Analysis

  • max time kernel
    120s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 19:57

General

  • Target

    2180110b26708842833a96f8e15d91db_JaffaCakes118.html

  • Size

    41KB

  • MD5

    2180110b26708842833a96f8e15d91db

  • SHA1

    a3b607d1a8f8494611fbd61166e6f20392647b6a

  • SHA256

    889b419c174198f00ee15d17f16faff8632ac2d33845f77145a30329ce57f48b

  • SHA512

    916c4a8a93435d1d09854a21c2132c77cc3eac3873e212348b7dd84f187dcf937433fb54d9aebd34d9595d73772ea4e02151795348e5bf51da50f95aeb4c7e29

  • SSDEEP

    192:uwnT4b5nZOXnQjxn5Q/BnQiesNn2mlnQOkEntfPnQTbnhnQmSFxTm0l4PUuF5sD1:UQ/Mm+SxjhodJHdte7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2180110b26708842833a96f8e15d91db_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d99f595185a3a3824e4125ce4324592

    SHA1

    478c79003b0295e655265f03bd6466fef78c3612

    SHA256

    1ec0ea02cf620c2060e6f55d1ba817c6253c61734f267463b315b83188c35e81

    SHA512

    e2f73fb4aa73e3351637843ae5891594de0b6eb6e85e1c993eadcd22bc380d3de2e67352e611499189e2005bdff439dc3c5244af51ac5d500b7a0138cdd544f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1f703138084ab739a543bc0d0eed50a

    SHA1

    f968a85dde8d3eded393036d1b0da47a7826fec9

    SHA256

    676009e76ddf698adaa45555da9f3140f3a79df92fb7af7c9ab8c52c7619e927

    SHA512

    427ea6f32cd383657bc7a11f0dffd0e284b67e7bcc3b304e819a39f80d9dc738b667e49be5edd9078618e9c6c640899c7f4261fcf0d98ef8d60ca01450ad6c5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4afa1692c997ac471d20a4cffdc76dbf

    SHA1

    d1aac924c435b1669f57b6dd24bad1b1ecf60968

    SHA256

    f30ee41a87b09ff47345a16aad069d0905fdb3fbbf6ee20f2d866a4b8c35128e

    SHA512

    e6159c7741ed49e8c4835a951d0eb4833fbdb1091f90059af55d427af4b76a4b9660b601be711bffc379798b70dac36c1f68c4358a2284e807c0e682b48c8fdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c73286976a116d176d84ccba22099f81

    SHA1

    193bbd03674a7cfcdc00ab8bc3a1cb3ff77ca86a

    SHA256

    99dae5b649d18105bed9c203cfb4b34dcfd001aef92756969c5bfb46b464c77f

    SHA512

    c9e5d76059c149896a49ff5e130d3137d570aed6a3d68d8550cd0058684f2fdeba8340cbc02d3f5dc539f974f827f0ef4c809fc45b11b39c1c90c0c8e4aa0ff1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    41cf9996e66a42e7eb4a036bf1b63410

    SHA1

    61cec8dbc456ef5ca26ae2e9298c747027d73e77

    SHA256

    75d1dd4f155a57be9b60c160af171a5ba3671bccfe69c11c6c6fe8a6394a5a58

    SHA512

    66795774c4ef5493a474d7f520e6229204b24c3184f19ca8e499135a154e14b983629e0419f6e9468d51ba1307786c6e348df85943ebe788c110b99fecd6f115

  • C:\Users\Admin\AppData\Local\Temp\CabF30.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1417.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a