Analysis

  • max time kernel
    136s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 18:08

General

  • Target

    f692c0dd2efd9fb108b39404bf7a1086_JaffaCakes118.html

  • Size

    214KB

  • MD5

    f692c0dd2efd9fb108b39404bf7a1086

  • SHA1

    9798d23eea67c0869a27ed2adf367e4dd1d06ec5

  • SHA256

    ca81027d1f2b5da70764f4a22f67961d739c5be153deb2df7470f16507237476

  • SHA512

    373b2bcbd39384fdd2de44a4b79a5a7eec78b6480a7a70b8b80ca6a1df92eca6b666b28e41288b6c5032e523564a920aaf82730e6bbe390abdddc50c16f12bc7

  • SSDEEP

    3072:OrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJd:2z9VxLY7iAVLTBQJld

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f692c0dd2efd9fb108b39404bf7a1086_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e804519b5084d35ae0025cf133d703d8

    SHA1

    cef674d3a76f4b4acce7f2b5649fbf4bf46fe942

    SHA256

    571eb6225e70337b5fd69e9b32c785a47449956f8b80f5d9c2d8297f611d5dd3

    SHA512

    b1b1aebe6d93a32e2d4d3a232fa582b190036781ed27563a69ddf4a04a4e74c51471151855098a6bb195d9ed25ec5c5ce3c872bef5d67a7ac915554d8fbacf3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9db36c51bb9c2ef5d3e3ac4c5b15789d

    SHA1

    8826f4461a021ac5601a4ad496ad07a97fa5103c

    SHA256

    96b3302aef82fd3573d9f9b8b03b8e8002f268e615ec6a8966b5403a899c356f

    SHA512

    283a54277a82d0fc08a6145dffbba33187e41dc641e98a9062372ef3aab2624cdd6521ce3fde9478cdcc2f3ed01b77aee7fcd492b5e5f6c68c2221b0d844bf46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f65765ee74be0d6648d506698cc697ef

    SHA1

    9ebc1bcf45c57fd9f068f9ce5d3652ecbeb8804f

    SHA256

    7a68ef82b646bbde9f567062a22726fd4c259ed1c586cf89bf4fccd359d4bda3

    SHA512

    55d43ba64b8dbf4dcecff90b08cf4fdfe0e066a6758c4b8f6b2abda7413292779f7817377de44722871fb66b014b8255479cbb290f3bdbadc97888b852d07318

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e71aa1bd7105a2f2ec54947ac1aa972

    SHA1

    1ceb09f5e979e137d0cc97614f9d98b13a792e8c

    SHA256

    960553f55f7c75036d4c65fafc5f7b7b1d9e92e62d81375c22cf807747507461

    SHA512

    38f895de5f7e6ef456edc2f1fc76d84a1e5d939be66a03f0098ee6feed6265754d2f0fd6d90dfaa2d095b6641698b0cc9f6c45e0d40199720fdfcb4c4f366437

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f3e19f3282e6394937b4fe5d29c4a4e

    SHA1

    3d2f4b8e24a0c833d0b7553b14ecde849a17f1db

    SHA256

    744b36d003455e4e90c0678d36ccdbadf1677175f6a55107176850b956d0226d

    SHA512

    6c776e92d6b9dfda02b72b25ce9bb0c386ae0bb999ba20b751fc09037cbc4623763343683257077a2f184430f5c93827038bc40e16e55ee4c7639e64ebe7870f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9155772352e810b9502ee54714ce9cc5

    SHA1

    ff44e5d3cba884a86dbf423f567200f3ae1f9e2a

    SHA256

    a4838c0e6270a8f895846d38ca1d541607bbd3b12492bf2b8f13ef10d192b95f

    SHA512

    fbb93191d3ce417045615ede07e5e5e02393c4bc2efe1c8415d327cd7f2eefb5399fe4e1ff06a090e56f323a0ae2b4d0f60cdaa8c401201b96e189cfb7e65016

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efa41b8dcf46d0f89fd52668f4dd1079

    SHA1

    65a3e0d3b2cf88b1560108df40c1aae35af37ca0

    SHA256

    a3db717d580039c42f99fe3dbb363bff229bef8bbaa816228e43ea8e9ef35cde

    SHA512

    8b8cee0dac3344c15b60bd2278ffec288c330c587d2a00089d003366d5207a0d0bb23172cba7b22adbfe90f2b986ced72b4f5180b22efe8a94160565975219e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42a9caaaabde51bfe571cf1d10649c64

    SHA1

    dfadb2de2ef066ceae25314ce331a271206dc420

    SHA256

    3efde227812b38edac0e3b562234ef8d45391e3378e9f353b43f5e76614ec0f6

    SHA512

    1b236fd1faabe767aa10c45c6e11a5a0c1247c5a5d1ba2bf3507c028a09aa1181ad2d6a116010ce13ca0ddad601a66656c36450a384c4edf511f643e598f644e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e4189681e82efe0e7b24db2300779e6

    SHA1

    a0f271e20f40728a946e97558afa4ea8abb17134

    SHA256

    eca39109004777b825c65909511ccaf8c3f3380f7037605f40db5600e71eb2e3

    SHA512

    52f26eadb2e060337f41dfadfe5a45c35ab0a77ff6866d917f96cac5835de85eed6729b047eb06d9134493cdd91727465de44c63d526d85b9339c8c8e603d4c7

  • C:\Users\Admin\AppData\Local\Temp\CabB444.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB4B4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b