Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 05:48

General

  • Target

    330802507c08bbdb949a95af3965a5b5_JaffaCakes118.html

  • Size

    154KB

  • MD5

    330802507c08bbdb949a95af3965a5b5

  • SHA1

    6e958ced492769b3f3c4ef0e7e224462db731c33

  • SHA256

    18044c9bbb3c155a0ef5164301974b3bdfbbb195388370ea07338595e9cb61d1

  • SHA512

    a4f72f0781ad559f37e2e37e46fab7e7cc3cba3d10dc62369fa35cd77979ebbcad12ba204345e5e19a47856e3e67cb25443d0f12b962a0addf4850fdda4ae534

  • SSDEEP

    1536:E12R43mYMUmgtxDvJfak7Ym4mtlWmj1ZmkmulBmu0c2fO:cmYMUm8xDhyaYm4mmmj1ZmkmulBmuBR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\330802507c08bbdb949a95af3965a5b5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c85bb1c5f7a00c4a3a66f961a0a6a039

    SHA1

    e08a786128f7677f00fd4792720cb726a2ac5550

    SHA256

    246033cc4c506b945f04cde728484224073590a9003a67d52658075f230749ee

    SHA512

    e3e6df309c772af348dfb81cabbe153fb5e53273efac90d5b123b436e2fdefdab0f03ae9510b16e0a0694d34c6a14e73234b235a50cf62d029992bd7f2ade076

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13557742900eebb166edecc6be2d74aa

    SHA1

    05e384f1bcc89b8b574874162360d455fc724824

    SHA256

    d5295f93fa26374250cdd8fbb1dc452494145eb9599d3534c993c9e27b495f80

    SHA512

    28cc63e40b56afa9a64585bc99e1bde9fba56ef911e882b4b20dc7407e766482b4aa4aa3f3c39c14230638b216019202d68d3e4c547d774ac689b1d78310805e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6712046e4ff4549a216b5e224d523d34

    SHA1

    dd88e848906981a2c3390af8223e5648883e447b

    SHA256

    3399d7630906576ffe72947557a7654f2bebf5cb42c92a8732e1fbb362d723ec

    SHA512

    c2e324a3fa554aba0193072978277fef34fa0d71761db8a08c0e8ce19ffc4cb0bae17ee46b13ddfb3c5b3870b2d20fbdb36d4d3ecbd149f205f99a140aea2a8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13b5c04e81dd3a5b6b181260490ab2d5

    SHA1

    1429c70c1896f80b5c6d4c56f6d7d007acf31720

    SHA256

    badc3249242b9ec445534fdd00f788046d90bf3edf9ceed74e1ad2cf219e4c05

    SHA512

    d5b4f48bf6a1afc8a95b49224def62b52dfd751f561f8bf4f47dd8e802ca896aaf248b5ab16efd9f03b6158aed41160993df7859a3c6058694227f2d539cd00d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f65d9024b093f5cc2dda808c89573c13

    SHA1

    f6c1012bcb80a2fb0c7a3d74158f217128942ba8

    SHA256

    5a458b8880e5d033e10050763b529631205aa1bc29c4614c5f7596bf06918202

    SHA512

    99164584cbaeb7b04358e079cbb6aaaa120484df0c867ef037c5045f303d1c10aeaa408eb73a9d790ccb6c91de6f3276cd658219c8b06a4fc8177a045f01fab9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0dba55fc2f4ad8edade8aae1f9984b21

    SHA1

    04af3166872fbfabf73e34dad4fc10c62f5d1663

    SHA256

    ea29819aebe1d09efec23e0e64d21d1ebf7d2f4b6829d25d9fc91da5094bda4f

    SHA512

    6ab981a956327129b00c06d4ff7a8140c10cf5291b02e215a5f5525b5fbeebb72072e9b9b5090f05131c42edd17803aa1be0e79bbb95918ccda611dee29e4812

  • C:\Users\Admin\AppData\Local\Temp\Tar1E61.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a