Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:54

General

  • Target

    eab52e8f25eaae6470a1bb57685c81ec_JaffaCakes118.html

  • Size

    19KB

  • MD5

    eab52e8f25eaae6470a1bb57685c81ec

  • SHA1

    ace472553c039beaf57878b32697d285b95d081d

  • SHA256

    5dc9ee76dd53e52b1d30ea7d668f800043f4ab065f81d1d9a2c034f7f340a4ab

  • SHA512

    9ad0ba130f7a707722a0f0f10501cb1baa85f4f2c850ac5683505f577a294b9b0d770f461c46e4300708c38cb108c9da59b9c5509132324208081bc27178cbcc

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAI03TTTTTTTxF3TTTTTTTxB3TTTTTTTxB3TTT4:SIMd0I5nvHdsv/qxDB8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab52e8f25eaae6470a1bb57685c81ec_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8794bf30de0293c20a7e36f14a8fd339

    SHA1

    aa505820a95263bc4b296b4cc8348959af1ea517

    SHA256

    5fb5eb3a4dacfd994fcb6534d98f7b4c9047c4cce9d3bde0c43d41978e8d7fe0

    SHA512

    2bc30b9ff77e3d441d18b4ecab54f2dbac42e7bb27168423ea3bd0961c52fed11e32b331bb2d5c64402d930823d026b7e0aebd13979e5cdc0493bbbdce5577ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1ea0cd3e9f0acda4636d03b3400ee53

    SHA1

    3a60d2cf6c1cfcc479e8754c954483b373102c14

    SHA256

    ea15e241679ec672c1795c0d211fece082ea6ddea25624f80116be9839910178

    SHA512

    c44c471dca3c827d49ec60e05273c7fc44b8472731d4abeaca91a255d0ad6846a0128c6fa316de0154ffa031b717c70ed2c1e1c598ea4afd6053c9845fc91b88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfba79d0ac0ad70515ffd4935b86650a

    SHA1

    d50a7b763221f680b33fe531848c8200eb682829

    SHA256

    b8778e28669881c05bffafb92f940a91c060d797f4ccabca6c21610c6446b665

    SHA512

    2f07bcfcabd6fa5118e369504722f576d4698c9d85a191fb4f774f5bffac08f448d0884cf47b9c4d0333d343d88c273a733238571d789201f0ed6cb167d38554

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17cf85f719779b4e401a0f7876897a0f

    SHA1

    dbd5a56303bcef5097d3ff7a86de9867b078629e

    SHA256

    55c9a2303b5a1aa5e491c91dc3b25b358c73da19b24902ea84b9bdc4b69bee28

    SHA512

    57d6cee874397ca4c8358dc5a87c819031ccea88321fc02105266bdd68a9d54619aefbdf58c71b8f1ee0919d49d32469528625563752fa9948081915892eaa74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98da0f462c861ddeb2410f20b9799877

    SHA1

    efd075083c4c0b1ecca803f89023d53f221344e2

    SHA256

    7d39951fe7e8201f4a51457f935d606f09489615f141b60bbc2b26eb045508ee

    SHA512

    f02fd5fac6788c21ed622577c0ad9ae5e13a345bd1ce74561dea863652879604290bbaf066e14abbeb621e12001a96882a505cd48c1a4bc9e14c9cf248d9b7b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d8fb670d95c917cfcb8c9b3e076fe91

    SHA1

    2ed0ad0e96d29d3fc656a28c6a607c1c34b2bfc7

    SHA256

    17f042fd44dccd359217a3c8115872e1b56bf2a8bf2825ea3fa6d5fb5b818d69

    SHA512

    69276ec0f0ad8ae90b4ce45e6c792b78fc983921caf521a57f555e4977332b0e0890f2fcd4b76ed5ea121f89b1af30fcbc4d7c16a43f879a147061ce74f8c55a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ae32a29324a4e669a658ad518186536

    SHA1

    54b4073fc9732f5e8341e50177c83153e44f9e40

    SHA256

    8b8f1ec90d99279d7b992508a1281f151b3e1729ec9e036f87213674ae1c6ca6

    SHA512

    a505150c94de5ab546dee92948c3df10f5cd98f5adad5e1a965ab80eb4475c2491f2fe9db6f3550fb55fa5e19b04e4253f30dfde92b615f1fbcdd861102449cf

  • C:\Users\Admin\AppData\Local\Temp\CabA035.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA0F6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b