Analysis

  • max time kernel
    129s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:14

General

  • Target

    b4f0d82a7b0e3bde7aa6149e77c89d43_JaffaCakes118.html

  • Size

    20KB

  • MD5

    b4f0d82a7b0e3bde7aa6149e77c89d43

  • SHA1

    14008ed1e106f0e118b188277dbd364f01d5eb80

  • SHA256

    871a845b4754c3f0f03a19f4becd3260da16e61116b4f8c47fc9468570e043ea

  • SHA512

    4b1c84da2d86533efbdc2f90ffbda4313dd5f244d4d9816887c6c7237b19d95ad25af168146ef455e49dd11040f4863d456e8ac9c5b1fb8ef5f317b490d6afc6

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAId4LzUnjBhN382qDB8:SIMd0I5nvHRsvNMxDB8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f0d82a7b0e3bde7aa6149e77c89d43_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c63fe866a154c966993dd96461f811ff

    SHA1

    3757440a75645d4864427ff14e69e4a61d511bcb

    SHA256

    b3bc46d7c346c2e1f8f654d5785bfbd0962df134e8da0775c0808874ad6de20e

    SHA512

    1cffd599967919c3e10f51e31559927124fb69b9f4bb3c25664831b6866e871d397518ad68cfe8291993f2dc4b5a012b9e5bce8f413acadbe3907f1420b41425

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c5f489d250a5593279f2d2a9a3ed1e6

    SHA1

    a4001d292f9eed352862aefa8916756590610914

    SHA256

    b638934cd6b4949b624ce10c900c5e17709915510743d1b15dce63ad304962bb

    SHA512

    d459d5bbd8b8411d30a5f74e95522ecc9aec922705f6ad55421cf8f9508cbf4cb980682cfb2d547b3e6de3e3632e5993a788d5bfb0c8b97f2a9f952c95faa15e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca40c31f4ffe4084f200734599ce5070

    SHA1

    0e33f9ce917fa24fa2f1e3f3527b49e6e5120960

    SHA256

    d10a2a30c64ffc4959d6aac5d193ca51dedab01ecac097e6f3a0640eb3d22b2d

    SHA512

    a82c4d8811e9591f692baada7aba3093ff0a97dcb6309b8bbb0c0cfd48b88e1a02384c2f9d574c9616f1b14cc87968fef43d213ecdb64a6968e90a8f7c466435

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d83871ac58d0f12ba48298d4e365ec27

    SHA1

    83fd735011fb59af94c85b1c8d02888a80e9a761

    SHA256

    b020ce28c9891064c7f526d5015b37e8f9df8f4462c8706ef524206404abc135

    SHA512

    83c0140b8acbdc1f549ba0e6b7d12fc8069f604211dae6c784aa1eae0f587daf72ee1d9f945bf6401597697dca20a5c84563197166930fe2e0fe06e8db48c31c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54add1ac80d23ea8db6bc64a02598ad1

    SHA1

    58a5e0932beca6492b2615bf015a1d26f032b6e6

    SHA256

    444f1e4fa363bd2cf66379f258722ad912f6654c5e0d03ef9007b18e9501d2d0

    SHA512

    32e8eb7bf5bd331488245502397aa379eef5ada2a82d155b64a358e392c1d6c40cc250f814a3c8302499e5c09160c55a44739503f331a21b69c776a0737bff3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f055640c39dbc536d5b7e59a72926d75

    SHA1

    a2b3bff2d86043dadedb298fe3f9980f45b7daea

    SHA256

    9aad4a85ab8cbe229df323c69d15524dc83ecff4408fbdd59077e603b63df586

    SHA512

    ce63dd4a95c31442ea71a9a806b38487c5a3d70474452ecccd29adc0111bb63b02ad23f660721ee19ddfd0ba5843012d5085203e809faf5f224ef22e30fbf8fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67232a3ca6c92277d01884025b2e0570

    SHA1

    28d2681773ddee23ed330f141c276bb765bbbb7e

    SHA256

    0daf436bbd59f402ce16c1370b0717c4690fbd128e6277520c071c92de987298

    SHA512

    f0fceccdb9ec57d3c8ab18be13bdd3573d2a1f82cd8dd5c72885ccadd3c7675b8b05a2912f82c58f4fc447ffbc8b01eb6c60640eb50343b95b1b4a6573bfc485

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f87a180b8ce7e64eea128f680e8cc6dd

    SHA1

    dd11d2f3b0a1dbc35f043df54e3b46c1dc9439ba

    SHA256

    cc807a4498f8cde865443c8cde75ad0f11034f6f23c6fcc21f36eef5e6746780

    SHA512

    044dfc0eac7ee857673325a5ac92bfeabdff86812f2df4a4d647328a8ef6094b499ef81fc598ddb8733cec31f8ba0ad5ce3347eae87c84ba98f0bcdc482e55ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df3b5747ea412799986cb7612df7654a

    SHA1

    ac3ec89e7ec6d86eeb2fa5e01ae54daaae5d0c04

    SHA256

    dd6d93c996e8ce1fcba5ac0c39d6fe285bfdcd3931ff97b2567cf53c239929d9

    SHA512

    6229a3dd785c51384f36b8849ff7596360b1d39c1b7e0e93f7eeb938514084a347d837080ee83be822bbcdc5923f50f9d465937eaaa2d16b66884a271f2ff841

  • C:\Users\Admin\AppData\Local\Temp\CabB7FA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB8AA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b