Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 19:57

General

  • Target

    e0ed2b21a7fc9865430e69b6845b396e_JaffaCakes118.html

  • Size

    173KB

  • MD5

    e0ed2b21a7fc9865430e69b6845b396e

  • SHA1

    fab063cb420efdc7fd4251def2b992295e007e04

  • SHA256

    9ab6f56606d0c9426188f190bafce6e574f857fd5d16cbc9a67ee30cd4320653

  • SHA512

    762233f788b807cedd6242ea69676b8ac83ef1bd8a0e7cafb0c232833569065f36b8dcc4684458f5a5ea513163effb8bfa735c0b1c99b791ccd4dd21cbcfdf79

  • SSDEEP

    3072:CPHMCMvT1q03cbkRzj5ww2h3yfkMY+BES09JXAnyrZalI+YQ:3sMYod+X3oI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0ed2b21a7fc9865430e69b6845b396e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6bc76f2d691e597e778105aed7bfed8

    SHA1

    32da64433e90220dbd433a2be18964276962072f

    SHA256

    c7c442c0338031a98ad2b7074acf15feaa13485d6ef2870549174683a19a48ee

    SHA512

    de9caa28b8a7b8110b9163b91a56c17719ea4a635b7720ebd161ef78b78d9f593fe5556770a5d6946eaa28355c5c2045d4eda859c831ff8e8ee8216f0901f997

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ba181608337880fd2a0c1035424514b

    SHA1

    cb0df4d06f49ac1e60decd42f0e558b29b81c59a

    SHA256

    8785d17f0cbecbd3bef4525250bc8b1bd95734572f4cd8f12264a5d4772a6589

    SHA512

    96d43e8ee7404ee47896c210384a86d632b73d40bcce40653bbc8e6ee115cdeafa5e89e0d6964e7bee0af7ffda7eeabeec0c3dbc7843368a3d632772860b7ad5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9553c334fb33ce8de5819feeac271af

    SHA1

    577c96d368b243c9ce3ebce9e214d1554092dfbd

    SHA256

    76323b373a8d64c63620def35bb30749790062f37fa1d54967232c3683b957c2

    SHA512

    44e611cd665b14858bde4f4b0317d92de1a59fcb75664f44c896c8f1f308e0bcaf910b0f22d5c40f3038f5542ea72c6e7119f0f75a90fd991c78874477fe9883

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e60f519e9d891ee4184b1b65023293b1

    SHA1

    68a7b926e85c05ed9a91bb285e7f6b8f3b2f35e8

    SHA256

    648b69df639e7ee7aa7a443815f6e66236647d1ebf8ebff0ebb2fdfc50360809

    SHA512

    d77cfaf9afd165ccbaead4c1caf3ed51b170b0fc5dd8df3a5cdb026bbf7adc4994b462c6d49d4503b31ce980566ddc7bab5d9e73b68bbb7cbc620fe0d57704ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d789ce921bb87a4249b4cdc5baf661c

    SHA1

    274e4b5c3ac2c86de4accdf9930024fdfe79b579

    SHA256

    0b4e4b4d0b07908fc31197e57295b4f40c9a5be0633226dd21d308deb6527335

    SHA512

    41572fdcc80651283d5ec535066d595fdd368da82c448df3274c6836ed3639a5547d3ceedb5c5a3ea1ef9f2884a260a7e022f039e8c22921a193757952166c20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10fc503ca7ddf93aef71b1c8bb5ca979

    SHA1

    8db2082b195641b1888fac488307206cb731e54c

    SHA256

    7c68a7b029ab72b9ced19e1b43e0f5a439cca14178e619765bbef691de36ca8b

    SHA512

    960b5c6fa3a245e93b1d7a71e9ca60002f3d97ce851d781e7308ded46822a6d1c7e68680acf4b307b2b7ee5243d1b62aeb3e48a243e30e3f6989e80988d06f8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f227a7aab883193921a52b2d857c284d

    SHA1

    b662a35859a20cd8aa717ec660eb73d2630f2db3

    SHA256

    638b055582b9ed42f9c19d4cec66aa44107833d93576afcc5e76cd2bc93b46a5

    SHA512

    269c0aa66f8ce6147bf261dd4550189a25b048c0c8c9551a25549c6d251ffa379014ab978c088a347a12ca2bea93bf8907f1a8caf0b6e78159233c4f028f1fdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c8cb8ecda70456ad05046ba1c7495f4

    SHA1

    1a46d14f3c17a62de0f16617a0bc96e7392b6154

    SHA256

    5926b55027ce03c840594fbd0a2c4665a59637d2d1fa1e72acd05dafa5b200fa

    SHA512

    8c8dd68c4dfe095c4c85f5a51aba388094792d436d0b227f94449dad3a88f7cee1d890b15b9e0636581cffb4e350738d7cd5933f7c05c60442445b13f03b445d

  • C:\Users\Admin\AppData\Local\Temp\CabECFE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEE0A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b