Resubmissions

25/02/2025, 16:10

250225-tmwhtsvpz5 3

28/01/2025, 16:58

250128-vg68tavpgw 3

28/01/2025, 16:28

250128-tys7vavjd1 5

27/01/2025, 16:24

250127-twh9vsxjhy 6

27/01/2025, 16:23

250127-tvw5bsxpcl 1

27/01/2025, 16:22

250127-tt83haxjcx 1

27/01/2025, 16:16

250127-tqthmswqgx 8

27/01/2025, 02:40

250127-c5ymgaxndr 10

25/01/2025, 04:07

250125-epynmsvndw 4

24/01/2025, 16:04

250124-th4cwawmhv 3

Analysis

  • max time kernel
    1442s
  • max time network
    1453s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16/01/2025, 17:12

General

  • Target

    JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html

  • Size

    25KB

  • MD5

    1d93e8597dd860cf81cd913c4b997818

  • SHA1

    a7dacf6a32b194720a87130a16f2222c44f036eb

  • SHA256

    6514b345465786d232a61f8aca8e3b60e2bf8a3e45f237086e55caac0c19cb4d

  • SHA512

    c35592acafe20b18914ba7ee31201faa7534136df292d7c14436fb3bcbdd5f07b96b3b63897509068b8263ec4e12f55e192de027996dac8e63e08712fb891e98

  • SSDEEP

    384:PqlIcCtF4JVGTHyk9v1o99t5W9ISFaTGHx6QckT/gbpLOXguLZ:sZtSF5zg9ExLZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d143af574b1614b8d185bb18f1c4401

    SHA1

    f5b4ccea00c5afd9d28948c0a95430a727507665

    SHA256

    b1a1b75094bee2586c31a09280c9ede7b83bbcbdfa7ebc2aa36f25346a2a7f8c

    SHA512

    f97c41fb8fba89a9817722a6a0ac4d73ddb3980973e2a3250eb22a2b3aeb49620e963f3e915299e4cb5b86d964b02c3cfea8d0fbbfb02e14a23e0c9efda22362

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b01cb421399a13032da6d68aa37ac47e

    SHA1

    02e290bd7d86ac6a92634b83ae77545a21944f20

    SHA256

    ed4f01b76f8a110c4c974a1e56478257c0f51aa79d6e14e61eca918940bbe9e8

    SHA512

    e88b5493a9daeeb8f9624054d4dfa6dccf0a3be7e890ea5599068d30318e001b02de9886b2f6250c47b7eba7027f0b4736b818df074b2c8e855ee0beb280a153

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3822ce82c2ccbc294d5231b1007ad280

    SHA1

    a2a81de0873208add2dbd32ef38dca6e0a7dd5e7

    SHA256

    537f4b939bda073002547e5f5567eaffd97e21b3dcbe07fa6e3db32731d3aa76

    SHA512

    ab434119697ce502719fad93115efdc54e800a8bb322daff9ad8c7a038e09c292b5e4af99d35c97707c4392d47b7f78c6800fe159c4e2e6936bcd1674606da71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cce129560cc17a96d049104d28db8d4

    SHA1

    813311a9a9d16b3cc4cdeeb9eeb09ec4a3204fd3

    SHA256

    65ecfd7409f8766921b8e5580a3d1f1c5756e58e106dc49180aba6ec1795f0c1

    SHA512

    619cc443896ddc3c767eba8d41210781b0dd38a4d8626e9cd5782f2df475abd0a62b7b220aae034855e9ad5835faf5004e4aa95ce24e871306a50a21623b1d7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6e5d073f8a5e63ccabb32343fb59fb1

    SHA1

    6f0f969310b03bbc76c110a839ca59a821ee4cc5

    SHA256

    214df504556446ce5af328d04a27c581b730dbe8b728088038b2641a7bddb6a5

    SHA512

    928f966b9843e6118883269e10aa0226e7f41219f62aa7ad344f7d3d3b50fc46a2a7ecd254e916b334cbb58707a9e69f9d0c8c925c095793cdfd0deba650b495

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4c8354410365925020bc183ea5420b6

    SHA1

    f6865ac15c0ec049c17d2d8ad04d532f90269f17

    SHA256

    b4176667bd93b31596b67501ff2ba01cc7b5a570a0e2bedf08eb802f4315a89a

    SHA512

    87d97d0433eb5f9abad06ed5482481c8fcc1231246ee7d13a08d3c25a86716aec9f11c25861ee7f2feb25bdb89ddb9c2a04a53ff1755c697093a8b4c30612719

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    218623aee3b5420bd15863f325da0bda

    SHA1

    68d7c6741f6a620b208a435198293fe43248e46a

    SHA256

    93eafaab640750d60fae4a6fa4a8a0b6ce83c9796fd68fb0ab6486b9ef2f7858

    SHA512

    cb3f606e7f2f2c339ca9e49eb95eecd0a098c52d73c514c47f56335ca43eb913caf913157096e2fc8b72215e7d8d5fa247d8665246d947a1be0b12b0d062f62e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1e1ecefbf8c9378bfa916576711ddd5

    SHA1

    d7ca16fddc371a913e14b11dd67034a4f1a69580

    SHA256

    505de13aa78d75c1cea6a7ef2c02440c07f7dba7fa06ca26a40b111cef79ae69

    SHA512

    b52224cdb6e1213e6c4d93dd30f3561c663d643f068f75dbbca3f033e60362d32f9181f945a4adc9460a58454dc37c9d082708d8b9c86a9711514b557f2ee1fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b081ee4b02238726bc2c6035bd411545

    SHA1

    5ecc51ef1ddf887fdba6cd186a5e976842984ea4

    SHA256

    bf5ca2cc2b2e2bc52f6d7239f1214863947eaa5f45f05f8c68d2c93a32776da8

    SHA512

    b4cc578d43a3ce4855eede0ce18cb744508751c1d5b30252adb5abdc02a3cd1340d289220d87f9c7b6146ef7c7ec1311cacdd05b7cdf78abb3aa774d1d06cf20

  • C:\Users\Admin\AppData\Local\Temp\Cab7520.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar75D1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b