Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:45

General

  • Target

    eac8ee4b23276489d3ba66aad6bec8f1_JaffaCakes118.html

  • Size

    7KB

  • MD5

    eac8ee4b23276489d3ba66aad6bec8f1

  • SHA1

    d9c583e1269327ce267ffb8ff525c9628d27c127

  • SHA256

    97da86ac4cb12c321a1e1e620f4e414811d663937e152d1f28e0009ccee24d4a

  • SHA512

    2f067b8b612e14ea3ad4a02b416133da7b5e453fc2a3a0f4b30c4cf09361037b60313a66d998f5d5348f98a9839641d771a0839cf271da5081f4a82f30c42f9d

  • SSDEEP

    96:uzVs+ux7jHLLY1k9o84d12ef7CSTUazfAWRKxcEZ7ru7f:csz7jHAYS/axb76f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac8ee4b23276489d3ba66aad6bec8f1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1448 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    553ce37ec7eac0920f28f93a5b1723a7

    SHA1

    00b6848626d8f37b76f5202a5264f1f29449452e

    SHA256

    6dee78141fa2fbeba210408f5009fb0c516692959ecdcc6c0a76b979ff109a32

    SHA512

    953366552eb34682046a82fd0b93c6b45ea5d6f2bfba94b0d0704375693b25718c63fe9383b456b8f48ee32bfee1391de25e794bc6c968819eda55a90f51d280

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27bd138c82a7e5ae9ab9a2776b4d45c6

    SHA1

    0e9b2430ee0f771d3582d5a60007fbbd6ff69ec6

    SHA256

    cc126fe1c819494a25ce97ae148df3052a5976b33aa2c9e2f36e3f554bdde49c

    SHA512

    faa031d0e2456e629eafe81736149fa27ba93e3fc34b9013a376ae01681b90b1d982db7afdd15cdbaa56bee33452a331c6d8aad3087c1ff47f79509edc9507b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0c322aca75b871810f178abfe9c7038

    SHA1

    17971268e3ea48bcb6a7230f42897cf468567bae

    SHA256

    f295db0ffab424a10766b32feb8114d94c43d3169d7ceaac4b014cbf54d584ed

    SHA512

    81bde7e2824d82e63f38a7f25194949d3f92fb57944c70659ac4ab8f78a4038da1a06a1b04b0e79360c9900be351b8eccbcca01176bf70e1a1878ae7a2952ae8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1bdfde52fd3af6107d375e0118bdf16

    SHA1

    47d82d06b83b2d93d2e96be728fac5c9b01b023a

    SHA256

    989f3e9870e8580f5ec809ff543faf03d5f3af5861cf745060108d744ce7443c

    SHA512

    a8f008db2e1b147a649d22319eaedc99f16d0b76bd82271c0c80e6977832459f992a8d1e78433031642728b81477f9c68772837a8d93b2321d6ead93767b5767

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b0c35037b226951f575959583926962

    SHA1

    9cd2fb59b012e2c0eba516ceb4e8ac91c1966766

    SHA256

    780457a852c860f189367d692a6a23287cb14fb6d0410e405f71e397ed0b1cd4

    SHA512

    d517f9135bad7f8cd6bcfdbea024ff754344b05cca988d80a3058f8934339b73c91f2707e79245ee97ac825d9b688c91785852b5a360c8a2bcc3f443e6aa8787

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93956f3d27a7e6b783652cc282b6203b

    SHA1

    a483ba0adffd5a41313a11c7aa6dbd7c7e97c46b

    SHA256

    20599496a58ae5d96bc88f6274f38bbfaf6ad2e14e9c3c995b2883ec0cfe4bad

    SHA512

    07204fe34cf502aa7ea97c98719c84941438b80dcb37c604924bef529a6f6238963cdaa70603d4594969a7f332f2074efc6f73ec4c9a0c5346e7f242d794c261

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    301b57ad762e790adbddf3f4e5c11eed

    SHA1

    7d63c90102df13fdf7cd624373515a6aa610798e

    SHA256

    65396cd33d892b40d7ee2c6ba6713d8f145e9dcc505ba26308530a5a4829e123

    SHA512

    9278a4cd8ea9ba77288ac073edbbe3174b7b33bd19b3b0d90a4f1f95957f477401ce3529292fb9fbb91240a22dd7417e811bc4b4ab1984ba9792b7ecc1f8440c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    493640e6d96d8d4d7b3ae721791905ad

    SHA1

    1ee2bbf0c0e3177a6fae65ea28f513b1de6fcaf1

    SHA256

    16d5e41aff5655a51c1e095fe2917556ebb147729c934b4e59ddccb8ef5622c3

    SHA512

    e98af3e2fa3eaff667eaaeb123272e13ffbfa9a4c354273ecc67568f68d86ae189cef94fa425a5131ff81c99a26fab1f70d61bfb0d09526df7fe859de1920e19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb6135bc5df8cba52db7c25734a1b3a9

    SHA1

    7be6f438ff03ab850cf5d9fa26b51d97f6b80e33

    SHA256

    8d453bf5eb12579a01aa7594ac70ea7f578368be890e1b7530132315461c77ca

    SHA512

    3931721d415efc7b7f729e5009d7e2b37e8c83a6b09f6685a0de82093b75204bb9258190d3c95aff23d7600c1a320f46b3d6810b6edb5f2ffad360d37c8c1cd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4b9875797909ca9ce55fb57e35050a8

    SHA1

    c7e8a5e014cb21b3ffc51bcdc18ca53c8341d6ec

    SHA256

    97198a02cc5c97404706d054d2d4280e814112314b01178be2cae7e7caa1c72f

    SHA512

    d5d6003ccbc6bc8688cf616c0e7177f083450d17fd32a9002f56319ec1873a4bb49055bbe3e4bf2176cfda9fb99a859de8e5f829b4fc15767a5a66808a0e5dc9

  • C:\Users\Admin\AppData\Local\Temp\Cab2417.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2458.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b