Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 05:54

General

  • Target

    121b33962eaaaf305e04bccbb2595b83_JaffaCakes118.html

  • Size

    11KB

  • MD5

    121b33962eaaaf305e04bccbb2595b83

  • SHA1

    b7c3ee8cb9662d36b35a172a3f6756af608f3568

  • SHA256

    a5368ffd7da6ef7d568a2740ce39b93e6b17b3eec256418dd70fee729b3a3b19

  • SHA512

    02b3d6a05084c611169b61d840ff371171236f9c0109c4c32ad78fcea89cf1845f27355fecb37b22d603e4d3b0bd91dc46eaa0445c5f7ca1af446458c6b91aa9

  • SSDEEP

    192:2ValIsr03d+8k/w1wvqydBz+nyXlu4t01JauBuLbdU8d:salIcudu/gcdBz+nyXlu4t0JaguLZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\121b33962eaaaf305e04bccbb2595b83_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    530c2e603987dfc8f84dc3d402c818ff

    SHA1

    740481aac76cad8ce0f1f67756c7dc538fffcb17

    SHA256

    4a997d6813d06fb81a71c5ef613cc97a6d318c59045533bf8293b48753d77390

    SHA512

    bf722bbe5dd0e37bc03b225e4a2cc1acb52c0b4eda74470ec7154471e5af117666df677946b236d074049147d31a3e5bac5c3a85ae59e9419e1e26f5fe415f48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85de55d12840064ae1e747a7cb4e5df2

    SHA1

    0184c0b6d1a8336e69f74b82f532f58968364dd4

    SHA256

    33c5ccf4c213a335aaae3de378aa2eabf66c066ca923c5bcd697a673a7fdf60c

    SHA512

    8db6ae5cca078deed9d21c82ea719b29201265dd654e3956484d0fbbc3bffa566add78950fc7cfeb8f47a5352301266b7e1538d0836f0c3938704350977c7530

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f341943c270daa09d723ce7acb07c3b

    SHA1

    c354d03f3664bb790c1fb1c09b339f1a6301d749

    SHA256

    8eb8839e3476f8f50da26ae4b3e670855ea1a94e1bc7a57da20edbbcf94e343b

    SHA512

    1f3aadab6c1a9df811284eeb00839b1fcf2b6c56aea2c9dce15546db6122a670e0d2d0d2ab45bfebba47f91ae4b25c91d06ff122423308810b2c43ae79ac999a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9f9aa1ba85472b43a8ab767b045aa32

    SHA1

    0b0e1871d6591f5355f6e432a1deaec7b1dcf624

    SHA256

    19502c177cede0441fdeabbc2488d4ed4ebfed6ed7bf504b4af0ae0803c722db

    SHA512

    45b3c4eea868e67b70378aa86d8421febab62e0675d3b47ceebdcaaa0ad6216634a12f494c32a970dfb3ee8d40426a334201e9b77d9f3722197966e1b517fe78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    221bc7ed25a29ec80f5c1caa18771846

    SHA1

    3eab42d138736d8109025803cf1ae6b71edefc33

    SHA256

    c3a8e8316af27a16e7b946ecf16c3e90df2927c667e162ef13636eb963cdc076

    SHA512

    5fc1d96ad967c91f1462729684e20d49c3c52fe67dbb02846fa37d886d5df28b31bb05d3eead74f0a67280f0f8a75cfff9c38fae622dd128331e3be30479ebf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    698aec18b091b7d789a4c6f6a705130f

    SHA1

    0d9ad7a83b8ddea6c70ad0f473c5590968b1c059

    SHA256

    e412569767c20a960e63952e9790f41eae03471691cd4f7f1cc21b752b1bef79

    SHA512

    a469794ad06b99bcc035d6666031d70b71fe548c0e8b73bd02bc9f574646d1970de691c7b55210e8c287415d43a2ad1ff2d2f065de845bf7947332547de1671a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e94d67d6de16ef7875c626830af6c9c

    SHA1

    750b7afddd3b4d82d8b628fdd046474ee328092b

    SHA256

    9551b72cbf550d8b9bc54407d2b8a5ee86389567d4413772c168d8f4539203a8

    SHA512

    84ee5bafcf98a31de070d8df7531c47fda53d97bcec29d4eba7a314a2b0f916f30c45b9a88372d5f1bf32c97164bfd64871cc4d0b2e7fe9c4379b25cf87515cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bbe6f6792aa2610ea612a1092ee5095

    SHA1

    22a45bdd6f5450acf560eb368dd71871e9633e14

    SHA256

    efe41e275e28867add0dd01d566230a1335be1505b058fb59063dcf5ec969d7e

    SHA512

    30d4b69845d3a5f18b083f4a4696ed5bca1d0133cf2c9a733cd09123a18b02b40ef3956cc911eb79dc8535467a7bdf3e52838908321f0337942352b0658fb0c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c838ddcad907d9840030bb1878e188d

    SHA1

    577b15d58336d99e2a9dc5a8ff135e7cb40e21d0

    SHA256

    68cbf0add86e3cbd1113d6578b4135f5d35c58d61d6105c08a20e1212d949856

    SHA512

    a61ca06d16e41c10260321b2cef5de0b89eb9813f4b3d845745986928b92742cdfa54539803b6ed1226b0728ba311b0c5d1bebc0bfdd27a29f0274bf17ecb364

  • C:\Users\Admin\AppData\Local\Temp\CabD819.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD8B8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b