Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 11:22

General

  • Target

    09ab667ecf5918b029c8eede1431799f_JaffaCakes118.html

  • Size

    20KB

  • MD5

    09ab667ecf5918b029c8eede1431799f

  • SHA1

    a3ddc8f5db845629918fe1205ee2da3a067b98cf

  • SHA256

    d0697e6bdeee55b59720acd1f25a3a70a40c01c731c0feb4aaa28114f2057be0

  • SHA512

    a89916b6519a8f79e80659212ee8d9fa3cd62c941dcd8c2aa17556929d9117fb72fb4eb881bfee4f4a791ea2844fdf55399ca37f402011a8de7873d99bb6b664

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIs46zUnjBhW482qDB8:SIMd0I5nvHrsvWLxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09ab667ecf5918b029c8eede1431799f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01381d4ce54a5703790ed84ca17039d0

    SHA1

    02f025f9ee7d2b65270c5dbe108b070102ceaac1

    SHA256

    89077f920572174fc0a6e7ba4442b619bdabd67aebdb7e7217d6071377a0789f

    SHA512

    de95cb0cf397ab8a14943474138755adcb0e61b6cec4a0c9b39dc765bb3e8475be99099e282a7bc7f904f9d39e72c237277792f7f75ac0b9e9709c666079c564

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb1d9d666e44a68eb100de0ea2c80e84

    SHA1

    a4cbd1cd42c8e3fd62bef5dcf50a81e4bd9ee8ec

    SHA256

    dc9e82cc75b9baeacbc7b173786078068e4e1280b453df1b0cb0f7d80d37b1b1

    SHA512

    79b69784fe7c0d0e69416ab0e86cbe2b405084f66d644dd9e2c6b00334cb2406085f925bf1ed39fb9d0f84076194ba5b4147f9405b4b35ce9b33f8c2e917fcb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    944f51dfa71c4044eeeb57df5f82441c

    SHA1

    9169739b38b881ee64324ff198e3f880e10d036a

    SHA256

    748c2f156538a4f1205d0832b871633a7c746b0512b86572114fdec4414b80eb

    SHA512

    8a6e86ae306f45c655e93998b134da637ad5db908f612c74683b88f32f055b370a021f2fdd9544e4472f0da9b3ccf1ae18404ecd940064f5889b4e9c9dcd4d50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79b7568256486f6aa880dc264b1f323a

    SHA1

    1f79e9cf0b33d7cd94acd02083ba6ecc275e9f50

    SHA256

    b0fccb7a9617f681f21313c920121a931ada96be857e6db7b214d21388565082

    SHA512

    001804fa059eef63c41c669a570fbc21c7923adf97bdb341de81ccf5dc39e75f34a2a10e4123bcbcb880b037716854214bd150254382214697563d080819594c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    528145d88ba8857b487f2c3518c22829

    SHA1

    2ae0a3f94773423511ab8159d2824646488a828a

    SHA256

    4121eab1d4d62c68855e6b56f7ed2e0840bd50489fe475120f9de4e0e37f6115

    SHA512

    a6a956286771e22465398cec5984bf5526d8cf0b3d048d15a5e26d0e080e8f2c586f7e8e7de5c61036a4a7a22e8bdd41b1014a2c7d638e2a09e502e71a36df7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d77ed9027eeb0cf0aac2a6d55238810e

    SHA1

    0badda4227ed52c2691de853eb012acfb155c682

    SHA256

    3878f277e25004f0b718f6699e541d1fd0320565b01d072800c7c07239ff2169

    SHA512

    4977b9fc95364416f86ffc7fe6f2438c9e5a5e704983c3f0bfb57f13bcbd22277105b24cf408818beb15e523f5d2c5a2c92804367e4af08ffe2a48bc08ca246a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce0ea3e3173c494d204197490a94aa54

    SHA1

    f6da821aafe55c68bc7851b86683c33f4be39d34

    SHA256

    0caacce1bcaaf134391eeff7e49f99a7cf4caaf081421b13a63e3dff76e1affd

    SHA512

    a08620119c5f6d765c3ebec52ded3f62c1d12e0e8b7d4d130900078812841fe92957ed84ed52187550707d86b3ef7cf342455399287eae59dde2b6b8bbaf3718

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    544399332c6f80523f84f4775061fe1d

    SHA1

    a9e1593982badcec67947cd1e4c6a042e1b1d751

    SHA256

    96ee58dc88c3663c62a9d9ae31b1d907dcf8e8f1b4fadfe5b5134188e752972a

    SHA512

    8b35df5a3274d61f04a5cc15e13e0bc4dfd050f1a7192c782fd9d14a3ef51fc92cc3cfd0f1212ddb88a1d2f2b4671ec89d7479e31024a4126a023232ad533b7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb8c4b5b48a92230163e663bab230f16

    SHA1

    7e489f901ca72bd1e3151509bb2a67c7899ad581

    SHA256

    48896910243c1ec07805e25fb62d3d90cae7374fc984da0c2c668d45e47b85f4

    SHA512

    04992da41281a80101c44666744960d58163b5669b74d94b5e73a476e9e4b3f9e48711d116ff1b0471fe4406cf534bf71987b92f7fef7635e509516d0cd33007

  • C:\Users\Admin\AppData\Local\Temp\Cab89BA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8B0A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a