Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 14:04

General

  • Target

    303f29b51d58ca48461d2279a04808ab_JaffaCakes118.html

  • Size

    772B

  • MD5

    303f29b51d58ca48461d2279a04808ab

  • SHA1

    04dcba0a030f4d606a7cbedea643ceb526d2937b

  • SHA256

    ebfc66a42ce23c12a59604631fb706aa3b29d3932bd2ba79f4c28bb4a116363c

  • SHA512

    cdae851d36620c6c7bdeee9d423abed1716bd872263fdc7f3ab1e114bdbcc3229a1b69c29b297757cf94a460495ded037ce22c6515220cbb7730f92ba7c23716

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\303f29b51d58ca48461d2279a04808ab_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8db1b742ee4082325cd4c0dd09828ae3

    SHA1

    6b143a056058c7654c2d4106b6ee80a7ae70fc67

    SHA256

    b7638e1283e673f2e3661c5f65aaa45e869090726b35d24d5b7ff98165f38efe

    SHA512

    4b894f0b436137b61e19333378d344c6a43f1871bc9d6f557ae37e1cc94f0795923943104aa2540f8af1f15b4ca414aea6a85b51ac92c10b96a64c3f964ce246

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    924f929fc27c4934c006a2a9617afcf5

    SHA1

    e9f32279adf972e6c284d77acd1be139fcc1e80f

    SHA256

    416d7b9a5ca03ebbbe4f79f29729cd3f143031dc718c9712bdc66ac3c7645b48

    SHA512

    93e2c4b838242ce250323f4dcef4bc8b8725c919c4a01ac667f98027a9faee7e40ba7bc7c790d94d239771c2f127eec1ef08eb956953cd3680b8dfc28f6db6ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd17833781743c1334060448096c63ab

    SHA1

    65b738f1c0d45663d20cd29e96b81f6e0287f279

    SHA256

    3f6dedfbc871c0d30eae782fb1a6b1ced93e15389429cbeca3f7bd39c70829ab

    SHA512

    112c77a4cf55de0489c5b7db458b9651c6f9ca820cb3fd50d3ef0b5af5466abc9860eac3246b838a4d00960dea032cb0d7a7c5220366059bba88ee081ec8099c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fa072101d108cf364ea2cd1c55b7f56

    SHA1

    82095b52f859c3a1084cd2929349fd6dbcee2c66

    SHA256

    4dbd3a4078683cca63a593efae6099c8c22a474a2aa6dd027af5467e2e07e89d

    SHA512

    6f5c46e7d01ccb754fb8ca6b6034b15ce6ccd1a4225b6e934bbbbb6a7bf77c2d7f40d8b5ff1ccab236116e1b2f776e6f4b903a2c580746307afe93cabf03a87c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1a0470689b2e66aec2b2c1c5fdae827

    SHA1

    6c914c8b3567ae3eef66c62df47c715a80b047ad

    SHA256

    739a5204417f86936111986d748d75d35135416d2b95dd88f5d1d10bee0ac2c8

    SHA512

    b41ccfd52615b20035adf831b2556a9b4d60fc510893ff1dd80a692b9bdb836c12ed947dba47727e57292a7ee09b81aae41bc3135713c1caa31e25400bddf09b

  • C:\Users\Admin\AppData\Local\Temp\Cab671F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar806C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b