Analysis

  • max time kernel
    139s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 10:44

General

  • Target

    2994606e02ad68f77cdeebdc971e6e7a_JaffaCakes118.html

  • Size

    76KB

  • MD5

    2994606e02ad68f77cdeebdc971e6e7a

  • SHA1

    bad1504ea49bc19cfcf026c5ac98da094cb664da

  • SHA256

    fdfcaf47fecd59d367d40cf53fe0a81a6871f35507bfe60a259837265e40b45a

  • SHA512

    96af2b8b3be2dd457af6215da199643ea4775539dcb98120a2980d47eb627204a051cc72fc77d804f64ca7596d31225f46ebc38c5e79ba901f6451863f729c73

  • SSDEEP

    1536:OTrnjIv8yKE+5T8XBi2lRDdPaDVSd121wNsdGfwKnAkMwHEvwbJww2zWr4C15gMG:grn4w2lRDdYnWMC15gMtm6wR1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2994606e02ad68f77cdeebdc971e6e7a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9cb4b2aca0bc3965ee7b777fa700681

    SHA1

    1bc4a0142ee36b6dc23555dd2eab9e9faf657cf6

    SHA256

    299fa4d517532414e5ee48d4f9c0ac23f31ea264654646121b11199b9db59995

    SHA512

    76cb4bba2448fa172746645555433d7c946aee896aefb666ce9c1102b21d88ae09160c08054f9c7837471d66b7a3755aaa5f315e0c70a0c21d387149e4630797

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab59d3836bb4d6738638ac847d8cc87a

    SHA1

    7df51d26cc378a8fb751c1cf45a7300a17343cb0

    SHA256

    a229fb6160f664ca2a25d58758b586b99b0e2ddaef0b6baf721a6e84bec0b3cb

    SHA512

    25b63ae340cbc30b595717149f98221dd3c5dfaf78072f5cef64edd7ffcf04dfba4be377aedb80066365b8e748864c6d4ebb0ae7b0a895ff1b0a703b909a0089

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2443c378ddbc24c5a73bf491bdd274b8

    SHA1

    603bba4d5a061e82babf35f07640965a623e6ebd

    SHA256

    d538c974b3f3f4d47bcb8418f37a63cdfe7ddfe92a1973790287c0e26bd47956

    SHA512

    33892d71fb767c38635ed4e8fa71501ecd11ae06b6d085456f12be15cba1a3e83a3b680e2926f9dc4ce9413b1056c2a198f795525d936a5a45686afcdcc0a3e5

  • C:\Users\Admin\AppData\Local\Temp\Cab2B37.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2B3A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a