Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:33

General

  • Target

    eac47bdc5375fcef8a5412b5a81fdf08_JaffaCakes118.html

  • Size

    9KB

  • MD5

    eac47bdc5375fcef8a5412b5a81fdf08

  • SHA1

    321e1bc539f3fcf9b72d180bf91e16269af71da6

  • SHA256

    9b6edfbebe862569b33afc134f80c9f90f6d9a2bfef96fcd7337803110dcb84c

  • SHA512

    693210fa5eae2c8c14d38da6d6e7b1502405addeefabc25663479115644aa09a80c7414bf0d369529a23bcc2d27555508f3c3bb4c1bddbd508031caddaec1cd4

  • SSDEEP

    192:FaIOfeAMRyibWytUGtRkxHKbAFsl7/3j2wWhKi39b:FazfRo9BrRk5KbA6/TraKu9b

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac47bdc5375fcef8a5412b5a81fdf08_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9923bac3cc20580cbebbe4f25c7f0c8

    SHA1

    231be896aef20b2d16b4e6c18c44980f0865b998

    SHA256

    a084cf0067d7f8035e84f0736f90358c545e7763847a27f04d1a2ff3a8948e3b

    SHA512

    070dcb74ca834e1028761f8b3b360a62ff2fd019823da8dace3c34a5c9380a3d392fbc4975451146f4cf3e7d787bb86cd7415dbc487dc50c3c79868ac0dc00d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf796538bf0192b53cf330461bd17628

    SHA1

    8626bdd8ba8d1183f0b03433fd29f10b97d07731

    SHA256

    ba489aa5b7c97933416576b0a68a4d606688854bed8dd183867127612dff8173

    SHA512

    83e9d19dcf533f2adea508f4e896b2a53312d3da4a30653dc3eb389160dd8efa4bfbdabc21b923da13e733cb2c5f56addc63bbd609e1c3b4ace809b4f8cbae80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12783452029ad42fc7e57179c3394049

    SHA1

    0b99fe769db97a37ceeebeaef766fe7f86f96aa4

    SHA256

    49e29b9c03b81f36417f116ef46eb9642c7a5e449e9766005fbaa25b2e9329c3

    SHA512

    0d6c0d5b3dd07c957d45287f2ca30077a114bdc25fd39bbd029abb7c7804604fa0b1d23f0d1dda35eb7da4d0740ae144175e3b6a230a85d441cb6754326f56b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7baaaceadfc24b52ca67a38dad395af6

    SHA1

    1054d1e1b2490ec7818ddd467237ba71459f7fc8

    SHA256

    dc7bf977039982cbbeb6032be3774582471900e960cc911c66f35e57b5644c47

    SHA512

    3e6baff0083b16716744b2228fc71462dba1c0d8195870c2c448dd5ea4016ea72386f4b72a2f5d25e5da8dbbebb7a87b4bc9127b2534fec8bed1b355b071b31e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f36b07de1b1192a486f24cc1423704b

    SHA1

    a9837f53565cd5342e9b512e5e9bb5ba45a60db8

    SHA256

    418a321e4eefb76fbaf4ce587ff8c609e2580bd441985bb9945dab03802affd6

    SHA512

    699d3c27bc83430d072da61a91ca4b2af34aa737463b82057581cbd9e3ccd09611215d596ceb3bdea7d1c8ca1afbe7c114f6a98b9a9f20657de56619da0eae18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca89527ca306ad935be21d3736fc623d

    SHA1

    94d3247e715c07e858c0f01065b39681ffbe6781

    SHA256

    44e0ac01f2b4b2cc3296ff0aaa29c04733c81cabd5ed03b60e2ec68b4616d2ac

    SHA512

    d1da421d3d7cafb0634da28f0a3f0223215ffe040a12c5e32ac44b6ee38b95638e5f751a0b14eedfed2627e1c79916bea3ef0443b7cae7a5e6e3448d51f7c64e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5023eed0c1f40e2c2fe027a6dfa383e

    SHA1

    6b3d7721f46e6314e825d083e383893e1b4b14e9

    SHA256

    0030f5a17d4c86e685625f1e7f7ce3a23028813d59910200537e7d02afa80179

    SHA512

    00f6dec1e79152b5c677f79ff62b43245ea288aa35736179aea6a87f4ef175213bdfb0588db3d4373de81cc153aa90374124109c5b603cc885094c1673dda7ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c73b7507466ac77f17b9a17372c3b0aa

    SHA1

    da0a659d590fa4b86e249182be86daf227be7d83

    SHA256

    646ea5d3ab7529f85cad8375fdd4e7757b7a49ae69e22a84e7a0e62f61275d9d

    SHA512

    5d9ca199ee75b64c84ce580cbdd37fa27d3df227d0a4a1dfc763e202caa0066966b47a33cf78ca60a409bf9752e41e208f26d8ac54034b8cd4a037df81f0d998

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db55603368e2684baaa0c706c37be7ae

    SHA1

    8bea20a26db3308afca1055e8b879d7b2bdab3b3

    SHA256

    4bf01fcc57bf046f15ab8efbd60f00a2b617f4ca8367eb45f2801f490f20d6a3

    SHA512

    17c4f04841a21fc7b0ca0e479e0b01d6c33a2cd48ac46d83acf539e3970407e12b039d58058cc698f2fe49fc28619adbb10756faa546426ce3913949e78cff04

  • C:\Users\Admin\AppData\Local\Temp\CabD54C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD5FB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b