Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 23:02

General

  • Target

    14df2120dc16d2ecda1f4a49749eacf9_JaffaCakes118.html

  • Size

    30KB

  • MD5

    14df2120dc16d2ecda1f4a49749eacf9

  • SHA1

    ea0fbf5adc4b03d44bbb060b91bcc8fb3a8b6755

  • SHA256

    0d68387a481c8b45953625fc6ba981bef4750b378559403259b408d28c86ff6c

  • SHA512

    334e750b351a905a86bd09de81bffbd08d2b2c3906adc9fbc39b895e4b25c4d78e908b51ae34de61b31e9ed7ef92b71b3b05856c333d32ec1d7ff300d09fadaf

  • SSDEEP

    768:uxTWXi/AE0Qc0jTJIl60jH0jH0jk0jIX0jUpwZu1:niYE0Qc0jTJz0jH0jH0jk0jK0jBW

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14df2120dc16d2ecda1f4a49749eacf9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8960ccf6b289be13449cec6c45ef69e6

    SHA1

    c18a449995c0454a806272ccda63607560bfb947

    SHA256

    8cb59044b7f2537a3462eae8a793422308fc001dca22b199a69f6c4cf4af7d0b

    SHA512

    05d179e025a48ac319f058e7532889da926d4623db468b8d27b242bf0eeaa1a9b82f4c8156f3e1f1b66c04f94771d4c5d875cb90084f600ca08e75038317298a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c063e124ec9b207a474d931fe5cc6edd

    SHA1

    a2f2a6c1087da60330ae07d38d3dee4824889466

    SHA256

    fbff051fc70c420d1fe07bb11dffecf66a09520d3ffa97f6a8ac1231b583e92b

    SHA512

    40fab8e2c6a2db311e33804cb789d701ad1b27dd4b34acae118035bbf705f39a7db7ae062b91b9a2a62b42e30a2997a2807c019e371d0449a64c485805662b2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce39d91c1e412451a46da60e107267fd

    SHA1

    10a51d0ab3e23a7847d79727acbcbc466ff76c7b

    SHA256

    70e76b3b2f3a3a66267229845bf96537580b6abb96435b1ca257e0b367535900

    SHA512

    a9f7f88ebb725cc970f372e78045af135861dade1b6185521d6d7dc269813ed03cce7da7461bc583b2c995f7b1243dbfbbf141e388481536557e48a9e05cacdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f66cd98ebe03eb9f76493ca5113375f

    SHA1

    5d0540e94b7013feac3cb7120c2a862c077b5615

    SHA256

    e62d2d253559958a3ecf4a4adcd96f69ce0abd1a642d9417942353901703868f

    SHA512

    c621ead08a002457928b9effb3cc1e5707aa720e4914f4b9706fe6e6dc9e7b395eb783e8ddf251f0b55d1b89013f17f1e2bf2a008e3e16c1704a2f705872c796

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    800060dcdbcb495ba9ef19ad9ef35f2e

    SHA1

    2072ff70c1882df145a3bd32e722ef2dc71d08fa

    SHA256

    dcadef1941e404b9b595454d5c22a881a4b8844af09f2f84e542c7c060773564

    SHA512

    95ef12635d5bc0555a965a715c1d8f68959299e55c1d6fac8c01ffef9f35f637a06a0e18ed868fc0b5bda9c6f3e416c036215352b4c9b0defea31a0ee52074af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8190d905310391580d76c882f7d090d2

    SHA1

    4c8f572fd6b5e60f5091cddc77928ccd8e6f412b

    SHA256

    401c9fa4a04ce89a65fd491a553afcc885c91e0a1a8ff008f7322c49a2fe8f7c

    SHA512

    d2d2e57064e4abd5559093dd96c38400117a9930391abf3e1492315060e1822f3fc3233be99ad33c0e1da41d7b77afcf20a062903a2f507907b661d92cb155e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7133feee556594ced031e1a464a487e

    SHA1

    02fc68c4413cbf25436a13f7bda888d4b87c26a6

    SHA256

    2facbcee605b2307c2f1614411757fb673876db3eb2dbe66b95e886ac6ff461b

    SHA512

    8269c80c3f915f0939bef564217cd206dfaadf07f3a00684ad0ecac36648a69a8b975626a5e02ebb39f7bee0ab23c1ecd70e483805b4dc8f53ef10ae00050ed7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bed273d474f383c990b817ea2f070401

    SHA1

    4f5fc0495163b576a5a5bd961d10239da80ad18a

    SHA256

    77f9d1beb8d9b9e1b457a601a947fde6ccb2d2749c18d42db4589f8659a6007a

    SHA512

    d6335cc40ac032b457576ef13a021121131f5801f21266ca76a673a3d506c29a2111bd41959ec0c82ca191c15a6a9a08a5c7f488276c5b95f0add7df22ff9912

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9bf42d5e9b74e22b4823ca2314f8c0a

    SHA1

    d412903005982c5b6a4177c0671c93dae91de7fd

    SHA256

    18a8c7cacb5925623804bd5c332c020e1814f1b2be23845dcac6e924dbfb4c8a

    SHA512

    2bde022515ae1e52e2e0db818c072de7cb571e949fb5003a82f9c773c7f9ae5db104509ddfc654d4b3544454d38765c9e48ba247322557a285222db31c422842

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76f969d34c6bdbc7181371a8fd890a19

    SHA1

    846784be977c6fdad39a3636e00df4cc66a1f137

    SHA256

    734d87366ccb91dcc4ed8392d2bad92da38e85e9cfb2deb88e3f67e86c31af62

    SHA512

    03270e3efc79d948919926f2d80094a3ef6cc6cda26b07b412ea0746c9eb16b822d782d54e8c1f8ad52d637c80ee574d7a4ef802ccdfadfc2bd0336c9b58322f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\6wvxhkictqk9[1].gif

    Filesize

    15KB

    MD5

    28414d285c25f270468206fc12445cf8

    SHA1

    85c76fb58166cf4de3275b6c73773b974ad2b94e

    SHA256

    7c15bc132b24bec38854a9054631c0f02a07021e59d9561f0dff6b8fa1caf2f8

    SHA512

    db48016919993e0383d7c8ce4443565f2b494ed27e086aee7ec8dde23a7ed266b0bb84631c668960a190828f3fd578df2c20d24150171a889551b1b0b0a9a363

  • C:\Users\Admin\AppData\Local\Temp\Cab1FE2.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2102.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a