Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 01:13

General

  • Target

    2797f203298abd8b03115b46866d7519_JaffaCakes118.html

  • Size

    4KB

  • MD5

    2797f203298abd8b03115b46866d7519

  • SHA1

    a4c77a82382a87d60f6c59d563fb524cb050b697

  • SHA256

    9cc3152620a5db3254e9ce7fb89a51b214672c570381e0f505b7cbd5a819b3f2

  • SHA512

    115de4bf893eb32150723b1780f46e58c9c294fe082124d10f0c3a9f45dd99762b5bcdd96c0983adb8defb88d03926b85af1229d134da83eeb36da289a05b6f5

  • SSDEEP

    96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oe8qJ1Hv:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2797f203298abd8b03115b46866d7519_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    149eea8079cf2513c9eabdbaf1f5f393

    SHA1

    64b2b19faca88fbcb26febe65df62ec7baf921e6

    SHA256

    ec995a3ee4752263bb2c6225b8258fd0f1e00007abbf3bdc4c65ea8cf81147b3

    SHA512

    d46c102797df555a0b0bcfbdb2eaa941c879d748bff3e00ce2d60cd7f8c0b82e7601fefd0af0c68125f99ed21e49b803a5af640b1b4843d808a2adb5e61c7ad0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e870e13776d9cbaa51abef98ca981c23

    SHA1

    1e05c8add93b141ed65c90761e2d1dcba9138be7

    SHA256

    744f267e8e3bf1639e5bd7af1084b155f31b3e96972ff8e617b249c6f1ad3503

    SHA512

    07620e916393d4ec6b65bc673eedd13d3d119b122a18d64b5f69c9cedc6842ac4568c97ff49b66992d28433988c5ff4abc0ff0d5fd7835b8d214b56b082750fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da54caff7a8fef0e3fd43f9f4422de57

    SHA1

    767c69e193d500c69a64b61b5493f70e979667d9

    SHA256

    ba96748c8dacd748fb092922c86c9195a3d85f04b833620ef5328872255bc3bd

    SHA512

    ef9d036dc06aa2de2e7c6771fd7348934c9318bc8d0f3138d7a0768f167156acdbef6f261198f69724cbf1d551bd4b2c34622e1b41155130e4ac04e8e67b26ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    15e01165cd4cada6baac029b0276c0e1

    SHA1

    24019b8bd6d2c9a33d03cd89f5489b093c7df78d

    SHA256

    3994ede9d31d388455dd551710ec68a3650de16b8f9ced3a4d965c53a98331af

    SHA512

    319680e92210e33ebc4b6e6dd4e45383ccb45e531abad65d9d2a9a50a8299aa8466dcc5f506f5edf9ac28548f0325175ae06e7ff78fb0e1b2c06e941c3b2ebda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    490dc3ca88bcb414eb21c21bbfafe569

    SHA1

    76b9f02ed8fbc7899738d20b90c36b2515de8b17

    SHA256

    b05faff72aae86db60e810f7799a6141777a682166f1083d70c5b7da51a6916c

    SHA512

    de7013a2a3e398c7d073e053a5eff47534953ade1c05199a111778dc648a9acd5bb0d063dcf6215f7e9727af84fc55cf475f18f3d324294599b09da973f313c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63795aa14175040031b9c6d5ac32eb23

    SHA1

    7d7ae212a1550b3827f79f14ff1f07dfc7dbab25

    SHA256

    a0a7b26a9962a10aff7f82a70f1bcfef72f987642c27e15656b768b61d0b9dac

    SHA512

    9ab62777c5ee11228b0c5fdbebd014410f612553806b2f0cda18b2b307c5b9019f1be04fea95e5f01316b19edb08181f838b94fa2c5d376cf8e4a06cada2ac41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    971a2d87a7c4a66d28c6f82367eb6378

    SHA1

    8570cf10a4cf77896bf965102ea293575d2f34b3

    SHA256

    7e3c93e4c98f518a66e46e3aaf4a1b899847f848c2d506919d2d802e7cc7c95b

    SHA512

    98d88edd7181a9ed0580473eba12ba36c83cbe7749d4ef914101b2f5183a00cc117b9651a4b615a743a645b4d5764e0c64a4ec01a1ef03bd2569d4835401499f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b91b6974fb46752cc22b79df74523cfe

    SHA1

    c1da178afe41a49c397a3b2571e3064bdfe34f53

    SHA256

    cbd0956bab33148dc6010e39af1ce598b270bb8ef69d967da50a8cd3881ce01d

    SHA512

    4db4c39037fb1846954c29bd2c752d6ad546a859b61428827f0d25fac2808acf9df7d11030677da01d9cbdcddf55825b68f44ed73e6bcc678642640cbf299fb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a91ece0181589d8f9e826d10abe67ff

    SHA1

    4d487aa8d25b40ca9dc46b9b3dca84bacb614e93

    SHA256

    7ed7d0215ce03e226482e36f0464b1c1719f0d3f4a98d416a397e1cc66ef42eb

    SHA512

    3b84a7bc416f641308d2e09d78334d20d0a3b16b42c96de36155c601656bccda7b75d9de11199ce876cde60cb41af4359076b37eddb945b50b7ed309439a5751

  • C:\Users\Admin\AppData\Local\Temp\Cab2A8C.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2AED.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a