Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 10:24

General

  • Target

    204f32aee6a8e2e938877535548ebf74_JaffaCakes118.html

  • Size

    25KB

  • MD5

    204f32aee6a8e2e938877535548ebf74

  • SHA1

    d077f58ec0902d14970935ee7226849a6264bbae

  • SHA256

    0e2f4960b0fa8473fb4d4e48eeae0b2e6de82c700daaba70c853a04d83e28ef7

  • SHA512

    f4bc85e878bb98c18ea1cd7c020a1d4d9f19202f46cbeaf35cf5767d645dbe670718e3fdc51c27b472d4abb8eaaf9f014edfc85c65eae76288b908d15c88e684

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIB4pzUnjBhPx82qDB8:SIMd0I5nvHRsvP6xDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\204f32aee6a8e2e938877535548ebf74_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53f4cd926645b51cbe69f3f79e1e86f7

    SHA1

    fd8c5d6f72d0252a042a22634fa7bc1f3993b85c

    SHA256

    a5005935513016021657366dfe39ea7cc1c63eb60cafea8fdd10231f2cf3ff93

    SHA512

    ec38430fefd96c9341154e98783760ef2d4eb6c39d8c73180e6736ca0087b19b9e41a6397dfe306e4c380d9d93f955363abca6b777589b5362f0515b5c570143

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86b357f5aa7e88abc42dcbb21af841c8

    SHA1

    c4e3316dcf0e514f979b1c6f82372622f77c1bf7

    SHA256

    8a6f35c82c9f0a256abfedc728924b86057a2eecf6ed1c649eb9541c7d262379

    SHA512

    3ccc792ca1a4dc553e8ece23662d3151cd08a3d50d38b2e4b243b1787cbeac6ad78807c2d69d8a5ee7193a0f37281c416dd0f9141e25c29a1b526a9ed0cde8b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7202ca5bd036754ad2395e6795c4a386

    SHA1

    fa041c4c86d5401b2a7dbfa69d144f5dc62c8f6e

    SHA256

    fa92edc50f9e4cf9fd11c924ff7704486290f83166fd8f56ca39fafaae2d1c70

    SHA512

    b4fb233780796b428e3c9e62a945e132ed0c62a65b04653d2dbf2063acd81ecb93b76466f35f8c9ffd7fd397feadc4634bd6c8b82fa6ce61a7cdb40d45ebfe19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4e5d467d20a5ac90404220f600b2ab1

    SHA1

    5b8c72c87ee48860b879590566931619e52f69d6

    SHA256

    57f07383fb865dd966e7c0e5ede5523b859416585a60907f99401adbc680cbc5

    SHA512

    ffc9d1c5fb48a8bfda3d586e0503c3cc2974562d841ebf9dd2eec112e8cc0830c20399aeb9f83865479816e5206e4131da4084d475b9b009dd8a85c21de9e847

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84a8dd86d626ea7195977a855d512c2b

    SHA1

    9d78bea44cf053fa5f0e6744463a3859d361481e

    SHA256

    57246de111100c2a4475f7f179eb0d99c499f0fbd0a5916f92c810338ecd7513

    SHA512

    6cdbf90b35659939e7154bf37c1c749a8e010220e62deec1eed45fcbe402954c74a13c4b248542117c4beb60e5c28b08532beab7d6d12ae5bfec20ec04d9fe73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    186e34d5bd460457fa603b1251200f3c

    SHA1

    12db3e20f2891cb023e8a5ff0df96a1bf8ec2d88

    SHA256

    d7317af6a67de055e935a0188bd50013b5028e9456119659e492de4d19d94268

    SHA512

    a90b6b13ab198209c748146d33d248c0a2317e22d3d1df1357ebc5d3289ebb33e5ce869dfa66bd4574dbb9778c014e5a8f33f59538b261f979851900b571a70f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    717b7463ef017fd61ce05d526d726351

    SHA1

    f424cf9b052ae7d848816965c26f7d297382defa

    SHA256

    22f4c546d3d398ab888e840ce10b4699438596332efce89261eef2e15ebcfa01

    SHA512

    5d2c18e25fb3137cd0a20c58dc68bcd44154619e881586298e47d3763c0935eb3bbc3740e7a9207fcd61a3e9132c27868ca57a58a3c17f952f6b4fdca507e975

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5725842b18371e14f8a6339e822a8d2

    SHA1

    4378bb1a189baa38ee9464c0f3165de474c737b9

    SHA256

    3690394d8d25c8790a92ee37224ba7dc6fe9aa3bcd466727c8269011b4117b48

    SHA512

    00d89bc9f5d72b2516b4a53c1c5705d9f4c139946495c20591923778304fdac0fb896f38f2df95b553e5c9bb0ef6afa1a97eb0cab674e7b620cf45a77e7d932c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32770837ef0aa69faefe410fbe1b719d

    SHA1

    7119e59bec06855b4919e24fe6f9560b0eeb5be5

    SHA256

    93edfaea80cd5f1b2274bfc446db2be5721b0b1477490f6d4be9d088ad2dcd0e

    SHA512

    cf4182b3d40f880b2edfd9fa53da5076c94f503227680b71be3c7e737bb3a7646f28d7677539c2ab2f46bbae600208d77627743f207a8d5d5645237d67c38c61

  • C:\Users\Admin\AppData\Local\Temp\Cab1CF5.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab1DC2.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar1DD6.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a