Analysis

  • max time kernel
    122s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 09:56

General

  • Target

    179d7f1b6c5f9bbb45c36446f1109cdb_JaffaCakes118.html

  • Size

    37KB

  • MD5

    179d7f1b6c5f9bbb45c36446f1109cdb

  • SHA1

    d50aaf85401d3c4ea7a2540646fcd812ae4cfbdd

  • SHA256

    f0252459da8e422ab0440d2069fe38c80f57fc07e5a749c44fc0e5a60d7a0ef3

  • SHA512

    265de7af2d66fdf71429d897c14e818c6899d59177e119865ab06096a61adc949b1843c7c6c9ed7b2fbd62bda6550a900af8b8ddad6543b1b20b2ac0d84ebffc

  • SSDEEP

    192:uwHW1b5nj58nQjxn5Q/XnQieGNnSnQOkEntJpnQTbndnQOgWVcwqY8scwqY7WcwN:qpxQ/ZMnIpQYV3O+Qr4SZf35

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\179d7f1b6c5f9bbb45c36446f1109cdb_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11fbe9f4a22ba4ff1ae9ad40e131ef6f

    SHA1

    6a17840b3df04956de1b375c7d6b8a060062a3d7

    SHA256

    33656b8309f44b2bb15e7b96ca69f415e19c79ef94e7a9b486690861de0d1be0

    SHA512

    61fe1f6b36960bb86c855204eb65d484bd59385016e26894f07092c66565cd9f6f73a000ab179521a904aeaae27b5ac04b18f6e00d3ae60a1549912da91db2c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3c3557af92b0ff173c7348bb0a2f82e

    SHA1

    13fb3dbc82d83765c98f69a936bbc03f2cfa90a8

    SHA256

    8fe9856e29f20f0905977480960d0a35219c858abc3dec602da2b4618f74df74

    SHA512

    2807e93ac8c913d17e0d53e1e7d121b786af231606ae75117902e7273bf3228e19d4d570ef02d118ce6f25ca038a289ebe206516ff925debc0ac6535ef84666d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04310ca2ae1725faff2945c4c343fb15

    SHA1

    978ac5569e64dd65a41d83546444ab9081dacb66

    SHA256

    6a58962db30834243abd709d21be23c70e5abb5d32d198ef216cbad3451b0af6

    SHA512

    ebe7331db46939b7463f3d1846f24f8d39e4b5ef74d76b419a1edbc79207da9d9603ccae50a347e94a81f939a1b33b810b8621be64601ffbe08bee9ce28c3e2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15ca188dce663dc30d7fcf8cdb2ebfdf

    SHA1

    55cb2f360766f24ee5bbc81da9de23b07e03e431

    SHA256

    a9d31462c0d5d2683f3e64cdb9d356ea60bc171ab1d048c82b11273f7940f4d0

    SHA512

    acd3f1ed36bef095eba5b87f600838f1364aa7c849b1f1445b77a77695ac1bec898a909200b073b9d132c6df28c4a2afe6fcf01a999f9be585dbee0db312cbbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd5ab0739b71f92171cda5317569cbac

    SHA1

    b98bf2cfd64800679e7f7368b5cd6bcbac47a430

    SHA256

    44889f68de9da44b3ab066325b72b6bbae0fabd550f0245d9c4036468cf262ea

    SHA512

    c8708e7c6d065b864aac2b0e825f1dad0b9f1bda5a5b8a881b46cec0a2cc4704a9215fcfc8575c09947732fb372508060fa9aecd5d1f04ed509189a5e45e453c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29ad221fc50c23a2224e4989ee6ccb6d

    SHA1

    8b48be5e9ca84f6b3145a3a138555deca1a78009

    SHA256

    ed7f55dc37d358eacf9054c0320b965783e56619e99b0ce945b9db0559d469a6

    SHA512

    06394ecb21383b278444fbfdbb5a1bb2166c94573cdf3d07ab7f3d199aa3ef28844df34c98e384e8e4fdb4db67fb06cfa2be0244f8f503363df0a52755050e64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    149fbaecfc0a3e9e4498b2597aca0a55

    SHA1

    395995aef2778bb353cd6e22b1b34b8939fab996

    SHA256

    ce414a1ddbad7d74bbe07ee935d1bf1ffca7178b803736d2e2e3a1f9f823e2a7

    SHA512

    d944bf0793b828addebc1557e4b3bc16702f59dfdc24025f7b20ceacff74b5a379657849f433f9dd6ea77afa9f60ca4e059f82ee8c57355ec5132e4be45baf9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c02bec1b7d71dbb01cedc412be9e7fc

    SHA1

    e1b167eedbfdd43011575b104501498b8e668be5

    SHA256

    b0688d857bd45189a7986e22234eb6b8da1d7480b26e3532c1cbc050eeb60a44

    SHA512

    483bc20d2c8ebea0387f50d81363071beeb7e13f364b337ec621dffeb1e21b3acabfff4a778f2dd6a74f72b8d2db147a88050eb4656ad19a578a9251a62b4fe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e7672fcf2649119e3b775f6b64a57a9

    SHA1

    e3b4e560e076b294e4237a06a7f1a9125004d84c

    SHA256

    3b60491a7aafdec7e9b4ae6f78fd93237e7ae527fbf1ed59ba22a10b31ef2c66

    SHA512

    1f29ac595fcc8bdc196c1f7133bd620411049f27fa464f2170b31bb075638d71d84bdc6f2dd8c6c59010fdc649a6f9917d84e7c5102a8e917e1a987f9d620919

  • C:\Users\Admin\AppData\Local\Temp\Cab6EDC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6EEF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b