Analysis

  • max time kernel
    139s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 18:53

General

  • Target

    ff2a08a129dd6edbfe0603fc76ede6f4_JaffaCakes118.html

  • Size

    60KB

  • MD5

    ff2a08a129dd6edbfe0603fc76ede6f4

  • SHA1

    93ac5760406af5316eca9c0a0e74b293cb55df7e

  • SHA256

    a7d2dfb7bbfaac06cebdc2f5836d6ab9433f00a478f49baa81fd56e51b4b387f

  • SHA512

    7833f458494c0122eeb263d48ec6671db78ff7281f1e28536d33f98a9d7566db0c814d2f5f9cfc0719cbc02608679428abfaa51e5cea771e6efecf10d4663b3c

  • SSDEEP

    768:SS5OhnHJLx1n7Yy+EzQO2Tku1VVW4gOnEbfhpv:S+snJxF7Yy+EET/Vo4gyEbfhpv

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff2a08a129dd6edbfe0603fc76ede6f4_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b64958049e072950bc22abbdadd17a9c

    SHA1

    9fa15065661ec4f37130cf5f0dfdb5306742e615

    SHA256

    a7a218632bc859366efb45afdd5be0460e3d527c983ffd9162bda3e029265f95

    SHA512

    c3f8a772ac0b590260589e4f78539458b369d3a13fabc3809b562b5e9fb33ea7ff8dea3e17db8c18cefd8a08f4377c6ffadb88d5e2e0867b5396d1966ae98e98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    641f4bf6b9dab498cc73af404c27dc08

    SHA1

    b9ff03fe8a19db41e267d764f08ed24b12fb57c5

    SHA256

    6f07d2a9766df3711efca66df112c3e5b3cb3693225be3fc3a4ea2728cd312f7

    SHA512

    73edf5e23835dca89eb7ccb7be7cd2646664cb620586b638f174672a6c8f26a5963666b85abbdd734a74248666390b9300734f07c2751d0a431090fb526d0983

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a1947db6103e244594d5b775754ccd5

    SHA1

    4dfc31115abd8a0764376d1cdb77d2dff0a7246c

    SHA256

    287ba9cef3b8eb75b10f469757ca40896bb8eee8347cc13370e76cc87a83ddc3

    SHA512

    388bcf8796e3eb3c1547ac5fdceeca9108a9f10dc23b5f94d3f1cdb732953634e12eb6c067e77344bd0b2d90ad860628241e46fd5f232da51dc5e23359505b3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fccf9a087297ff6b16061acf813ac59

    SHA1

    f922892093734623918c74ec065c7129f22464f2

    SHA256

    bf4c46df155351d315ee9359769e797ce01553bdace54f919243869204be694a

    SHA512

    085cd30a77583bb156726d13759fb1a1d4cbdab64737098047ef5e67a2811f0bf43acfccd03f7fc5fc4b7887de67115c2a94059c0852945743bd11d7a0b399f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28259b957da6aa42d44ab46aeb79d4a4

    SHA1

    93f2dccc5b168037802e796b2f20d06a87ce95e0

    SHA256

    68304307e5f34d2258ad2881d23fc05e306a1d8b756ee234ee216195e0ce9d9b

    SHA512

    305908c0f45def5fda09fd3273b83f6b466ab47ce6d87e33b3c5641204195c4545373bf0e752d9a596db492d2409081b6b6456a5eb9ec86e8bf8e8a10edc1c25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c47e8b3661ec3303de69415e76269c2

    SHA1

    ec99c6decde9cf542095604f95051a28df170ed8

    SHA256

    93077efd3945d60afa0e270ad227f13f3d04df86d3334dfd123c308f20dc6698

    SHA512

    662cb04347fed7de2c04dafe7459987b1413a796106b686abf865646885b2f0b0bf02172e54573cbda1702638ea08426192f6dddcbaeede7ef694ec22bd245b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63387900eb83f40f34cb3edfb0428005

    SHA1

    fbbd88f711ec8c0dbd40a89c415e23bfcd4df9ac

    SHA256

    78124cb8321a102251b60865db524ec80a30b9db7bba4b7b7aba11f9b2ae8e68

    SHA512

    8a8659f78e91ca9e983c85932c27b421449ae1e1eb7c3df0a8c8bc2ce9a798dacefa77238b866e7abb0601580bdf649b5eff036400e2e777b2fa8ab162308eb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38e262cde6deb993d021b74a5a9334c6

    SHA1

    f51ef060930c0c18fd5888f0e8aa88b14b8cb38d

    SHA256

    16e4bc223ddf2fc5f89283c8e46ad5d6b8ad65ac097d6a874565375cb1a0fec6

    SHA512

    234cd10978ce746ddc992adbd4b1db97741dea9c1ed52070177ac74d2fd8d546b5126902697909f576efc4e8dab80bd29d0962c307307bc327758b56528ed21e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18a0c4ab3bab550f3f1663ef0a78e0e2

    SHA1

    a85c60b0be0739bdac68b4ffb482d2b64d599103

    SHA256

    f7c083a46a862c1dad7523b8471ef3f7aca12a3fe27bc7233779175e35fa2ecf

    SHA512

    7cbbb8369ebc30aa8b40cc65871aab6d1ee4bf84db65755ae8c4e3a1df17793ae425b7e522183303c406db36d3e28b01e290efca8562970c49c388db3146dec3

  • C:\Users\Admin\AppData\Local\Temp\CabC65B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC71B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b