Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 16:07

General

  • Target

    40cc3ca2fef82a8a66bf8cd390e317a5_JaffaCakes118.html

  • Size

    5KB

  • MD5

    40cc3ca2fef82a8a66bf8cd390e317a5

  • SHA1

    1b3071704f0cf46aa78fd6acf242cc9eb9a195c0

  • SHA256

    7d341d9e43994c15e8b60c96da89390bea190d3748ac1e082793b8b0d6d8bc1b

  • SHA512

    3b3838fbf56b1d462569370d08f52eb0ce8583f9486f82748df30c49dd6a5a7aff488b204d9ba916377c5d52bd680ae90dfc580fdc5e084f0dc09f920ff5e147

  • SSDEEP

    96:8y+cAl5azln+DtZogzD5hBniKFe8LDmQIjK:8OAl0z8DjDtqKYQDme

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40cc3ca2fef82a8a66bf8cd390e317a5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08a1c5182c3e32c691d53ba12aa6b84e

    SHA1

    7ae2bf6b0010a93b2b1fb33922e557a4e9238639

    SHA256

    be34e3fa139829acbbf7dd6367d92c337f6bf057a0a4732dc3c9852c0cd2b9d2

    SHA512

    4f14afd308143bb5024ec74e2ae85647235db65b12b98e49cb81c6c795de5921bc25aab9726476d66e3a825c682ae1417cfcacfe2f5b4882e1caa4a4af6aa5d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e410f399187213ea84fb64269e819381

    SHA1

    24bfbec58f8989e0e44bc13f9e046c8d01e85539

    SHA256

    7e83c94bf9f8c6b4f129c3013c3367f03eb358eef9e8109d3bf28e14fe308d75

    SHA512

    09220723ce5b4100140a3235148c6c5c6f1fe77072119a49afc54f9b097856b11820c6e80cba86efade1e387f725b7ced9327ab6813fbf90507e9c15722f5c50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af7360e3b17bf4b41830d2a88d8149a7

    SHA1

    e87b2aa7392477a1c9b663357d0f80cf7f8d7aa9

    SHA256

    af91acd69f610589fa3ff56c139feeb8329530fdd81e0bd280341d285b6aa9dd

    SHA512

    512f542e3f335ecc033fe1d0701852e5a0b176e958706f0f7eb11a344f68fb0ccd446184291d856301d4bce0c6741a79c5f18de14e93bf8794625225ff223172

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb9a44a28b6700d4b3850923f1ca54bf

    SHA1

    5042b0fa2eb46bcc18e14a4457d1051acd3c1995

    SHA256

    661e37168e9621271874bfb1db41f9f528e0af54d07ec3e202c400ba2b633be0

    SHA512

    81f7fa4c144b757f21c77f7fb6f09a2af21442a135046b160c3e143aa687c632392e22ee62da39fd50d6ec502e7fdbb19aed7cd4c1806fac51a32c4aa85ae12b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3cfad669b4bd5cd682bd78a811ea271

    SHA1

    8be8494e4d41333d3d614e2ff5a67ea54eb43d1d

    SHA256

    4dabf1a9afa3fa1bfc9d472839ed7158d9daeedfd7f70dc7ddf24fcc83babe42

    SHA512

    6c41460cd842db3f2f1a0f7b657a9b39a64546738be4fb3cdcb98822a0bf88f15f9fc05a0a90a009f749daa431ea67b326f0cc571c78fbc59439a15d62e3aa4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cabc487d80628cf2ba9426cf0da0a4e

    SHA1

    51f44dc41c51adb011eda8d38ce14bbc2451a5b7

    SHA256

    0ef61ccb47b284210acbf1d518f0ed3f1503491b0b967e1a641e1394fe521030

    SHA512

    f83b8dba984d864a739b38ea9a52d08a479f8bb29d0a1b506256144147c98bb06eacf4b10c959f144d98e25925b537389da362598a95e343a9205ec684bc9574

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dc2f1a22f5a159d1b72c225ce194ab9

    SHA1

    3070ae55e9cf7bb2c8b0e24bbf7e51ce0ebc0d75

    SHA256

    232eb4570e89c9731609452c36f7059be72591503061be5a5cf4a169cb6efeda

    SHA512

    a930f27fb9c5b049a66a3635dfad38b080e339bbc881107b6e30c0a698aa7b1f8d6c348b7ca4aa37d34c7188f39540e39025154f2b55ee7674b21479d29d9d04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    773d1bcc2df5c2274f7cefe31492202f

    SHA1

    13fae30103c3d32a542235ea282f62789744d81b

    SHA256

    20dda837deedfe8cb381f46f952414c32c21fcdebe07b2ed3082041fc92ee733

    SHA512

    9c639a4c1dbabaddb39215c5641e02ae24281a5db979272259411a9d0100840389c8f79e96c11eb9e9a65b433e9469f5be93d4b6fe00e5522682b55e3db898d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b53bc3a13007887c5aa713c97f7f2ac

    SHA1

    1699300a2d8da468ff650761a2839909e6b0f826

    SHA256

    38044013c1e9737222c2094dc29061c08d3dc25280e0348bc953eb2defd94b07

    SHA512

    4ab084c414928d992d38ed712af602b152ed5ae63405a5333fb8dfa1de8c5b2dc26c2880a624e6ebf4304c25d9de52015f01e947921939feaa70dbb1d2deefb4

  • C:\Users\Admin\AppData\Local\Temp\CabBBC4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBC24.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b