfe73f

        • C:\Users\Admin\AppData\Local\Temp\Cab8CB8.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar9054.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b