Analysis

  • max time kernel
    135s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 19:25

General

  • Target

    3baec660c9eabffd98af94e9f2f8548a_JaffaCakes118.html

  • Size

    6KB

  • MD5

    3baec660c9eabffd98af94e9f2f8548a

  • SHA1

    b4505427bfde49d54c4525b6fe37ba7578eab184

  • SHA256

    769bb727946e3349dc731324d028fe1b75abceab4ec3057fa83b7bf9e55021b5

  • SHA512

    d3e622379e9a148d7ad7825eba828461f493a7b907297769b4db624e2fd94107e9d5d3660a522f4a5ae00f0905f9fe1af5b4b289c5bad273c81fc973e61195f7

  • SSDEEP

    96:uzVs+ux753LLY1k9o84d12ef7CSTUSZcEZ7ru7f:csz753AYS/Rb76f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3baec660c9eabffd98af94e9f2f8548a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab60e355808f3e89ccee87cd2494e08e

    SHA1

    a0278f128d2c6d64d46b0723dfad01a4a81ad6dd

    SHA256

    675459227529f0a96e8dd0021756e4f7520d6e19c1fbc8bc662d76be298ebbf1

    SHA512

    22ecdd553163b1a8b64545925dc0c4e79aa73b9adfe8029f90ca4a20d39b7295c39528748afb33f6e7aa4539b9172073abe8697139f2fc934c2b0d4c2fb80f67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c160e566a5f33f8f0a497e471f15df48

    SHA1

    6c3c7dbac8841728d59c7fb213344c5fce6d4f42

    SHA256

    b71113049e5e0500d81b3856d9c96da069efb061e3f8d0a404defa083e9c224c

    SHA512

    5f16a245175581606432562dc998d30ed4c57bb3b1e61112ded3c93e5f6521ae4514dc0ca2baff9f326d21dbb8b5fb0d1349420d2c381187151d9af380192be9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a5f01d359ce87c0caeefc24b696d44b

    SHA1

    95a885db6dd476e0c5ab14b71b3fdcc61609da55

    SHA256

    8f92c391cfd99f3bb78fc3b915e3f9718ece9f6a4a504a6f3a8edd5f22bf93c1

    SHA512

    2c8a5b7a354c1d1b82f899debd85280160580f4039b119487659362cc005a7a7a50c3a91b90927603fd8491c2ce1633a468e18b0676a168a5ee6d52a70e86d75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d44240df7750ff1a36b5bb008ce47a17

    SHA1

    99017ef7e99043af43fa28ab3da3dc8f2cd28f23

    SHA256

    af5ed4f5f69914a310ca2da6f6bddc782e5bc1a6efead2680fc04a96b99406bf

    SHA512

    7ced5aabb69a51cc1d644eb7befc73e9821cf33eeec49d64261f2f56b79413151beae1f33886b62f14ba35554a1f5f89e6cd4a17a4ecf7f99cc89cca9838d635

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    433a8a38d5f2527524319be98030c39f

    SHA1

    85298aa4008b6b907fdd379eb76747f108ade55f

    SHA256

    9cc02d47951b9ee096cf1efbe425763206610429e8faa93a5d6fa32517d43cc5

    SHA512

    becd0254d061a52e2bff4deb4fb3856b98b5727c71745621267e64188823bb2e959c8b50fef8984da917653bb97dfe3f704af590166a0a13794ef56a2faade7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f12a4ce0d1989642b3fb564ff8204fd

    SHA1

    54bb3d71b045ec9adb31408b08feaa43ef0c752f

    SHA256

    37625c7e3cf7876542e3c94a0d16afc9ac699520c28f5c35dfdcb0f39dec6af9

    SHA512

    31ec2853e87998348076b73575a28e32b40f1f858fd3a3bab85dcb9d38fc1cb0552af4d5364ead88ed2cefe9e4a9840b30b3ca8052379b434be4823482139de2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d72c18add9cec36edb6ce2f2a6524f5

    SHA1

    eb431c4fe4d671ada785332b0179f90da2f56b19

    SHA256

    185510fd27ab5481609c60337221bf2bd4136813bf6cc1edd1b16c4c9751d0ba

    SHA512

    b22ae434e6ce41997433030e08a0b8e9ea35607181d7136204c55feccd3444a4e5e4271794fa6a9e5128b2d2e736415e823df865cef65a721b979cbf33aae8ca

  • C:\Users\Admin\AppData\Local\Temp\Cab288A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar28AC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b