Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 22:50

General

  • Target

    ff6ef44636e2fac0f8d3e3c18d4b7f96_JaffaCakes118.html

  • Size

    18KB

  • MD5

    ff6ef44636e2fac0f8d3e3c18d4b7f96

  • SHA1

    7e9abc08fb368467550192cde966364abc231d9e

  • SHA256

    b9bac9071fe5ad38f1ecbe734a382ca59e053b6902a578a9ed51442e97dbcc63

  • SHA512

    6d256d0782a64f41e79c1738f724184f93cbae38c488f064f8d1919a4be9ca9eea66f23d0097f4e1f932c00d656ea4ef130c151a8f2a181a4d790972c01d6398

  • SSDEEP

    192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI14pzUnjBhvB82qDB8:SIMd0I5nO9HJsvvKxDB8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff6ef44636e2fac0f8d3e3c18d4b7f96_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2176

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          747de088d66c5b0eaf3037792961a190

          SHA1

          87633442e8f5348c026f745871b81e3b52719800

          SHA256

          3dfc29eb5e5a8e91012bd1b8dcb1819c3b78f2bc39e9127272227234d93b8c40

          SHA512

          7b255076c3c4792ddd6a91920f8c434bbc30bb2fc7ae364df9a81bd721a66c572d40096d5fadb3da127b167e8d5f75062dfe09f94223b52e6899aa6575b40f12

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aff0f7ab346f84c3705fce14b19d645c

          SHA1

          dda66ae0170b9aa434819bdd877db47f6dd4b8e4

          SHA256

          3c1efac4d4fde8803b84f2991d2d56c45d820492a7937e043a0c617b236963a5

          SHA512

          57255f18717b3d4d8ee7980a53d45a2916bd7ab80eaf589810038592634f3c55b644108c82532f45e261355a7ad4be5435a2e4430499f0f45fada84eef2b17f8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ca4f2a7e88395166d8b997ab069ae7d2

          SHA1

          a1b10279cf8ff4288ec39fb04b9153fe8702b5a6

          SHA256

          da873ed0a62e4d072ef689f4497a0b1d97b437fe195b3f71f9816c7bc46df5ad

          SHA512

          733e58e286add0931eae25ac79fa39696b00c73a8ccf81e67cc8972387e96248f21868116a8c604650009e48ed634ad79ec95097998fe3552d312da9374598fb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ed366c638947d9f217b89da20cf259f4

          SHA1

          433ff5d21fb667038da607413455325426caa055

          SHA256

          f9a3bc61f789f17d37f20bdb59abf7870eb3333fc82cac4de8633ddfee8382c1

          SHA512

          7cc904ff842f95a9ac2fb0ed69738ef2cc1ba713be8b7c1967dc5aafff2c7a832a2bc67d0f22bb910933fe9ba30534dc1d634987b437763b01f28de4fcb4a0c1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b3fc2da5fe82a7b630e0a04c46de804a

          SHA1

          4cf913bd4aa4c5a49c01a14cbf9fceafa70ef08f

          SHA256

          d5b7c0136adabc9413e47aaa05e605ca7c13dd5678c2ee2b20da6fdea55a791d

          SHA512

          f5879f0611c72d19a2d9236dcb9252382f16a6d13c65420e584f9e6f4c039fdf0a52265ae020c953bb6b06f9fb8a0944aefc95904e2fb5b89ee64f2a1b6d30df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          db26031374186567379c200e190eb83d

          SHA1

          ae267e19230ade70d4e0192ae0cfd9f087cdd9d5

          SHA256

          755da3d082411c87133114e8339f4166bfecd926fc757712ead85ca9b05f2f14

          SHA512

          58f4cfaf73e6b3bfb602fb216ffe5f9b2eb076271828819538d88d282ea4f27b34429dc644f2a954720a8cc4cd9282fd708cddd759695eecb2c7b0c69e1e22cb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          50edb92c3f8f8b4ea87058dfdfae11ec

          SHA1

          9506ea02b50e6d8011afb9ac35a798fd7a0b4bf5

          SHA256

          8ced6ffa1babdc648f8cba78dfa016c20b63560d20ba696540ec38a0f8c45be6

          SHA512

          94373294811bedba5502a6d15b3f53c0d07f52d0a729cbddd1df050a9f822a0ff15633c629e96ee48738614087b95cb85722dc4f056bd66265136767a160750c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          71aac1cc5f1e13053a7a46b456e2e584

          SHA1

          703d38137824208c23c1fb1d171ac3f1dc0ddc21

          SHA256

          630611adc509c55197ad18055795d145aba846a7a7b516ed0063d2166b0f68bb

          SHA512

          577c122dd10342bab186649c96b0f631892e8631e1210ad21720f7f28e9860b4100c7c2969535df0b3f04cbf7a9c711c81fa06393e411d14704d32dcc1e970ae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          48bc013bfc14ead90126fc8111232263

          SHA1

          3f2ba2c5cebc5a426e66324173996d1542925313

          SHA256

          ccdcfcc6eeddbce90ff97350236a89000399660c7cfd6ac6e6ce5f882d19c7d9

          SHA512

          831bd99d8399f617c03479d0e5e9ab00d02658182dfefceaf5be9fb348356ca2c9f460132e71ee031790de9ed3ead6a43ceb561b69bd4325e5508c3f8ab589d4

        • C:\Users\Admin\AppData\Local\Temp\CabAE0D.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarAEAC.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b