Analysis

  • max time kernel
    130s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 11:46

General

  • Target

    ff34983a02bb4fa2d6893ecf40b405f6_JaffaCakes118.html

  • Size

    21KB

  • MD5

    ff34983a02bb4fa2d6893ecf40b405f6

  • SHA1

    b893411910d81619f025f9e237991fda690827de

  • SHA256

    29fab8469c59bb4b7b18c78285f28e5eb089c8acbdf30fa7228a9211c4c8b8da

  • SHA512

    41beb968a7c7a781a1a6dbb4fda7468bef81a7f0f5191b186c53a96d3582f2fee9be19fe5cafa0f5e2b4fc17e59b85d885513f59ca20047e5e79da8a6d6e2c24

  • SSDEEP

    384:pM8cC6t9lR/uEKWGBGqkFFtHwDTDmBKAoXu9+ObI+uZ80pzcSpjLJ5RVIMxu5YYl:p/at9lR/UDmFtHwDTaaXmnu20pzcSpjC

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff34983a02bb4fa2d6893ecf40b405f6_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    24432ce3d36bf5e25286995ecc12d790

    SHA1

    328c2d460fecf54388ea5b652b7fcbfa7928a7eb

    SHA256

    fb7b74a434d438aa89dc9ab6aa78a53bf7a76fb44195a3661b785dca83c990b1

    SHA512

    774ae33479f9eaea926e19d681b44d7a0af9f8456eea0f1688c8084bfe17a59e61953e98f8e42656914a3f80c601c315c20a69e4ec073813a0eaea7f57b748b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5fe827693053edad6215545f097265ea

    SHA1

    5f1478ad17fccdcc77f6028bb4776fab27c83908

    SHA256

    a2f14bcc17c8c21b2a6a37d30f0c96d9a59bcd149cbd8aea81369e3d039d3629

    SHA512

    f563c8e44877069022fce76325a97970529e836b8affb958be12727be468463923a41a5afd4da91c4e9264f0ebe8ee08e5b8883eaa7c57604b21994cfaf8c4f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e80ef26b61d6896a4402946bf1d89ebb

    SHA1

    c7910efb393b35c10db0307912defa6324b80c5a

    SHA256

    e61980b812b15bce4ae45fd076fc654e0281a002e1b86fa50dde171550769f48

    SHA512

    ccf0022387d20e2e56a2cc041dbf506ad422c013061614631bc90f205e73f5ca8c641fe72bc0264077c1cf7f4b911e4673d0b9f5fef69f3b49feb991736505e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c267383fda3e0697ceacd2701acf30c

    SHA1

    eb2764e13d8eae6e482d3e4d1a4e228cef88d745

    SHA256

    137ab42aac55d410183236300ebd97d5d06dc64111c0aec56cfb04f9c7f5cb0a

    SHA512

    9d95ff3d0eb60bccc58fa8d17278129d1c0869d78fffec47a849d30fb27c913eb34913d8973f46a06c5b51655c233bd371e805233ef6614f0c02d13f1b6908a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    0d47654da338ea3e95b48e29b7ec48dc

    SHA1

    cc714011eb5ece3294e8b9693f65e9d2231a162d

    SHA256

    2f3c81f836743dc551d88979a829e4306a52a4b4ba89a48c561aa833e17c2fd7

    SHA512

    a7cab07afcba6c64c840b348593cac819cbccdcbcda021d45b4699617768e8302efc434d53201e70b408ac0c579d01394cf546de745660526887d303c7640ed8

  • C:\Users\Admin\AppData\Local\Temp\TarCB42.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a