Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 20:16

General

  • Target

    24db6b237b8529d201b5ceb129296213_JaffaCakes118.html

  • Size

    3KB

  • MD5

    24db6b237b8529d201b5ceb129296213

  • SHA1

    59ab7d291c49e2c2cd55ff64399bf4d3a3842245

  • SHA256

    a5a33863004396feb3894ecd490ab985a4d27c9b97e2b95599fe34a35d7a1064

  • SHA512

    263c91e1db5b831328f6b5692602d1a17caf2211e97d2703696c973827f7110baf4bbc8a4c62772662dc0d5e0631dcbe5e94652a1a937da8724324412947359d

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24db6b237b8529d201b5ceb129296213_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d13249bf318a461bbafbb4d1be532246

          SHA1

          4b2a088edf1350e7b8fde9349ec7f9dfc0a4b30f

          SHA256

          0b021526ce76bfc43c0b7af31c72f741761e6fbc9049c8408d5e0b916f581130

          SHA512

          fb4ccb4d25b2f1895899bc3256bf7c3b09f6a0503f8b0a6fd4feb3963a6153562ad4c00b195b51fd332030cc2256f01c0fa4bddd58256b1d05e56f3f8b2fdbcd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          17069c1f5363ca0d4b6062262abbaec6

          SHA1

          7bcf19d12b17a9bf2465fc9979a3aef96882b30f

          SHA256

          d7bcbb77e80de95d43996b7e91d979607ef05bac46d44b831cd39c33051ea9e8

          SHA512

          b2dc440d1aa46919133a085df102d48d8259c05cedde028089de956ce37c6ac5dffc80361c9a66a75d9b650895faa15d277053c9954fe154de79b6f527ed77d1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ddc57cd206f48a4d8658fa9d40bcff76

          SHA1

          9ea6fa4e8cb7b466644dfbca62e1bf7f69f37f6d

          SHA256

          b2d58e0ded756cbc0a7aec11e9b0d939dc9b75ef6eecbc1c5c1a3fe3642de14e

          SHA512

          b2b156f9efd93f609508b062507a4b5fff5a1b4017a9fb4cac98c58b62205e4cdd637c4f9f0395a6473524ea199b739290d1aea218bed12f6e836915e66b9e4b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6e90cbb6a269c2cde6c5d3cb7ac01900

          SHA1

          4226788dc98b44b1547f4430bff989df131eb2a3

          SHA256

          863f2d29ce33a087db80094531ffeaa51dd2141a68be720dc89216b1b547f983

          SHA512

          d53381c9427f6af1216c55ab5ba362e4e683af88255653d662c0f1f8ce6fe02343d566e1b64639bb07f391c5a02314f5977d6da65539a8257442cd5f4e4f249c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ec2c396ac36eaf08e8c972d3b00a5609

          SHA1

          7207cbc67be3743c8d589b7619a3680c01a8ff92

          SHA256

          d9c76b3a2337dbf708a9f083388990e16e49e02b253e8573b37eddc867299bd7

          SHA512

          76da2d40a2ca89e9c801beb55325866c7a2401842616bfc7a4feeb4c1694b701cd66defc56360da8ae9c04882e91ee642dd7bfeed5243030dc4acec893c2d0d5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          11e096ccadb644b4d309d492725083cb

          SHA1

          974e5a968cf6a813ffd1c6e2db7a18ea6430f0e2

          SHA256

          1100f262824bf38202c4dde49211e9e5ec196b0dd1c18945bf66858c2358703e

          SHA512

          3596da51ba39dead5d59b3f3d7da2a22be6258796780aab54036680855258d504f9f197c0f8b55d49179d26dd7080bcb2cecc3a1572ca80dff8179d545139018

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dff22105307bf7a2acd85b52046e8557

          SHA1

          37c16d849f9f2d39529adf7ee07c359aac0638ca

          SHA256

          cd3ddb038e6806187081f7f054492c4edc275ef4693cbeda90798ecf85810693

          SHA512

          457f768bfc05e4b91b94a1db00dff53aafa011babc42c8ef691dd0eda41b25f4aabf512b6ce5f425e1e75f94fba6a35d370acf93f9d1fb5507a4e6c5f29467ea

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2aba8a3a8a1782c5ee5dc37107e3a691

          SHA1

          21b8668bb305245334ee4be75f0dcceb536c642a

          SHA256

          e82c65e2eb964b5184a51423f4f6095ee998f67baefab390d9912a5d73781a06

          SHA512

          94c2d9223d7d7f8c0c6a676f6cb204dc334f6c9df940c060a45c09c9b47aa517432aa95c5c41dbf87c542c756e5a3ca32f111ff1f163bb82c8097a2c12811d8d

        • C:\Users\Admin\AppData\Local\Temp\CabF06A.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar1F99.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b