Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-04-2024 12:53

General

  • Target

    07b612f6d69724a004e590a3d4218154_JaffaCakes118.html

  • Size

    93KB

  • MD5

    07b612f6d69724a004e590a3d4218154

  • SHA1

    275ff098f51153194fbeba09bce0b818ccd054b3

  • SHA256

    5b6078765c451a42d1878ae7b955d771ae98b1800ed49dc8ce82f10d04cefb0b

  • SHA512

    a03d89dcd357f22cecaddd2bce4d75b8f2fb8b381fcd4faf0c46e0f595a970dc1f9e37b7ad3b0f07ac26368c265531941c590c2dd74656b658ae0612207a8b75

  • SSDEEP

    1536:EGFbPFIatl0k3Rrh9hBP8r5GyOHVXP5HXhwswpwIwGz3YxOwzwsQ7U9L:XbjnB3Rrh9hBP8r4y8V/o3P7U9L

Score
6/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07b612f6d69724a004e590a3d4218154_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 4840
        3⤵
        • Program crash
        PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90

    Filesize

    978B

    MD5

    b5ffd1384ea2cc3fbb18404ece0d223c

    SHA1

    26aa83aa4514b0cceb308c92f8f992a5ca714fac

    SHA256

    94c0b7c584eeb89716018df3a8f0ea8237f40f869dbc3c32c0b07271a8965572

    SHA512

    5d08e43a85710482c41b167b1aadc85e6899dbe181e99b4d0fe2a0f0e45115d5b1bc8a8ff64c6c0f84f98fa5d3f5f1898ce98bd6ccd09d591ace8dc990fef2f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    6a222d255f6fa0d30c0529cf3c8b8bb8

    SHA1

    b08a89ab63dacdb87dd479998f8a26cfcb9499e4

    SHA256

    98362f86a2377c5b5fa0ace88062eaadd5a2c9f3e72e5d335996acbcab85e7c2

    SHA512

    21a4143113b590a760b6f86958b4c3e3f7193f8b03d09874311ebea70474799efab508a79ba9f9e5a806e399b03f5462c0bcedd190cd0ca10fcdaec468fbd4cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    13297cf0c119af198574c9cb140d1829

    SHA1

    afb9acdf80172e49466f944d8c2e7747f7f35cf9

    SHA256

    1d4603dcd60a86376dc72fe725ee0683ec584c5e626e086cff046c13feb5c2e2

    SHA512

    9acef2768ef06d72bfa8beda9a090efe9382400aa7de541c69caba5b7b4bee763aea6cacbdaad1c6c5299f03ec66359e5e9f64a6442ebbb05abc44888d56d9a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1f663b892145c537cb712db471c14f8c

    SHA1

    59c2b352cf25ed1bfe5a3f823fe5e4a016e962e8

    SHA256

    6960bec281ccd1b1ee4c6c788de6a679e4dbd09fb02e1ef45aee7c71ab5c3f14

    SHA512

    7fc861cedaa4fc6af65f33c077bd2ddb65e32b76908192f2c1363a98702bfcde8b468b17350a46c11c4f38c696664d3a6005c0327b0e67b479ff5669fb86f66e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    74f00e400a7007232b08e474655f01a4

    SHA1

    6e2889b0b9f6e5f3756894803780590f7caf277a

    SHA256

    824f170787b9c9389408bed93167a15f00a063e414d30c977e23c71716b7701f

    SHA512

    18b3170f5409bbfa9410aaa01a49b584a3c36184ab0b262163140b0a227c4ca73102701f4d60fe4d99a7255cb6427005399c958354960da63c3a88395e19da14

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\css[1].css

    Filesize

    972B

    MD5

    3c50d5bd0eab56afa223d3ad177859db

    SHA1

    0647ea59ec724d19d95d55864d437f5ff859183d

    SHA256

    610c1b2c92a60ca56e43aeb8e6809777edb0befc76afdd789821ea3dbb9cf4d6

    SHA512

    9742f2af25c95448b648cbc35fd50cbbf0dd19de1d28a6dbb0ca9143448757e86e24a842b82f7f705b4aaa6617d5fcb250c36dd596b708f6fc97390cf9f31b85

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\css[1].css

    Filesize

    1KB

    MD5

    09cf233d1589f5010ccb55336acfd5a9

    SHA1

    6141c5482039f73882eacee7849b580e2f697b3e

    SHA256

    fb9b899fda0b7eb50488eab5a65b1459f2871a487782417ded78a50cfb0b3616

    SHA512

    c47c359a3194bbeb01766e658c575e6321dfedace3fb45be7280a95cbae1998c17852f82ac4950fbab37440439e1b8635c30ad28613b756ddd0329da17785188

  • C:\Users\Admin\AppData\Local\Temp\Cab2A4D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2B4E.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a