Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:17

General

  • Target

    ea7c15eff4bf3f6ba2b6a8d938c8ab56_JaffaCakes118.html

  • Size

    9KB

  • MD5

    ea7c15eff4bf3f6ba2b6a8d938c8ab56

  • SHA1

    8b422ad7c8edf20a2c042ea47f60b5c3eaa7da29

  • SHA256

    153a96d5dce9eff806fdefa75b9a66f8f35fb6b39820a1747e20154a393d216a

  • SHA512

    8d6081f45bdd7ec3ccf34f5b40b7e65b8879fb642290aa85b115b057830f2c34444c96fd670f58e071f5255f71bc1c86a11a5b91d1bf9dfd77f40b38ab15fa0f

  • SSDEEP

    96:tYrkAg2guGkQV89xZWvAdaZLtX9+Psbsc5NLcFnw4FVH89fDfFBFdE182ZXEWMIW:YkAgEtafRwyjc182hWzJQqagWCp/

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7c15eff4bf3f6ba2b6a8d938c8ab56_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    bc62c38508b307a7ba878fe5934ec085

    SHA1

    ce9f55cfe16c04b12dfff82131f892f762655c65

    SHA256

    299f1a77753f8d3704b1f20605381545e5f4ca21331f9bbec5f3a54c3a821367

    SHA512

    22d58b46570edbd9d5f2313e20034425eb9ffb590d4f1df21ce4dd8b3a329cc9d5f403b5ccb80521ce9720861f6973b16d1588c48d1c0fa048ab3e700583b480

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a13981f036cef9a1c06805c7a7a31b2

    SHA1

    dbd3257ed1e55b2397a19f6dce0e8c2ce33e8c4d

    SHA256

    bc82be78b9499f8ae6dce6fc01a9d326ed20bda1681dfdd62d13ac3c1ea1002e

    SHA512

    7081cc6157925334864101a05221d01db10747dbf3a8f9cb782d61b7d8cc16d74569745c38fcbcde7c3d877fdba3cee82a6f63585cc6f59d1e5e13efca354b12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34cb442b015974030806ec4636441ca5

    SHA1

    276f4296b24c619c9a19664a0a9d9677e1b5f318

    SHA256

    3e851ff34dd9ed0794bae7ac75f0dfda378151044422f91f2e09d568e0cc210d

    SHA512

    077f19f90c5c4448e5abc5061f3057f33882c3ef4a7fa6f28190767f39905d2035eeff7c41e141d5410bfe7dbf64b41159a608016808649378e0609db9620d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc92c432b01ee020bf77b1a057dc02e9

    SHA1

    7b1d78c53945e92c1b697bf035a67bed133dfdf4

    SHA256

    55ed9d0b8664aaf5200344a206bea0f49713c8d9c4b3b3418daedd0a09893f72

    SHA512

    a1394faa65d71ad52dca57937e2b365e3b0c2ea180a5a4ed3b915ceea2bfefce8854c235674bccfc00db8a8d09bb631a05af940e1df851fdf31585f49c29ac07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14e82c8285c5818adc5f1e28a479b0af

    SHA1

    b28a3b09a884961c1878902893747b9bd6eca535

    SHA256

    62500bb172c9511dcabf44c5e3750bd3cacc78cc6ae5eaba93cf83b0f39f01b0

    SHA512

    2bb1afea0578b678e8cd65b5e9c0cec2c66f16ccf0be279077ccfa65162e10fd76331f2fa3ec7444f99430d0d4e0df50f023c9a2b5b7fe9dc22b95ef1d9731fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32c90ebc9caa95c4fa339f28cc37e995

    SHA1

    5b1b7a4a6e3b5a8a56981b4c269a66f0e7eafae9

    SHA256

    1c9156e98aeb6234eadcede9668b5be2d8cd6fe08f0138f7a83475842a703fcc

    SHA512

    585adcc79255d64f87e73283d62d507d18d0d2006145ee14cbb79b07e811ad736f354d704118e31f1f8112de0eaac421ac0ea2104deec3b7de5a5ad3ce5f13e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfa358f7535e7f071d13799ed5439747

    SHA1

    72b6c133ff76f58d1bb8dae9087a81175d4305e1

    SHA256

    f1ef116de908f6ff80d8265122492a38409ae47845a15f8b5b9a83454aa1e5b7

    SHA512

    467f60de04f12266485b9d2f2c2a8153a31917230ee83e9d7b34a2bb53fb52a10016d301e1c48b6b802c60fd5976c2bd1d3515d25ed8e1603f0920959d018fdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6c0b46bc1c3e62f734fe1e9d8c25715

    SHA1

    07dfde0d95eecd77e49815bee07886ba027f79bf

    SHA256

    b515420dedf4024868ec4f90a3136276fdadeb05f2a5f08b26119db8477905d0

    SHA512

    df3a59809c4d5f9f3080fac4957f8de167af472ba83ee28f94dc605450152f024c5929a23d103234ae51a9c16b3ce0d920817177a279cf983d4b23b317b802e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    26789e46bb48a730e8439e88a5b8f0f5

    SHA1

    b9dc44fd02f1eafced93ebb572c08ade54b322a6

    SHA256

    c2c9329e07a6a30e4e2782e0af6685a0b94eee2c158ae47acb4dfbb3337f28d0

    SHA512

    b834dbba514e7e205e527a677e50b17bd2f1e4a0708ba1d520c5849b32e814f134ef2b667c1a21df0790a7c3602605b26b8a0c22cb091138793c69eac32ab657

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\T66MDXGA\www.google[1].xml

    Filesize

    99B

    MD5

    6b036266f6da4c52eed33ae402362f3a

    SHA1

    08a5362c493978d2b1c3046c5a3833bf3a2d9e9b

    SHA256

    2489e081fdb70e6ce0e7044cc8c983d4347b4c43c4267b3b49ee40c5ab3a835f

    SHA512

    054b1e4704a7c3f8c0671ffef338168bf6b6069bfcbcc2bc4bafd5be50cf2fcf9187fd2fac0b738de38651eedf63543b274ed341fd3fd50e4eb5a60aa067f39f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\styles__ltr[1].css

    Filesize

    55KB

    MD5

    4adccf70587477c74e2fcd636e4ec895

    SHA1

    af63034901c98e2d93faa7737f9c8f52e302d88b

    SHA256

    0e04cd9eec042868e190cbdabf2f8f0c7172dcc54ab87eb616eca14258307b4d

    SHA512

    d3f071c0a0aa7f2d3b8e584c67d4a1adf1a9a99595cffc204bf43b99f5b19c4b98cec8b31e65a46c01509fc7af8787bd7839299a683d028e388fdc4ded678cb3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\recaptcha__en[1].js

    Filesize

    537KB

    MD5

    c7be68088b0a823f1a4c1f77c702d1b4

    SHA1

    05d42d754afd21681c0e815799b88fbe1fbabf4e

    SHA256

    4943e91f7f53318d481ca07297395abbc52541c2be55d7276ecda152cd7ad9c3

    SHA512

    cb76505845e7fc0988ade0598e6ea80636713e20209e1260ee4413423b45235f57cb0a33fca7baf223e829835cb76a52244c3197e4c0c166dad9b946b9285222

  • C:\Users\Admin\AppData\Local\Temp\CabC1C9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC1CD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b