Analysis

  • max time kernel
    144s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 07:12

General

  • Target

    0040a8fe13daccd8f264e34b6649ead0_JaffaCakes118.html

  • Size

    28KB

  • MD5

    0040a8fe13daccd8f264e34b6649ead0

  • SHA1

    3ef52abfe08657adfe8d1d04d8e6bdc8ab5a26b0

  • SHA256

    3a57135bf147faebfd4785ff7448a1a4d996582f60b8ac4745c771b92c178f91

  • SHA512

    53826e39802d9de65668d238abd047607b495f730fd5f010ff2537e44bd16d7c16503fdbd077f550f3932ee9862c79bb0bb77cf2d136da4fba6eeda5bcc1cbc9

  • SSDEEP

    768:k4d7gRbTIGhTHTO3OJFNh+bnI+q2nsBcDplEH77z3HAAxdZC3LR:dd7gRbTIGhTHTO3KFH+bI+qgsBcDplEe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0040a8fe13daccd8f264e34b6649ead0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    003898dc6e8ae853a1109ebef1f67bee

    SHA1

    862c3308fe15d2dda4a44823645872fcf16a7734

    SHA256

    8edd760beebb6cf11925425720acb26dde5feff500b3cfc4ca3dd4a79ac17a15

    SHA512

    2c6fb021c8270301e28bb597aee8cfdb09503f705feabf8f49c958696a30f610dc76b4a0333df04dc4ead22c8f114c19f45ca8fd470c089046a28cf1fd1feb9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de2bcb2c5c977ee7646eed4ac0cbefef

    SHA1

    e7c43614deece121c95d9fba22e2f20e249d8f87

    SHA256

    b700a013579799ab3e8a4648dd310f5fb2340b232738b77ab130c96f85ff99e4

    SHA512

    4dcfb32caf710f9ae50e7d7aba310d5191ce7da26ed417ca6accaf98a923c1d343d032a2054f43ba3848d58ae09e26607850300381f630950b5b19044ad8e8f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    062a7fde87c9810f830794c6d2272e06

    SHA1

    f936b305a52b99db439412dd2ef6378bb6f1fb2a

    SHA256

    e3e415337ebae4d7918d91fa9f0d4a4f8ecf676657b07d9bb7f48459aaa8820c

    SHA512

    0b37540f35a86a9e36f5789172d278cc4f16779f3673b6a884340105db25fbba9ab2f54ee844508f9d72a98f9408df489d5e8213637196e4c1980c5a29351b2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    27a7b878ac0d2dbed046034ff84f064f

    SHA1

    bf6233fe120d91401f9b0c4ebffd439f3279ca43

    SHA256

    5efed6271a019c785ebbe11c88a2dd0b63f8486037063e29242ec54b0c1abe13

    SHA512

    277b788810374caf3d13f0dee74f1174e01479ea16b7b9da6c1371b6dd0d10f8c08c15664fe06413d5939b5e431cac58dd07f81effa68b96673125eba4d9ffe3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    015a19be7b9284b0fa75f560dce91a98

    SHA1

    daeaca3ccf3a493559aa437d9bf8010633a49ae1

    SHA256

    e00b7fe6e78cb67d2ef72d6b8d28b0b0b3d034c2fde68353ea53ec99d425def9

    SHA512

    503b2882776b01b10468264a1eb73954cca7a62f149f6e9edf50c17f0a3699cca42b12c9da1fb1e6bf7ce5e6bd2d556fbb3291ad0522199a2570efd652b4a92b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    ad394b2a913aa565d58cf676321b2f41

    SHA1

    18dc52d61d40c28ebdfb52d166e836aa45954b24

    SHA256

    d1909e021f9f83a932ee893bf6a81e454e7c2876c49928a384396817d63a3a73

    SHA512

    d2871ce6ab3e34f329fe58adb2ba96307958207c37437d83a88f339a9e4957adad4ab60a5ed6a533580f5a7a184e1a40ceea5515175d6024e0f18c3cb77c19a1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\captions[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\Cab6693.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6694.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar67D2.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a