Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:24

General

  • Target

    ea7e958ea1286ea04cec3edc39cf1573_JaffaCakes118.html

  • Size

    26KB

  • MD5

    ea7e958ea1286ea04cec3edc39cf1573

  • SHA1

    7dc2153b06bd2dbac550527dd527aa2a8825a058

  • SHA256

    d6eeb2260c3e80fb9b2552ff80e62270abd7a9ddda3c075dedcd0d7c87ba8f63

  • SHA512

    da0eac572f2d3629c39854c1f59c0ccef9e3e7d37b65ae8bb6d6af52e4c6e7a55e8a4d8a4a8b82c7db3982635419f599252ad189c1ec9c87abdb0dcfe0479077

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIH4PzUnjBhV/82qDB8:SIMd0I5nvHZsvVExDB8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7e958ea1286ea04cec3edc39cf1573_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8025c512df83d7b26d32a7e5f5c506b

    SHA1

    ee31a6b3631c146900f4e836655af7a0124da379

    SHA256

    9e03d73f23a3591b6a1c2196c7ebf3aa90afea6ee9de77fec1cee63b049fda73

    SHA512

    acba74882ad92fb79f5cf03bc2d389c9b838fda1ff02899840aded2b79ad910192ca87317dd49205dd448f789ed0206a90f1968f7a6f8bdeb265b031b8715ceb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f107b9f1036dd5a6f5d50f479e9a269

    SHA1

    6fe41ee05f92d7b23538d9248b4938557abaf28a

    SHA256

    277a7dfff8f23ad941420fd76316f821c0d687ba8d3d48281a43751be4cac97a

    SHA512

    6fddce20279cfb7ae2915c91fb3fde5dc6c9d1eed9727aa902e4bd95bf6d3dead755f3b7e47785bfd6689b4e292c75a14acf44e27f75ac667e1aedc123127ec1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07b09114c43b559841d954a106e26962

    SHA1

    3c10cdb11341e1197ee75f73d33f5cab5269329e

    SHA256

    7fd5492831233ce6876ad7980abc3e4d83733cd0891b8de67240ae09ce397fd2

    SHA512

    96f623900e9e4556f85a3bdbd702cfc20961d0ce6d7134e3ba47d107855cc3ffa4edb9096d900e5cf0ed4fce9b828aa52fceac1519e92c832326cb720587a8a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecad4493696889bf35672843996bea31

    SHA1

    8a8d87d1962b0ac6ccb5bfe04c45739cef2296e5

    SHA256

    9c3b1cf3e0d661d91bb38fc6d707e2c493926fb4667d56afcd935f10c0237328

    SHA512

    082ff324703a5063606e607d249056b4df0f860621c417c5e619ca7c053e6630e95edb5b547e43d261548b004c9a8f6916979e67b2d053d541722be935a957cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31262f04b53cb48154a902362a19455d

    SHA1

    9f23cf83946a312197c558d4cb02fbde066f62a2

    SHA256

    ec25a2769490326b1ac8079c91c0bde8aeba29d4b1459b84b0cf470f62f987d1

    SHA512

    1fdf44f33e61332d6d40fa838b00572ba46c8345cd96bca6739fc7e75900e5276bde30116746c287bbf60c94c9e80877d9ac4327b5413cff15355d2924a9335e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b4d9351dca4199237f1d28bcb114cc0

    SHA1

    4a34f685c98f87861d7776b1b389658f78147d11

    SHA256

    5b21a06f27f626c66e359403c545b88f2e3f73271778eb81e239e4400fbd9186

    SHA512

    e6254e9916bcdf734c8477bd5c485c2bc8f2ca703107f96904bef97ce8a92de6777987fb97bb3b6a542480df901f9c731b6e4268cce91e4af809f473a34afd61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4660428a916952e90c5155444eca931b

    SHA1

    368411d2e96ff99df89fd666db009d24d7c4c1b5

    SHA256

    fcc227078c49f5f2b5f438e82de721f958f04aa99f055adb5c2bb5e1f4927130

    SHA512

    c45dbe8ceec908035267c4ac7d325721151c28e1f5dbc7f03f1c64cea9fbcec75a7e54ad908758d97a0e5a44ba33a5f64b1d20043c69f31aa898ef48ca10c2ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5770d4af3962cf066d23afe596447591

    SHA1

    6b82632283ed24ce0ca240dc83d67e4b1293b721

    SHA256

    2fafc5ef2ca3711a252e7c3ee8c46b85d17666382a25f7f8509dc86e8d278d84

    SHA512

    5c87c3336e04619bf973781ec042b70d4d4cc862b7192da5da1631c7dc69c5138412c74405bf6b41c37d8637251065f404b899dc5efa62768ac83d8a45ff1cbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28a2939392012009bdf2d51dd8bdeb68

    SHA1

    7984f4005bd646949a5215345d1aa2fb771296f2

    SHA256

    b40c7d50d9423b993aa833dbbfab840d7f0830ae7321ae1e3da456ed41a00eeb

    SHA512

    674b341aa5483686788397bcbaf64d0aecc052393db6506aa12fb8e615671b2d438144682a2f57879b2d65c1c6119ace669b5778c89c395caf9a13735f5e968a

  • C:\Users\Admin\AppData\Local\Temp\CabFE6B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFF2D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b