Analysis

  • max time kernel
    129s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:44

General

  • Target

    eac899acbaeb4a7308bf35d35db8a821_JaffaCakes118.html

  • Size

    19KB

  • MD5

    eac899acbaeb4a7308bf35d35db8a821

  • SHA1

    65d0ec18bdf8606ed6b5d74da7ea089370cf83fa

  • SHA256

    91958e53f5727ef5ceef6a744286cc29fec541479c1045f72bc82bc6e65b0a08

  • SHA512

    8ef1b4c0d16ddc821bad8daa039d16e2b563a66ba749eafdd61e98a460313aa0a1001da9bdc7970f04b93a9da8bd1f7acde194e50d58913a672388020e98f776

  • SSDEEP

    384:SIMd0I5nO9Hio0076wCCCsKz0dzsvkD8mxDB8:SEco002wCCCsKz0dzVAmA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac899acbaeb4a7308bf35d35db8a821_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd97ab03be35f8cf40bddda3cfa1a46d

    SHA1

    be729096668980dc9fe9915f1464ef58010ac640

    SHA256

    4c7611c1a5ce3b16475f2ac78f6eb91a6d7bae0c7b537a2ea87423bc4505a789

    SHA512

    13dba363d2859a7bfbed7a9350804e5cea5b0cf1fc6ed286bb31e6a85d8479426425df35ac3e945efd130000ac80ed580377341ebb6d79d290625c44dac5f635

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0a72e6189536c619dfa4f248cf83a82

    SHA1

    e4c83c75faedd8286bac17064669661d20efee80

    SHA256

    8b054955cd19817fc08bc8229b32a5bf3999dcd16fa958a8352c5514c64ee51c

    SHA512

    64cd8572da04eae80e951b3fde83e00b5d4fad20b6b79d20d5526ebcfb5a768f694027128b109ba66c76c9a24410dc3f26587dbf2ae5c58b0d557307431d4d82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cad87b884d836c4c9107b59a1fdf29c

    SHA1

    cc2954afe7159a53fcf7188a59ebd9a6f3a0b070

    SHA256

    07fa61b54fe304b21b75e7ef28adabd65a97a42127e110a062fb6440652b37d1

    SHA512

    5e5412ed02fc10c01f1f2fcb930df125ee00cdf2893bc0faea79fc440b1c9257aa07de1c1e3bc8a3e20fdf2ce680930f215bf0ddfa146589eb33287b109d9ebb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95d2fb442bcf394ff534962be2a39cc7

    SHA1

    154711949d477fdee8fe2bc13b3f37b8d1c68f7f

    SHA256

    cce068c0f8d1ee7510afa40ec3a88bcff6f0ceb79921cc9f47ee47ef31d7683e

    SHA512

    5fbf56507f5ae11cb43774c0c12009a7ec6b1aa6ad5c59fa0abd1e6d0025da3b8f40088803e22ca500727d4a1f2be6ee0ba819e14c9dee2ac1b027316fdb9e5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    017b9b234c73415223c7f1517819e3e5

    SHA1

    fcba93c022da3c07fb1a30471e6d56c130bf6dd3

    SHA256

    ee5c25d1a7c2366d8af9565468331c7d6e9114633caf3aaf7eb2592036b4b373

    SHA512

    d070204b4da70d5d2966465e85d5792dbd8db1f0474d8b59b0bd5ca695f1c1c5e2224816c81e85b91e4ba0c71fe3a18a98f87640af4279476bc575bfa0be473a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a8ed6ae2589a6ac81a3fc2eee1f6806

    SHA1

    1f52161d6f003512b2ae2ee9ac76bbc5d71520c5

    SHA256

    0de50db6234702c2342a131efa0f95d4c64b351aaec48f32bc33864b63605408

    SHA512

    a152199c5bf728462f4ea28b272a9f04b7b2c5beb43293f8c76aaef5687844c958fa1d1e25c553519f521f2a46633e529ddfb7775765763f9d2f3420ef54fa23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e051838c0d7d7ae3dc41bf33ebcbab6

    SHA1

    ba3e72bac14788542c6c030071834ac327653a86

    SHA256

    dd10eaa6747391835d50ada05f89c3c1b02a0d812849b378a5510f919be8b259

    SHA512

    15f8721eca8ccab10ece4536734008a7d62d41163781f661a839021f786bc12db2152ff4893d8013493ecbc5ee0509021db8b8130253bb284393cfa3ad6b7125

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a60847d3e68436b5992b79432516cf59

    SHA1

    41632db1253d0058280e1a02a7e8395da63bf5a7

    SHA256

    28a37af8e79294345917cebb6a1da5c3020e16e2c002d696dbbb13654f0ed519

    SHA512

    b80e1f23987274fb5dfe39ba7eb3c4849e09ad7fb5b74fb2d805a2d021bee460f53b8b431340b9e3d03c53723939507ac238a6919f54963f8535e3bd2db96c2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7eb3cfa33459c8e79b722f4090a86fd

    SHA1

    a3f75ab9f2444342f816f7324e98b96077601691

    SHA256

    4b40cf173e58355896ea39ee22a24590a3f2c7a599e725f7812c96ca107cdd06

    SHA512

    0992e7dde6b1cf714ec6d6f120e5dc775b18077fd58283ba28c44e8868c87d402207dff26dfb58684ffcb253cb8dd590170b231c1b3d788136d293887ed6f49d

  • C:\Users\Admin\AppData\Local\Temp\Cab9F1F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9F7F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b