Analysis

  • max time kernel
    132s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 22:30

General

  • Target

    10bfecf799b3d682ed88d77409f0bd07_JaffaCakes118.html

  • Size

    85KB

  • MD5

    10bfecf799b3d682ed88d77409f0bd07

  • SHA1

    dd81bf82b70e0d9abf9a365e5eff23dd31602ceb

  • SHA256

    ef5ee4f42328729fdfe6144804b70d04b49763fa67737eb83a8952572459d580

  • SHA512

    b0c867a9bcf06bce75cda01dee467f4ae334c2d478ef472867372aa6de7514237d06645a9bc12f77d4c79ae8eb4abbe776babc75c556eed3b32e53da92b1d3a7

  • SSDEEP

    1536:/+ipVn1BUNqvLKvr7R/mnVvWCUjSo0mjiMpbqqvmznhKv++nPLB1VI:/BvLKvr7RqUiyuznhKv++nTB1W

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10bfecf799b3d682ed88d77409f0bd07_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2159616013245032104016ea1d635390

    SHA1

    f50279fe6281372c12eae19c6d3413aaea4f40ce

    SHA256

    512b8cd1a41ab8401d7138921991818bce70408992463320c09abb152a3f88c1

    SHA512

    b173a21be972a3c2e8dc481fb877ccaa0496ff14d1633d9cf4b9455dc03cd4aee9197d1ce39949862920c06aecbb8c60fafc1d58f7ebabf399bc1f60f2320068

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37b7ed920afc800e620300c0b6599285

    SHA1

    48a814cf9f82a3246603f2e2a2b3ac9f748b1f78

    SHA256

    ae3a55438ff1255fcbb7a98da4dd62d2869108279cd7576b404fe48a73f97fc0

    SHA512

    fbbe4150d494388f62a731c3ab6febede5bdf7b57112d15136edbe79ccb8095516e6d5bc8391366195df5762244ae5f86a1b9b52022f0fb3886705729700af6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7cf3be0f22ed5a639a7f1ec0d998a14

    SHA1

    9030dc47cd467a935f96696d3c0b1f803ef63c9d

    SHA256

    35b943772cb920d5957213b1fa1bb1fba3783d4558c74e368882ceaba40e2c8f

    SHA512

    175a4cecd1f53830dcd450a137006b0173b0444b02aaa5a1623612758846301dd72776e41a87f7697a471dafd9ae696162a6e67cd1b416ed648df980c2558d78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76d7d657d91b8ca8720fe2868c4c17d6

    SHA1

    1d4149efc6048aff6e144e646d87ecb0968112d7

    SHA256

    4463726de1cd5d5d6e1fb97eb45e39c86d77bb54d5b4854ff914dadb87f1aff2

    SHA512

    15d14b461234a2823996f55c056566f15adc7df0e2402aeab5d29e7ee8e33b73427543604951e3710bcc271532247668d4f072fc5a3570f362ba4e5eaba37211

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08764b34a059d7075c805b27bb3a58af

    SHA1

    3a069776da6e01c3522459fe3a27c570e2525f28

    SHA256

    2242c19d8014e27ef0c94e6d29bf1a038ea0767496dd2e2c9a06c1747a252726

    SHA512

    488d448c2bb739e4184e0b6af5bd9222fc5837b78e3d19d3a03b5bcb77106980d38abc941ff8a687a474cde856e9b5ad1e514a1e545ac8531be3f514a1bbc5f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ae6e9e83081627a6fc6213dba4823ad

    SHA1

    dab75ce8176fcc1b2c6cf1e5e05296ae6834ebd2

    SHA256

    36f86d06cac163fdeb9862c73217f1ea3a2fb97d2beb59d588335378e21f5244

    SHA512

    4ef257732997115e1ec4c6fd48a273030ba0e3db0ad5fa7c3384451b36ee3e597443e25c3b2f50e3da25ed2ebd5d7d47200532a69c28926e649f2f0c33124aab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec274220467d6f2bea20083e7ba5e56f

    SHA1

    608a9aced629aeaaff18be951a253d419b2616be

    SHA256

    5b6421980873a6dd30c41c2755b47989e047f24f6550d43a52dd78e44d4e67f2

    SHA512

    41843747fbcadfcfe2644c94dfd53de800578afa3989b83289558ce6daec0524c5d07a55c71d8d39fa7f91219dbc37e7b64d0f2f52f6c13d3c230cc27f53eebd

  • C:\Users\Admin\AppData\Local\Temp\CabEDBB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF185.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b