Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:56

General

  • Target

    ea75489fbd872d8a8c2aca4b978376b0_JaffaCakes118.html

  • Size

    53KB

  • MD5

    ea75489fbd872d8a8c2aca4b978376b0

  • SHA1

    555de79dcf16999fd6f73de36838132f0d32eeb6

  • SHA256

    98ffd6f856096e4825baf6d2b52babc567965e9f5cf2e9158846102d7a6f4737

  • SHA512

    0d2ce10ebcec58f2a48b2cae9eca9c60390bc859ef471166bf464c68afb60776d9e01dcf229f2557cfb4432af1fbf73ddd17ba8993c72d735f8bcdbb58cae1d8

  • SSDEEP

    1536:l1mAF3rIbOTtj2s+JVso9vw6x/emGYf414VDTu/QqMyCzBSodlhduXXWIjhiC82z:lgAF38bOTtj2sUuYf41oTu/QqMyCzBdM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea75489fbd872d8a8c2aca4b978376b0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f470d7c99e1a6ea2d0a1ee7dcce7b64e

    SHA1

    129019bd74d9a0468e2c16e2d26ad0775143cd22

    SHA256

    600e6e827a05a86e30ec669e7dde5b24c4d59206f8477aa206a1774038756619

    SHA512

    9c5206308c3b2da7d8f5f777924d7ef38cbf8dab4c6718cd27fb4e3d457585c21971c33555a1110b8b5b61284c7284051161bcf48582b68b8f28ffcc193199a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4b4a78133f06de5c8dbbd54c025068c

    SHA1

    427fb49f7d3872964cabc58150a0f87785dab0cd

    SHA256

    ddcb462d0e3175c6ed8486d5dc35826754cf81db00059ff837c4e02832c8b605

    SHA512

    1a6fd0bd1c7de8d7112081464de6da3950b891177cd82027c126c908e1d508bd4f886195b94e48006e1bbe7f54d40ebb88454ff06d0a3ffb19a857285caa7ca2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59a593cca4368b14c0290a4b47ae95c9

    SHA1

    ad5aa358755e8fabd5aba8732f660450a5d040c2

    SHA256

    c9f5a006251a998184a06083944df925e4af3e0c9cdc827df96bd7ae430918a8

    SHA512

    6f46e2ead002cc61cd42bbfeed9b1040bb4b72be16d26213cb6c0024aadd86c1880c54a3faa8c90986d7c7ef7da005db802ef374c9e9cfa0e687ac2615a3c06a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa8a7f9bb69209c41effb5279e12b673

    SHA1

    274a7a0b6c130cbbee558239b98af62a8273199a

    SHA256

    228a486d675da14c6c2261ee4108f40e5cdfa885e19065d3473d0192b88bf310

    SHA512

    6bf2de517bf42917c963172c2aacbb9c98b46de6c5d9e2ec47eb05a16331d0aca882ee3d5e14f322f9ac165d5e126278ea128b77685f9fb21b71ded5886cc256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14c548115646176eef3bb7c710dba8b3

    SHA1

    476c577d66c1f9a50f0064643fb6721c860b6f7c

    SHA256

    41a3ebbf091c6c91d751d14e0facefd4cf24bb30a0b9c493a79357a5e8c3dce9

    SHA512

    8c34325d7adca4b778ee1df13c8f088e48763344c1d7749fd11bb9d8283a37215f07c66ca125bf88644bc641e4ca55fc5d83ecc8fe4708b4e3d018c295330101

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97f60bd9ae4068a41fc8d857919ca9b0

    SHA1

    cf896962a5d4ca2e2b30b09d3832061a1527688c

    SHA256

    1e7621051b4e1b99ef2510efeecbaee8baf05370c433c2f8c0cec064dfadb1b7

    SHA512

    f197bd02d7603d4a4ff79167744c68a1913256014facaf90817ad4dcc37b5a85e8000b4127794da2312b9fe03335b5df72fa269bf9282198280840188309ccf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7956e46e4307bc00a0e25e1cc75db7e

    SHA1

    eadab0195a9d9a7c042741ace32e0bf85a80d4cd

    SHA256

    c663bce2ae245bb13e35f2f6c417b33ce791d302ddb5905e0b41c74a9f4cc810

    SHA512

    3e7063b07fba7dad087f543bf98b38ddc7f093c78f0ea9c6224ae68385715aaed61e4615f3e8560cb6bb30fa1d232c14ba7c47727917fee27be6f23983d2123d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2ec7ca2403dd2a338c5629e2df58f3c

    SHA1

    a0b5fb959f8d4898fbf7e10d969db28e8653eb75

    SHA256

    c4c4270e8417ffbc55d420d3f0c41df887173732786910b73bc04c6e03145f52

    SHA512

    ded710d9ff64af6dc6aa4421f7a154ee2cef9c26d10104b7981f09764408072289334a1245ff76f035f2af81da54ea001a67b0ec80673ca43fa9801f3cee26d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24048e05400ce7f058aaf0c7c73ff521

    SHA1

    ffd4242e1d6eee71d934b8d62aa016b40a980f6c

    SHA256

    087c5230e21c76a020757868f4302513f6efe3a7b5061c6365529d5cba540472

    SHA512

    a58e40ed607f6c35f6f07f745435ce701580ee11cc886fa1dbbba848b04a7ffbbad3a07a59a21253cf007ba933681275b34c689399c15d85e0901bc9da0e8a0f

  • C:\Users\Admin\AppData\Local\Temp\CabAEA8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAEAA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b