Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 20:43

General

  • Target

    21a6870621169a9b54297d06093c7437_JaffaCakes118.html

  • Size

    19KB

  • MD5

    21a6870621169a9b54297d06093c7437

  • SHA1

    33598a686dc89124bb50d3357bb0ca0ad8c6f459

  • SHA256

    0efbaa2504ecd144cf8ba5ea3418c286b908d749ad545c6f1749ae23557412aa

  • SHA512

    3ffbe4a4659bf06f8b49b773d1393da3c44f04613394478b0e108bbd377b4dc43401ee4b05def241bedb60b8dabb75eec9c2c7a098dd97796abf952cdb23baad

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIp49zUnjBhbN82qDB8:SIMd0I5nvHZsvb2xDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21a6870621169a9b54297d06093c7437_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64213e1bf0ca28562c7af069d3bedfe4

    SHA1

    8f0bd2a4f3ec75fcbff0292d47bbbf50640b15fb

    SHA256

    c30fe7c4153f5130014d2dd4f39c296c6dfa3789f4d7e8ee1698e653be368b2e

    SHA512

    2c473e5f14457372f8b6b4ef3c043f4760385290eda27d5550d14102fe882b4cf8fb50dbed0e2e72db4b6d6360353a92d2aeaf1cd71f294f496946b90098dfad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b78a10288f56cdcc33bef4f302b825b9

    SHA1

    b0747df33b0a490ec36dd15ad740f150fbdf4239

    SHA256

    3bf00d2cd447b01eb11762a1a7de54c7d1e9e88b326af52b8a3c85e75c70833e

    SHA512

    e765538e360c788fbf2629bc9ba1faacf8a940d6a2414516bc968299a8dd670daaa2c7e866808d6e4582610b80f91b444eaf49970517f230cc0a033f3a6f9ef7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb45c237bdf89de2e02c0c3e299861db

    SHA1

    2fa9d4df5b145a8db8e24a70d6940bff81fb6b9f

    SHA256

    07fa17aabfc83295c84adb0ed8c8a73261baef1c7aaa0b224c04e5d6a7a60504

    SHA512

    b7a7f5dc0de977df98480c241a38a9fc5b6ba78d7ee44c485fc8edce66e0cf4e58b63769731b0268d6c169909b1519440f5ebef3792454a1efa147d3b9d24ec6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91833a47f405e487b66a54840f424e13

    SHA1

    63c2ebc0f7f8aa9dfbd3e35d19ad44bb9d90f4d2

    SHA256

    92263cb990ef971e02195790a7049c83ca956f82f57bb4d22c7f5ea91f0b5543

    SHA512

    ac3746cabbca6d44543b1b90a9f80a26f8f7dc612b30682c8919b9b02574ae8aa8bfe6f806b86da8d54a95bd52131011a9f9b5bf748cb7df2da5ce4cc6e7fa78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b84c172fc37731b2f249db9bc41e94f7

    SHA1

    caf3c3b1cec9ae2facc0ddf92b8296afe8bec84a

    SHA256

    1b29330a1edd7ce0bbbd6d74a636f55a7d126aecaa78a270b93abef259bb3d95

    SHA512

    b68da87d2b8badce2ded9fb1b5bcb62afcefabed2b479df855943a6aeff91a95354d0e869ebc918a3beacacfa2e946c2719d0856800cc56bc4b2183f6556d2e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6c57ef8041ffce43141d3590477b5b7

    SHA1

    50c89653bb38cc28e1dbd4c10b6f281b42b121fe

    SHA256

    ded8be8fa50fcba02ae478d1534cb47ad01c67dcfc977ee1ea2ed8fd611de544

    SHA512

    4473114d3d9a5737071baa77dbb722cc80330121136931dc195c554ef2dffcef045b34c5d72c0f9dde74f6b612280d3da2507cb4ac7e6fe2d73d483f4917dc9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d26a4459bfdea3f1b6b20f71fa165621

    SHA1

    f9fe07f6534aacc49de1d7e930c7b85b0fe227a0

    SHA256

    b7dc7287c190b1420c982b3843568b6754aca7442f4ab7d86d50876668e423fa

    SHA512

    756bff33a8fbefd9fd7104f623824aceba12ebd8ccdfecda897721c24b01109d9721c2c01a49400976b29a3246d89db2e7dd92e7dc1ebc0650a85384afb3d4b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    357e5edc1505015ff1199d01c71db2fc

    SHA1

    f7a47b9e1010e4be60671ed540f58d87280a1031

    SHA256

    667f0fa73edbabd26ebb12edb62285de35f579d27b12fb61c2be2e0e0733ff97

    SHA512

    cc52cc8a1dcc3c0ac1979d1bb89b53f38ba73c56cdf34b4b68c11f0eb6ebf9ef51c102cee2ac5a51dcf8b593d38e464dde473a974bcc645bd45172b50774053a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    afdcf2410d4d4b57439bb9b7fd03321b

    SHA1

    dca637b8c44d6ea26cfb5d2dd7ca199a07cf6974

    SHA256

    7c8628957c1a55d76eef097f3bc1bd15350fcba7fd04dc9e691a867665d1dc3a

    SHA512

    20d28ff32db1e3c0fab22cd46d2caf2640767e94165a8012e02744ad037ce1ac8a43afbdfa871f3d65ce2c9badbdfd97c73a7d30bbb936daf90477fce92486a8

  • C:\Users\Admin\AppData\Local\Temp\Cab1D81.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1E82.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a