Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 12:58

General

  • Target

    182e6fa6e2f257e7db6c875b72c93e7b_JaffaCakes118.html

  • Size

    143KB

  • MD5

    182e6fa6e2f257e7db6c875b72c93e7b

  • SHA1

    2841d5952652452618b26addbbf9646cab93d435

  • SHA256

    7ff7a616b6a4595c3461f58d14b8483099f2f36b3c9e9b85a057ae6f7f78a966

  • SHA512

    dc629e145f1b56d653e9794d154667ee22799fb0965a0d8c312674edfcca689d010cb39f0e31a962638bd02a695c1bc5803b49f89a6b7d27da04b9e37d824b75

  • SSDEEP

    1536:S1JimL9Ru0+O7Pix76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SNeZx7dyfkMY+BES09JXAnyrZalI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\182e6fa6e2f257e7db6c875b72c93e7b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8f38c2f668db23d1569ebce7ba8a9722

          SHA1

          c074701b679e14501604ddd14741a531265fa4ae

          SHA256

          6e910903b21419252f5b89b604d2d4e860803ae33a924f0582e967d629373e9e

          SHA512

          70f81f15cd5f62deaf86dc63bb298ba863143aeafe8b2f0bcddd3a3e44d17b01fb8b2ed0f78d7c7c296ee9f63130f9a9b7a00fee7689b56fa6f4c8f0a9d9cbfe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e02252f089478ec7c974caa4c1ca317f

          SHA1

          fc75eb7922f7c484be92b471ec04df73ac2fd59e

          SHA256

          3733ec6699362903cee09cf68a415fea6b80518cc04b09b15aeb14c75363e10a

          SHA512

          f8492aacd546731a68303b000bfe4b510ed92ebfa6d487fcf9ce8ab752bb7718900edf37bcc071820f0545f9ad1d80f16003e88c2e0000ad90c78145ef876b1c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dd5f7630bcc2c43c2df9b2e647ca6deb

          SHA1

          786e0b34b1afa84563be988c36d8c068a5a7db78

          SHA256

          6b686de3cc4f6e45051189ef26a1d0438330b1243314200966780aad136c5f97

          SHA512

          f1b135b474c7a9da023860c2100b62fbaf16b9eb12bfb18f21ddacc80e611f320682cbea118812c9caf4e4901188c65ab446848636e2f150af036d08f966b8c0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0846fd7466796e0e84a51a51f71207d7

          SHA1

          1fd3a7b6c9cb17d34928eed03b7ce3be440ea45f

          SHA256

          7240cc08eb822d4920789a0fc982beb536847f28b869ca465356f5da01774cc6

          SHA512

          1d7a5e4f992fcfeea8be0da253d1aff6a3ff3f54c81eb860567aa41e22f4c855a5b6e469d76142d4bc472d0c2a6b18eee60e4bd3d172a37b25789294a3d2b9c0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          98fe303a469aa2070bc981cb051c0f1e

          SHA1

          891771225832a30e6c91bc4705a189c139136dd1

          SHA256

          a90d5310f774f83b48d3fc4701eecddda00f4f7faa29f42e3d939d1ffcd0214f

          SHA512

          f6d4c4d6543a41c5769cbd806dec0b4bf8052028b8174682512f977fefd95b7d6b2592bb0c887f27ff268770d0ebe3f2931b2b8c4e75df9f743843248466dd7c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          12220cbf898eae0b1728b520c11c5f3f

          SHA1

          9a2509e8d9e9fe2a624f1e022548ff9f1368310c

          SHA256

          346c3d1d214962bd7cc9f715c69739b9ec15bb71bde00f6421281b4beda5e437

          SHA512

          0f3c57db2a3c2b34c7d1340cc3b388c7ce8ba3446e0c9ca7b5acacf7758ff43f3139b2a1c98f7383eeabbeaa0e12fa48ebf11e60ac10472f003968b97bfa0956

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          830fb4728e5f7d6aee13965c100ee041

          SHA1

          81c25e69ac4c629d2f1d818cd4b41b9ab762e29f

          SHA256

          365a2bfb85054993d891143ce15ce441a0fa56dc6739c0633a2cc9e73894a334

          SHA512

          344f4a3845de25bb5a4199769e4203287a43e7ca773326db85854f51e4dce3eaf78b18b621ec04473c00e357dd0855b79b2f0f52dd0d5c94bff51f0493036246

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b39b657698e49878d9ba6e5df09556c0

          SHA1

          f32536b4d864f8742bc7ac884bbb049f9690c5ad

          SHA256

          b7411f81f4a0bee180dfee996cb507a010265f6e20bb00aa31d281d23055903a

          SHA512

          626ebd3562cc39c9b958a442f2c7e481243c282f1b9d8eb4a29c6608bf686365e25a6dee0195343c799a126a0371d094fd02a84b5172d1637f8b03809023d9b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d50b91e2873acaa7e176dc5aee0bd528

          SHA1

          31d05fa3fd6c482adcebb393ddc35603eb9c95c3

          SHA256

          3421b9905ed0d6a6146d784d32f797fc8cde91cf33af10e7a7332124bcdc6b75

          SHA512

          ada6a44bd776c1126e7aa7a45041a45b3b023e1e11b5f9e3a0219e00b0752f66acfd3db56d3b31ff71ce41fde6b10300a0f440a046ad33af35d0ba97ae380ed9

        • C:\Users\Admin\AppData\Local\Temp\CabF5B6.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarF627.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b