Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 11:11

General

  • Target

    39b0ecc6ac0f41b268503503f55ef44f_JaffaCakes118.html

  • Size

    85KB

  • MD5

    39b0ecc6ac0f41b268503503f55ef44f

  • SHA1

    a938ed3911eb856e5dc468c75efed5c7632dab0a

  • SHA256

    9fdbf48fedba67a1bea39437a85128e98e246086fd36657ff811d76c06f7ac5d

  • SHA512

    f3cc9c275f1d3b3bbc3bb15b4ddeab783d5b6e4ef5b4b16c1b356962e77b83cdecc5881b860444d649a7d3952c976f62bf85f94d2c5d3f3ea0bc7fd26d63e74a

  • SSDEEP

    1536:H+ipVn1BUNqvLKvr7R/8nV9WCUHSo0mjiMpbqqvmznhKv++nPLB1VJ:HBvLKvr7Rg8iyuznhKv++nTB1r

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39b0ecc6ac0f41b268503503f55ef44f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cc861ff4144328c9308af9ac06ddf80

    SHA1

    48c850ee65afed340fe5fc5f9354546039e7b94e

    SHA256

    4f857d6be91940d8b0c063767ca6ffba38b1c0caa5b0ce59495c5bb90110e8fd

    SHA512

    edc30f853dfec6da0048e8719c927bf14fd754d8896a48cbae6f83870fcf13e2b2f9510a7db5377aa0ded4ded2de99caadbcea79bb18bbf43e460142db614b9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a94bd79a7ccaf3a1248c70c555372183

    SHA1

    2513c34a35768333a539f31218da5e56bfce5165

    SHA256

    ea8d10710ae40c85e7b4d523f5a138ea1e4c1afe5a7abf3f2ce5b8b5a23a63d4

    SHA512

    98cb9606eec512f16939d87b3c71a03175770f6aec50a46c7b5235718b6027396b44c2141979620f31b5640156a1a5ffc494379b9368bcf0354437dfdc875df5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17532ea18e04283e20b21f91885ab7b8

    SHA1

    b4a2d8206f0fc6c0fe0797e4e90df3dfcdf6ce0f

    SHA256

    1c5667e5622abe1a1c20d49f8bfb877f53bef302ec1b12a775974a8108a3e677

    SHA512

    c602fa6fc08b117fc00e79b4b40b36936c1679ba089fea848c535651ed4b32d48935e2e54ea9177426e863326dbecad9245ffc41b8584eae9ce1f0f336b1dad9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72f592ca7198350e4ec64ad5a9dc9bd8

    SHA1

    ae7130bf4bb855dc23b082f3acc026b073f7b81b

    SHA256

    6c35b9fcdb02edda1130ddc5739f1085f1102a2155fff53bec202e4d05562978

    SHA512

    ec7be19b7cc66528aa2048bd9774834c9c787c96ff6ebf01f3f2f125c53c93f9b4791a77a00ca0044fdb9e7cf2321f99ee3335e345650ebc2edbc8457baf337b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    393e2861aa1f83a11b54f8e2a3910783

    SHA1

    65b6924464399a5720a73c805f1b82e973470979

    SHA256

    110dd8cbcf7269bd81a5bec224a6fb6de1a324395a412741dfba548fa9aaa8f8

    SHA512

    c439357f3af31a8df8a549b32203fe25646589f0387cf5711f421e575f3dc7964453caf80889606810479dd12ebff3ccff9dfec97ba1e8c916674e80afb77604

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf2dfa2ea8f4ef99ebe893864f7f1709

    SHA1

    57fd5f96e3d4a8e417933eeec0c077c3451a16a7

    SHA256

    2cc63ca5c83a8db0bca5560c07e4e967e81b19dc5ad9d7b3538fe1cc6e728a37

    SHA512

    ca7b920d39d3557537f82fb32ff5e36454e0bb8b3675ea1daab87a8012f47f5bc4311c82712373f31326d977a3ab57d3ad1622873369e6a7c4b47757b434e218

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25647e00050152f5136227e31b2b1522

    SHA1

    0c7530cb37258e0a88a6e12b10a69af9f9ba6f12

    SHA256

    5082a5436269ee9fea0719eb77aea062e80de3b43d073f18c5aecec41c1e83f8

    SHA512

    18ff11fde35269c3a03997c78496c3d0b0db26ad6c4161e006e09d0335a3f99991277baeb66c9ae23a3c35696cd96d53bce2f5f71cbd122fd132d98859273c90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bd709e3f73dddaab1e1071dff640bd9

    SHA1

    370254a198d7a4cd87c9047eac0de6ca582954e4

    SHA256

    5d69ae25651c7c700f4df5f33056c19290e65b7243a4c0eac700af36bb727979

    SHA512

    d077118271f4cd85c3b9f1094afa8ffdc70eedd424800f906392988f97cd1346a67a398480b7bdf6e00576721c4a9f79efc2b75410c7f890249ed24a655cce1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f87196552630b780c6af4583139493a5

    SHA1

    739c0a59a03870e102580c5b2a9fd3a42bb0651c

    SHA256

    fff27109ca44a0e6f952ad940cac1f1ab8b33d2b6a68abfacb48e581088b4bb7

    SHA512

    d819df71e81d2b237aac569a1c939fbc281243a59c3efed2957e828604fa39edf28e3d983f6ab5b6a5a45c5ab389264cca667c689892cd58372c5cbe44e97cb3

  • C:\Users\Admin\AppData\Local\Temp\CabA537.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA5D6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b