Analysis

  • max time kernel
    66s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 10:58

General

  • Target

    fa483bd765dbde0c714064f01ab9fceb_JaffaCakes118.html

  • Size

    27KB

  • MD5

    fa483bd765dbde0c714064f01ab9fceb

  • SHA1

    960b565c7a7f797b4a53495d0a78a3ed04d388b4

  • SHA256

    422e0a2f5a9770e0d56181f9c1c6f6289395fa0d35f8b10999ca36d9671b35d7

  • SHA512

    2b2b89903324080f55ce8dc873b6e0e6e94eda37a745a23fc8460f333ca6df25e3da16fea5a06b0a7c6a0bd1663ecf5a43f06dd5481615fa69e60a9131d59938

  • SSDEEP

    192:uq6rQNjQROX4mUCVb5nvE1T5J6SgWWt40vnQjxn5Q/ZpnQiedQNn5ZZnQOkEntb+:nCQ/aygcawkn

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa483bd765dbde0c714064f01ab9fceb_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a58227dfc1fc91cdcca52c4f1504782

    SHA1

    89bde6791b5817a474dac63ef268e4d652598bf6

    SHA256

    39739214ccc28c5eb8e87233a355e90564c8fc7559db0e1d88cc1b4137ef1503

    SHA512

    8139f655577a5171c3a2cd4b145ba871fc73989e2cd4a4344f7cdb1b360eb9cd57fa1337176d9aa572e1af165fa30747da6ef12ac757fbf0ac914fa3a3baa1bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    551239486d4bb2074fe01b13b34573a4

    SHA1

    e832ce3f348e8d76be29224cb9fb69cbe809d382

    SHA256

    f78dd96a4195bf8e72472f5e5f57fca91377023bab1eaff4a7b76ddc5db82444

    SHA512

    29b78d5be2392aef907e7e4c642d8cbb7795dca7dc1815c71c0e1de4fd7f6121f9594d52247f948cb92af39cd355d8b7a4435be4093a75c3774f274cbec2eac3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    297b19b5459047d0af68e4e2d01e3e7c

    SHA1

    9ccb8b3fd4a0c8f2222488600f0bbd1fdd38660d

    SHA256

    6697eba0fc67e7eca7342879ecc1ca4c877e8217221afdf523578864acefba5d

    SHA512

    70bd1bad41db6f8dc6f659fd0b14e1620050e7dfe0c3d4e458ef794aa4cfe7068c6b29c16dc4dd98679684f117418648b6a8edb522d494c46ce960e18b3b6f9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1142e62c91a1b40a9166d73aa2c5dd28

    SHA1

    fcbd221937b96c88ece31d2191887b50edaa49da

    SHA256

    f2b2f1194b03e642c7f926fabd5cd6614bf8b2aadcdf546e17c0ef16f959cd46

    SHA512

    69c647821c1eb88534a960de45a4856ec1ac87990aae3eb4ffa030bc1fee577cab32cef0fa8feae53dbebc118012d984ef4d5cdf241d8e6438453ed32d8002e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3649f599eab7a9dbd77525d8d0cf8f6

    SHA1

    38e87fb7f482d2d365b0e3049f1a8ca78c0f3540

    SHA256

    d9feaa0d0aefeb6a9e37733f5dd5fb5167b9a063a3fccb1f72582e132c71c0c9

    SHA512

    6fcc1e09adae9e5a981a37fdb5f110f9215341567f25aefbf7a4b8c36a696e7700ed7510a84fb24536d8940c8ad9323f578e1233d68af27b23e3cc93815273cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc9c34a5342503da9c61cbef7df1bd17

    SHA1

    32b932d1b7821184c09a4c260787225dd9c583e5

    SHA256

    22b5f3d32f291ede9b72db25bf82551c18f103b61f187742f04ab9566654e9e6

    SHA512

    4c6343dfe7545ccf6334afade043f044594c1ed9496d8b413ae42c1affa1219dfa2153ff6d142e6d3f4d93860485238b1898e9cfe48fe62ac7860159f9d67c6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f9c869712538edd7df6ffd830e70f08

    SHA1

    6f912eb038207137bc76cc7d85488cdd261828c2

    SHA256

    bfdb2295d7d1196bbfb75aa472f9f48b942b7538425686d5d52a37d3a2102304

    SHA512

    bd1a6c3a5b2edb7d093ccbfada9412e68a989d347d94e0e67daab366f582dd82a33e1b7e4a36e0e2130ad9425a35493be54c080890dbb619b78acf5c0ead06b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87fcbaef42bf8e5d8193e0734a3d856c

    SHA1

    62fc0934e64ad1621926d4c96cceea6c66175eab

    SHA256

    2ba3dab6b3ca3406a49a3443604e4a3cc917f2767afa50cd63446cc7941348be

    SHA512

    5c5ae6bb7691416892287b65bd2673742b49510a008dd8828ca1d25c270a64a0f2bc2392036629959fc468c9b0bf5ab5d60f9bed5968004876dacb9bafd4ac01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b26a7ba66fa6a1fa3b79f3c705f8492

    SHA1

    254103d197e8838b367691ed7d7b256e10e68cea

    SHA256

    b839663826c301a64d3250095e2eb659a96473050887f2e7172c486a5eda38a2

    SHA512

    7c00bdd3d157b62709bff064bceb99e00335c77b401001f4a1a2e7a8d4fa1ff5583c9a6c58144366ba3ddf8ba4929a4998cd4cc54a20662a324c92f7fb575695

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34e65e882e5eda82fb5b97616f2fd259

    SHA1

    2a8fee8297cadc1db2d66f5518a9aa68d5ff1429

    SHA256

    9a28ade8b849be094c11b06cad7fad77845b3d5be314f0b5314ec2de97d5706a

    SHA512

    9b044aee49eef0538b0122dae5da68f74b24968e0a82db505829a4004bddb9d6b0a7e1c402626735e224d8edaf25f4bd27b4a406a33d0860d9ef89cdef31cfeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1103042ab83a2da7a9023ef1f43556b2

    SHA1

    f1e6ddfc98b847cba14ac3d11e5062251d8c62b5

    SHA256

    b0bee5fb76506defdae074a656b5cb65aa30967bc7720908f3db7cbc1c97ab00

    SHA512

    6c190f2af038d39714dfffdac962679c57b454961941874522a341800b8cd766f8b5dae22735c9e51469210cfa5386681b20961a8f53999e2c4ee2d399567c29

  • C:\Users\Admin\AppData\Local\Temp\CabD359.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDBD4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b