Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 06:01

General

  • Target

    f558f2b512307b51d546d614679e8694_JaffaCakes118.html

  • Size

    24KB

  • MD5

    f558f2b512307b51d546d614679e8694

  • SHA1

    589e8d8c735727711d4e0f57d4942f7bf9760db9

  • SHA256

    c430a7d622a775dc7203a1cc5c30ad9ea127e411770a2fbc16d49366c94b919a

  • SHA512

    08260652cd1eebb5b81365cb30ef11408016c93697c6876371d94e887c0570a0f6f79038552807c09b3c1bffd3dcc3afdb4478e4e97c4056136856454a242f69

  • SSDEEP

    192:BIYQC2OpEmc/L02XknXoCUhAg68Zy/XIpRik2qJ9y9Q9d9N91989G9T9Ux9S9A9c:BIiadQIkT7TZaVUG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f558f2b512307b51d546d614679e8694_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe
        C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://get3.adobe.com/flashplayer/update/activex
          4⤵
            PID:2260
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:209938 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c3be90701982fa2f0e4c61891e994366

      SHA1

      a94120c39e44ab48f48585f2c71931acd047bb5f

      SHA256

      baaa4be31fa544647f51208aa80f4d66f1ebb02ed20fdaa863c0349e7a8d6184

      SHA512

      4c1a4850b72bde49147bbf50708a9e3e407172a6e94ac38b2432042c387374169ba7eb02bb55b2f4e80f77e655e6506b04a4af01f27c6073082a9c03a4c8bfae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8b4fdb239683d466a6039a9703133f4f

      SHA1

      9453ce3d89c40eb342095197d91c03bd2f25866a

      SHA256

      68bdc587074d3b3e63ce542da4a303a58e9577720de0e3155789ad8bf297c2ac

      SHA512

      5ee52bafdff7b09c191c7fce24fbfaeb76c28a1574b4d408197de4ff1f57cdfdb0e37c32acd0a8684f8b5dfa60746ccd1a92c6a2d318d030658252df5d24c145

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      510a90f767f52285cbab86ade974cd62

      SHA1

      72af864e2bf270445c54bde691c0b2f7d7c60a53

      SHA256

      1748f6c725e5c2bca5f9277bf66689e8878fff4ac58d523b41fda7a470100828

      SHA512

      492e762da27687c62395e73c817efaf27ed7bf61ab6dd940c28b059d4e37a1cc4ccb85d2ebaefa60c54afb8ce81264a2d4833cbe6c9c53556b92b2f07195809f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c01179abaf4c6636d392467e44253e54

      SHA1

      b220f3728e5d30673e638a22ad66e999e5d5f494

      SHA256

      6bba28ab25fa8a497edc8be688a3564777bb17ba01e8db7a92565f6d43140dc5

      SHA512

      c1a826aa8d672bf3b0d841cb9a357419c4f3c4753dfd74a41e571fbf24a50a2df5eb8b4d56677a9e50ad5e6a6f3b258c61ec8251f8984f7a755ca3527b211446

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e1c6fe317e41f2fa72d9e142dc094014

      SHA1

      56638386258032ec9e2fcc6f4574495e83766e89

      SHA256

      0d3735dffa2d3a9f9766d01deeaf80d7a1da66e9a9437c6ac6a61e00a343ea08

      SHA512

      a0bbcf08101c499583ad445bb2f968c5547d9cf26df8bbec7dd7d9b2f55bddd4edb6d253b8a04234302d5b7f8106327862216ef8f5bb309504a26c50721edc9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b9762524845f73549ac9bde8b03764de

      SHA1

      a56b4d9bde82963a4896edd4a5712abcd37cb94b

      SHA256

      a3c19021ebb2454bbf36e3df86c7f0f1afe21e99b3c72888153eb7b5d1715116

      SHA512

      0422db1b18a702f810db26f4ff494beceaf67c7e5f98707de04e60638b3cd97e95a4fc6b1e8e13e3a9f7ccfdefac0e11cca0b4ea431c51056c12e6ed015865d0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3c7b7d1d39b349b3f0c4a8e971706710

      SHA1

      e37b412bd5d60813f61e47e5a52cadd54719fa06

      SHA256

      ef1828a70d78459a4a65e11667e8f3afa221503764074d4a7e72f38ac5744d84

      SHA512

      c8c1d5d5e67c2141ce77a19a43feff5d01b10f63d63cfed3c373ee640cfed1b971fea263b606135c5ce5128f7e985a523dafcf32e445953c6e63950106e898b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2e36cfec034106846a211a32fe3fe13f

      SHA1

      570f183ee8d481d422fb1014e3deaea97e4cf44f

      SHA256

      3f7d3f5055bebd9e7a5992ac839d3d0d852577f5f3992cd59b8c839534cf9a4e

      SHA512

      85d16932373ce46cf2eed241dda52aec66fb24255edb4791f50d30b319f3fe8ec3c1dadbd4623cdfaebda242227aec6470642b0a45b9010200a15f105f37caea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1450dd89e7b1c8fc8879c17d2fde853f

      SHA1

      c1380a00e8a3001cc4d0e9388cf0e41d38349e13

      SHA256

      7cd8e44be0e519b87aec9dd7b9ed59b33d561c797e0467c7f806f9a4cb37f9cb

      SHA512

      d527a7d911234b6565867b2e6532c9a099a316d714735edd9c392fbccd0b44bf013e25edcb13a4d423b6b67f4b5d4721120bd841eeb52657932ed44987647a4e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d33fadfc144825d0d5964813fee0d147

      SHA1

      a1ee20df3d2b3ed7f55ab64ad6f61852cf60f756

      SHA256

      35d49019a43f9d1bbc5585f21c1336b1f18c87fe6f9aebcaee5ed58e93fda3c8

      SHA512

      8e123ee1fa5a08ac4eb58a2efe390fb6d90fcf40af7a38ff96c34dd2c7ee482d419431e4ebba51135eba7f18f3f4d70be5dac5da1cccedd6e63ae4551dce5831

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b4b4d56f15f7e100d882d29797442e8f

      SHA1

      dcc1cfdfc2579cc6eabd10a1bab8a334e87ee3e1

      SHA256

      42d4441ff3c33959c94134ad58e67ec3d87195565633386815cc166120104b11

      SHA512

      316f60c0d7fc69fcb9bf6c9fb91c6902811713b39b9733e52b3c9f55c264a2fbb76fd8ce5fba84c06245cb81ae15eb1058fb7cc91ebb4ac86f47e5be1c469f8c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6cbe543c6c70951f7254021a6eaf960c

      SHA1

      468f9773079df5b1c0b04edca7b2f5fc812aeed2

      SHA256

      33f0dbff522e6a6ac5ec66f6aad9087294bdc2c76845f604f45ba5bc2610a1f8

      SHA512

      a47bcc87268618069b1719eb760efb080b9d97c6251f2fa92745a2fa8a71dbc4a2766766fe2aebdc4d9f28c4b5d0383b02afbe83fb9fba3c791d4af79e9a2f0f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d93380e3367aa765df2064b47b6e3c7b

      SHA1

      4e3ed385c2c4ae71db10599f6a446ecb0d2f8b45

      SHA256

      1baef2550abfef670f192f81d81719b586493ceeb16af9f989876831b192b67c

      SHA512

      b23c91e0b048ee3b66482977b9747555b86c9cdee6cd55605c64aa306626a5647cd155b94ca54459d437f3f73e334a60673a782c86974abddaa49eb8cb5a3803

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2e70da3918c355b9caa61dcdf603dd34

      SHA1

      217f568ab2a4bc6bcded17d48624685e6632ff1b

      SHA256

      c85d6f591e9b2a64a444c30d10d0d1d3bf38259a88ec6fd3693fabe4e52f6ede

      SHA512

      ec43423117d3a69f566bbba138702fc7f7d88f5c0a62b735c0d46260d45807204f60dc57cb91f7b9817fd7277a4fa63a44b65d35e5c5b5bf891c38864573e8d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ca79e2660af9667274377cdaa28b4c1c

      SHA1

      e2d26d3b6067539667084e51f4c01b3aed53b852

      SHA256

      5abc1fa617e4986bd7d6c2819199a64d74364a8912657bc92eaad03deec5b992

      SHA512

      4e2d0cd8fa254244c1b29752b156dd044309a8d0423a42e98dbac46f08d0cbefc59176f4c65cfa385b4bedeb102b5ed87f56752b902c51cc9d04ce90ec5dadea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e687ad82f5d455c99e489ce42c965916

      SHA1

      8e03ecbd52f7d58ea574787414634c445cca6fee

      SHA256

      a4bb95978fbe6845bf56593de8796b7f83a8a8374839bbfcb4d9eafe055f8ad2

      SHA512

      79e39fcb8c7012491d8bccdd5a5c9bfead7d3445fbbdc65c25740377f2e3e2194d5c74d0053112ffcbf754cc890b14d8d21fd435f2269ef840ccdea84f309bb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6ff8791ef20e0074cada31b7368eff63

      SHA1

      874580f257dc9af57864c58d5a8d5dacb51d9e41

      SHA256

      3ffcad080f6c5af73d76141c290f3d621d4cc1eccd48df9f069ec5e38de027fb

      SHA512

      ffbfa7f7e17969880887c22323de3ae123eec48575b6cb637d9412dbb6f318b846d838aeae59d91a0d01987731fa4fab1bca224d85d362ad9e37473a0ffd51f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      57e0adce872aacf563bbe864553b341d

      SHA1

      04d4d09c450895d718eee9a39b7ff0d6750a122c

      SHA256

      befaf158943e0bc0ff360101f5e7281b9c24ad4d5210ba0f21af9331de365bdf

      SHA512

      d5a00b230e30de3c5768195f5d92a525ec1db7fad1e420e72f79cf9e15e0929a695f939e80755049c36ecb13e429fc38ea59ca1f24fe13c8fb8a8a78f8dce0e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      417049b49720db87e648f39f883b84b4

      SHA1

      f4fae21cd0654ce41ae4570cf4546c0abd283332

      SHA256

      8c589d2ce24f63fd6168f7b2e16f39fbc0570e9aa507d1fa6ed57a1794b231de

      SHA512

      70d9e7867353bde1f8b0a36fb7aaf8f270756d1dd779cfc954a2cd84894a6f4c428f049d18cc084b8e9bc233aae101dd402395ae50ddfc21ab45df6b746675c3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      15109a437a01efb65de2610943ae534d

      SHA1

      f65902439186dc55b5f6a87ac8bf5a8e78ee12fd

      SHA256

      18a15249188d351ad66c49d86589fd99ca4924b3d8a9431cdad74cb6ecbdc575

      SHA512

      5caae2d2cfe2ae97ec0fadf5df9d18b50197a47fb2beb7b4a6d1cff3da5d49982e70272972c055544cab86c6cda52521ed4c20d25e3e2f7170b00efc5a375217

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\swflash[1].cab

      Filesize

      225KB

      MD5

      b3e138191eeca0adcc05cb90bb4c76ff

      SHA1

      2d83b50b5992540e2150dfcaddd10f7c67633d2c

      SHA256

      eea074db3f86fed73a36d9e6c734af8080a4d2364e817eecd5cb37cb9ec9dc0b

      SHA512

      82b4c76201697d7d25f2e4f454aa0dd8d548cdfd3ebfa0dd91845536f74f470e57d66a73750c56409510d787ee2483839f799fef5d5a77972cd4435a157a21a4

    • C:\Users\Admin\AppData\Local\Temp\Cab4D26.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\swflash64.inf

      Filesize

      218B

      MD5

      60c0b6143a14467a24e31e887954763f

      SHA1

      77644b4640740ac85fbb201dbc14e5dccdad33ed

      SHA256

      97ac49c33b06efc45061441a392a55f04548ee47dc48aa8a916de8d13dabec58

      SHA512

      7032669715c068de67d85d5d00f201ee84bb6edac895559b2a248509024d6ce07c0494835c8ee802dbdbe1bc0b1fb7f4a07417ef864c04ebfaa556663dfd7c7f

    • C:\Users\Admin\AppData\Local\Temp\Tar4DC7.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe

      Filesize

      757KB

      MD5

      47f240e7f969bc507334f79b42b3b718

      SHA1

      8ec5c3294b3854a32636529d73a5f070d5bcf627

      SHA256

      c8c8cff5dc0a3f205e59f0bbfe30b6ade490c10b9ecc7043f264ec67ef9b6a11

      SHA512

      10999161970b874db326becd51d5917f17fece7021e27b2c2dfbee42cb4e992c4d5dbeac41093a345ad098c884f6937aa941ec76fb0c9587e9470405ecb67161