Analysis

  • max time kernel
    132s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:35

General

  • Target

    eac4f542a0f70845d77bcd890e960950_JaffaCakes118.html

  • Size

    8KB

  • MD5

    eac4f542a0f70845d77bcd890e960950

  • SHA1

    fca227bd22b3a0ba1a524e73215ec16cd619d889

  • SHA256

    571da6a8aa8288b30efb3e9b5ea7ea0f95f0d402f19daa606f73d926ba82cd1d

  • SHA512

    6befaf13afd548b74892617bd59e0db05104bed70e9d69894f710f0824cdf5a66b03b5f61ebd64277d938e46a6e59bac697f53bc9afe448e32639041d2717ba3

  • SSDEEP

    96:A2KUt4RbR+5Ak/jftfHSHB+cNlKf7cSdv7gAj4RbR+25JzEGcf6T4tJRDPGmNI:A5UeRd+hjlyHAcNM7nCRd+iE7RD5NI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac4f542a0f70845d77bcd890e960950_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbd4d3d23d5b9adc1ab7df7c8fbd2c58

    SHA1

    dae6702a57fa89744172567cb811845cd8944e1f

    SHA256

    5a9c848a32353c39f327e756d794e089bd8acdc960dc2b4c3987e310ea0f27c4

    SHA512

    13e5dfbb8bdf99b305368eb41f33d88ea0f9e25cac50044015fc4564a65bf91b5f7deeff9e92a8d5f1251a9338cb05c9273da15335f6fea73a61009272e4bf24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9568433b49973e8b114428663572501

    SHA1

    0b491cc59dd23313c2b5aa8d35e37d4cc7e3a27f

    SHA256

    2ba26f570557c2685a8fd10cea3c67342674bd6b56063f4fbf189292829fdfbd

    SHA512

    aee3af08c68fd9b947d9b0f0f27104cfbad9483d7533a6fbbae49d75f18241da44fc762d5756ff2dfd9ecce8c25f821361620ae7d63a9cc38e94a7c5912293f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e49b9e70805b4612c86c82f35ba49cb

    SHA1

    321db9a09d5693291a51ddda5859dddc1db348b6

    SHA256

    ad9cadd34d1e4a3093296981017cfc1fa6872f973817828169295a0a761cf52f

    SHA512

    89086e41ed7d9b4cc03300441def025c79f6a265a457379dd44e28eae9c0207a1e86eec397dc3095f3261d73ffa3a6b7e860e7255b8a868c8e2312943165ea27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    904af27d8d91b463520fd4211aa21146

    SHA1

    aec93dea1e82dd6de0339e653a642d96c12beda5

    SHA256

    8217371a454f38d03ec353c70d1ecb148e600a804f6c0cf9d420fda5f46f4712

    SHA512

    2dd4c6e5030dc5ac315021132872abceaffb2d55b3b842bec6b5e8a893871030b633494f56332aabee68ac35caf13f50821b53514909503cebb67e79fad6f1da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b43ee7cdf2c9ef968fe2098c34b48d0

    SHA1

    4bc6e60c7865c6a091e21c47a0590d93e16dc507

    SHA256

    53b061778d5b8838a37ffe0d7e6e042f44ace958404640967b7f20c3fa493f37

    SHA512

    fe0bc63d4751bb119457d5a47d15755767e46596398ceb0f8663123cc222c726f295c58a9f15a87349952503298874ffd21d59cc0ec149c20371cefc9e431183

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fce0e42f31e571ec2ad3799f7e153b74

    SHA1

    1e8fe17a4ab74b1e3feed614395a2105cb5de0cd

    SHA256

    4e4f1cf3a02ec4f5ca56e4222c365eae0d3d741c8d7761538de380c2654eadfe

    SHA512

    edad56bd84f4caa7a0bcc21e0f8795dc123d88aaf4f58960c9c0ace1ead6dec25a7f603de64c56b010a0010da0a4410ef8dea254b6d86014236d27d0b0c01c38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84472fe481c3a904e90c512daf373793

    SHA1

    ac464a25256fc7e1586a0e7fd357c7fff5b28086

    SHA256

    1387110ef40a4f257d98f614e1c26ebe15375332505ae552d5132283d0ff1f50

    SHA512

    a890b6ca7c5897e105b6c33142cf552850d4d0015f14fe7dee6423e8a11cd80c84c38f129c9cdc37f21620af14962ef5f72c90490e2fb2ab9fa6d81da58d9ac6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b9d5006304a3f67afa0cd04641e9729

    SHA1

    72c609be83f0a374b6b1177382e836e9b490b4d0

    SHA256

    8e8c9d88f487f6914772a0e60f4b099382877d1a1c2841cd018dfdc0c2e94c14

    SHA512

    91325a3249d3274e81d5d5fd17a24403db6572bfb8f3b4f4ad1d70c8be9b2ed4e97cee07d8a5072d9596f2b0902d7022c324173b1e929404d3a7c8a64dec9b50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf7fe87f24f0a27f622b4527e18a4cb9

    SHA1

    356b2ab8f8f0c15a3204ac824022f85f76fed814

    SHA256

    d7e850e6306331edf79a461a3358859375ddf366a53a1ed994cb75a53f87397c

    SHA512

    30e07128f1fdd2a1a9aff886505437f7a7b2d72a8e431438af3270a168494feda9ce619b4d7917f15e73786494b8c678dd0f461891b27790aac7cf85d6e52568

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e4aa6b90d7b76deeb580c8efb86b256

    SHA1

    7c5622d6396f21569beea639873f554dd3a1a056

    SHA256

    d8eb02e4a0f0e1cf31d760611ddace9248e53377c1d20ff11b7a9e56a85822d7

    SHA512

    1a9cc48f7080e553f76bc777af247b3ce53f9107075f2c8303036001e6f61293407ae0430ff0d08a3de7b981ef984683342df4be84c74b69a747d4aa7335ae1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dfdcc8ddb825d1b2958af3bcc92b171

    SHA1

    274f62a08c1a752bd5f7fd28e19a605c68376eeb

    SHA256

    24e57c060a946135db2dce5c32dc9c8ec87e677dbe1b20ed5d67447cc9dc2112

    SHA512

    7d0b224814f8933ba38446e672548b1ce4ef165f4ffd012418f938526de5f70689f3266f2ad6cbd8f75f33fdb02002fbdf2761e7a78daa3345cb7a84bbbde7e9

  • C:\Users\Admin\AppData\Local\Temp\CabC19B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC19E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b