Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 13:47

General

  • Target

    3a6b4fb8f6abda4c3f7db83346c3ac9c_JaffaCakes118.html

  • Size

    17KB

  • MD5

    3a6b4fb8f6abda4c3f7db83346c3ac9c

  • SHA1

    9caafa3265344f221cea5028560282c8ca016d54

  • SHA256

    0e2feb19e9245dc33a3321cf8c81ec200c21c85eeac846f628f2db4a620460ba

  • SHA512

    2b22093ccd468c89e1677861923c0c5ee1776d74e91083245bf454cc6ce4130d9c2ea9bbd58b060c9223d8ceb9229bcffbb84a81851892b1912c6ac5ef516b53

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAI61JJrQ47Dzbhf6psJzUnjBhjNrf82qDB8:SIMd0I5nvHZsvBAxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a6b4fb8f6abda4c3f7db83346c3ac9c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    da55af9db7403d6f95fe645048735ff8

    SHA1

    298b4b82328fbb840490b1c94e76734611372daf

    SHA256

    21787740bd1ac7062fb988919a10ca8cee5575732a9b64d0517b6d84a0278348

    SHA512

    e00ad823fea5ae6632304d1fb954e9ae7bd5c1327af84375d6d7bb74e0cc67a4933fa88e67de42551939253718df3650bec106ccc263895e9d6c664b976f96f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    43214223444e90af5a755a6628c9739b

    SHA1

    7f8aa8b1cc1fb30a6a6aec482aca665482383768

    SHA256

    fa39fd515538a45644829bc9f5731737a32dd0a5e6d5a64ad96cc9114f14e454

    SHA512

    3977717668153dc0e74d4a8e1fc472aff8a51492007e4418ada218f4f47c922506029364ed0e8562a2efe6419f633f9c5b7b75cbc32a986df1e599cf6afaa7b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bdde6fd9c74712976e3b4e9554e16443

    SHA1

    40e995330ffeddf7d3f03d2007fa30ea7cbc449b

    SHA256

    a2964afd55f21e2ac35d2f52000480f759aec6ed849e0ea09d69effaec12d308

    SHA512

    12b3161d9392b508aa33dd19748c53a0b5bd8296a24e4e9f93b3e2de233d013ff20f6b7e2e84e3c8b47b8e4e5cea63a2504cdb1108b4337cee060e6ebeb0466a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    98c0854f66d526e46c4f95e5fee6273b

    SHA1

    20512f83511da6daa87505ef0ef07076a5a266d7

    SHA256

    d76704562e27e2965ea8f76fb299a56086f4964ff911cbfb79d5c8e22fb81e1b

    SHA512

    a45d568611f9e82b797b04ba894934e8a5798386eb1e1ead13e2f5eec17edc4d120d571beebdc9c8134b3209c13f50830eac3caeb70dcc8860fbf4f612bc8cf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    dfef35e0fd5e02b5c2e5d4dd882961b9

    SHA1

    abf00c9355d0ef0de9fe47b322db852b6c2feabc

    SHA256

    6375fc902fe84cfb8203a26641d365ba50f76bab15102d0867c9a76a801c2217

    SHA512

    da3af4ac49bd60f4e307b5101491deffdfae7fc37937953288d1ecf04dacf54b77e2bdcc5a5f2c886847edb97530fc65b4d83e67d6697ef63f73cbbd592d6588

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    dc0e9783c408c7208bbffcb090f49b58

    SHA1

    15d67fca199d76dce0da64344d8c61a31facd184

    SHA256

    c900bc9df9d1520d68ae8e123e6f920e7567fb2b691eca3f9469e5be58a14a0c

    SHA512

    ab43425bf7d62dd3f5a329bf3d7206903ca9c22b29f610387076c31b878699110b4901d36e00d7264dd326992b6049fb3479871588150caecec1eaa7b728e665

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d7f00b356bf1f120f9fd9b2f589787f2

    SHA1

    95042f0938601022538e265a3e42b3f42f6e9aa2

    SHA256

    32a9a961dc74683152830c54f3ed6336e7d9b8fb64b871da21afe8fc122abb16

    SHA512

    e23a95062665ad7089f8427ce103cfe2b106e3a05f18e98ddc9de5881d2415ece5bbb3dc3b12667b64104baedb1bae863071dae4e6f62d6f08e3255ef474703c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    331544babd1f6d89c80e9e8286b10784

    SHA1

    92b55d30e9af330f1f27ff69a56b1297f3267f62

    SHA256

    23a0b0729a44dc873f0252013503991db6ade7d1974f4f4d7e35fbfc7c05e88d

    SHA512

    9b9227fc97074e077d4d9b995833274ea1e95ed34bf8be9974e0688db72da8cfbc2abcffeac26fbc34b168c8fb7d6ac46717e9bdfc2ac3edc974eeacbd2e708c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4ff42e6721b049719eebd8a96653adae

    SHA1

    0e475598856f593d82954b5b13dea979c3d2160e

    SHA256

    ee06b2e7b932b33f13fff0c3b7fade415de98d45c345de3575a5e445259c5e06

    SHA512

    7c4c259f7c709ab5234e073c81fcedb31e9d3a43c9adddc879b2c4908fb205d1f83d7ae09f9c8695f6b06927b33b83812600d531c6191c3712bab37a7398076b

  • C:\Users\Admin\AppData\Local\Temp\Cab7D5B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab7E0A.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar7E2E.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a