Analysis

  • max time kernel
    146s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 09:09

General

  • Target

    eb01fc53a5634c0b7c1fd7df442bca07_JaffaCakes118.html

  • Size

    142KB

  • MD5

    eb01fc53a5634c0b7c1fd7df442bca07

  • SHA1

    4cf00e57827d285bd589009c0cf56c885cea18eb

  • SHA256

    c14b92ffc50d9aa0d8319767f27df960c6f3acbb5227a28e7b0d62c9bf69e877

  • SHA512

    178b9c9ff9fb3a203f0fba45800bd3df1da78a174a21e5488dadcc755c883e94326a79ecb228c60ec30b9ab99cc9e3af45b13ccd25106d8b62b638909c978fd9

  • SSDEEP

    3072:SmXiRSKJx7dyfkMY+BES09JXAnyrZalI+YQ:SmQSKJx7osMYod+X3oI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb01fc53a5634c0b7c1fd7df442bca07_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b790f56d00143f7d91bc3372658ce5e

    SHA1

    f6654e82325b9cce8bf5ac8dc73bc77db3d1fdfd

    SHA256

    782425fe80b30dfea63684d7c920472797e0d78f51c14b7354910e8bf3c749e0

    SHA512

    b61a2eb76e2c14edfa49d3cb51cc1297a0fa649fdd980483bdad86b9332d6ef748d79e9cefcba52caa384d456bfa24a29b725fd8a5afcdcf141a7908200277f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4012b2c5cc8b4c7bda4f5b89caa2b436

    SHA1

    df7ec8cb4edbae6c585b4b8c050030998c0bd8fc

    SHA256

    fccc899f13653806d0f0d67b912cd558edb8ab534c8534035870dc8d7cf5c780

    SHA512

    bbadb686bf7d27b70baba97bd2aae01082fc108838035416b50eed153e365be99595ef5bdb8f2ba94dd6c1ee6c2f1e3d18e803df81879355cfef2c8360602d39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94079d3d4c5c77281617212010a64854

    SHA1

    c2a04a0b62e97736f5b475a4e5335e53d77948e5

    SHA256

    cf79754492bd0f354a8dc2ed357045b1f0a00e994063daedd80ef61c584374cd

    SHA512

    a1aac4460ea0858603c128615e3a950bed4d55db0fbab3f30aa2e5f4fb126ca0cf3968b432db22d3e5568c7b106b01dc59baf239dbfa98fe3e958282bf96e353

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c29575611ccb337306f8cf3de7da6a60

    SHA1

    da2b5b24c1dbe61dbab61f24989cb68e2db22b1c

    SHA256

    3ac7388a9e552a82a333df051929b14f0f5915ec19db9ba39b2ecc3bccbdd1f5

    SHA512

    335876cedc943630123ac0b7e4677e996bea73bd4107d11fe94f6d5107c43fb15f465ad2c923404ae5bcaa96cb655bc31e99d1edd1a33eb944828e782cd0ac82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3a83e8c6f4d1ee08c9f67611efaff4d

    SHA1

    5dad2289805289a38bc85ec8f7f4a75b0e90352b

    SHA256

    122692e3428887b39a80aa69098b69f34cd7e8ca5b46afeb5dc7901741c96048

    SHA512

    3fef707301987d45b244f846665735efe95990cc5db512b57989e6c204f7b556ae9cfe930f6a09bc973898e4e830471520672e2b6b58f9e7dfc557e1b9aba7b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ded5712bb24a88135b5435e562397fa5

    SHA1

    f7f4d0b5621e3a5a41ecca05dfb1ceea53ce9c98

    SHA256

    12a111c5d707f83ca5eb3aea06f222786d22ccceaac8c431400735dd6ec2d4a8

    SHA512

    fbd9dfde320e73b9e451963c279b9c88bd07230cc762f8778b0c811e82c7b4f3292a35280e3ed7e82ff5b1923bf17980eec13cf4d8173869af96cbe916834436

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    194b2c9429974ce2426732256fe93a04

    SHA1

    5ea92f75defaac4e99c248ce5e9b9d2711940af7

    SHA256

    7ce7e67cb539e6c386410ebfc32a5227e07c0f141586baf2b578ae69b0a29594

    SHA512

    7e571ef4e23c92bb3573ec000b1eea6024d2929071a4b2e904973e796f65b1d551b873de10d57c44cf04a495a30e41d22b5166a8286700136b2be55049d2be2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bda23e4b5c8a27bb287871a593fc21cb

    SHA1

    cc91ec386dc69a5ce94c455d5a12cb8b8da8ba87

    SHA256

    46c0aa1eb455f7dd6824e31e726e0b3d22b4b9e04ec874cce4b619704f455dce

    SHA512

    fc37bf1a5f17fd812e17483a39280f5fea78cd76a580adf8b79ba5a436b491dc5a4cb194b7024f9b14db98e694afa168490d14cc57e9f3f891609358b9dd3df3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e631a2a25a28c252d1db28d1190cdfab

    SHA1

    87679c0074b2ff9f52b8202ce413fed9c56291fb

    SHA256

    f3cc55b9c224f5e63d04216f3feea28602bcabacecdc6eac5e4a59c53c073562

    SHA512

    a69b20bb38338f4cb0a8471ce7cd9c53d1535d471b2303decd8999f744559eeaa998d766b2dfd2ddaeeb2b00be8c2189ccdc8ee9a565e0e3ac18c91012d03739

  • C:\Users\Admin\AppData\Local\Temp\Cab9B77.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9BE7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b