Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 16:30

General

  • Target

    406338a3177429da4d3daee0efbfa6fb_JaffaCakes118.html

  • Size

    130KB

  • MD5

    406338a3177429da4d3daee0efbfa6fb

  • SHA1

    111b0830820f128e0d89cd02c36f761a8777abd1

  • SHA256

    7fce8d2342868b95d88e27ee0532c63a7b69f9938eb193c649f5e2f66fd53e45

  • SHA512

    bc012a0b1da5d9b0bd0a155f8729159eeba6432bb55df459148a5ffdf7b8d69146c80fda1adc277269ebbdc88eea3c30d926ae37cbbfb6de02799747ba2d11cd

  • SSDEEP

    1536:zZZydlEbbA99YZHqRHHEExx66++IIddtt77bbSSSSccllbbFFDD998811qquuHHI:zWdlEbbA99YFV

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\406338a3177429da4d3daee0efbfa6fb_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f415fb8502fbdc7440cb358752c20d14

    SHA1

    08384016708c9b8c8970fd937b2ff865accb2401

    SHA256

    43291418b3b1cdadbf9dc9c83f5f87e161f535f04fe56b43ebb31dbc56925df9

    SHA512

    b229d7e0c81f96b07f7213471880a606ef2f8b50c3a7cafc45fafceeb11ce71badacef66dc7745dabab94bca464b1d93956fb33b48ab84de88122d404a15af48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a4e9dfc9e01bbae35ef816e30443b79

    SHA1

    444f0bb1555efbfa677252e9afd15ef50808b6e0

    SHA256

    094ea5eab99f9fa6c91e20b0dec729453a79cffdffc5a2df816e98f1c5a3b7f5

    SHA512

    ea8f8f7b2f0e735662121d50ff96aea16a09f2e34698da29c8b76175bf626f4cfdd14a5b1049d51196bd472c0d4d86dcbebdc51911440069fa6cf7c966bbe4bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63309b1dabd58f23ae272cb00dc0f7b7

    SHA1

    1bbf930fe26e4ef9fc3194a14e520e6d8b2c3408

    SHA256

    1c7bd6ab0b14dc8dbb84d1299da50983ed333c4a264dc5c53255b8610d641d9e

    SHA512

    4bf3ab6affa8f55ee1ff2d452d5485af01dafc3b166f49b569ccad5a310bd8d47f94b6a0a5152148e49cab1d63cff340a6f902daa37ff782c4193f16f3a09a7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23c6cb1a39cf840a5a60a5e88cc38364

    SHA1

    23ffd5d01f84ff527d9fedb454db68f13e9f2eac

    SHA256

    564d385094f57f923cebee4c5c6de38c380185d5f38c7247afcf0390e5805486

    SHA512

    4752275db1dfd33023f9d5263513ef9ab94f18269e4441f95f636b27c3219a985b32a89e34162e86fbe0f0847d28b064e0952e6e48f44b976eae73293e9b110a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7cb5d9ee6d75a4c2a7fc3259ffa9afbd

    SHA1

    70b407bd9478b970895ab2a98ebfc9375cec431b

    SHA256

    d9ae87d1f473b6689059b73f5dc171b7b2796e63b2ec6884d6c5d63a3a3ba063

    SHA512

    4e982c892a53c838660ca0208a1e6fb9e47945724544a82a87e88cc5053cb69edf4688c7cea3bbcfcdffb01a859ea470e22087e3b5b79118868bc23c5cd6caa2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9625296d26dc0c746371570ad404ce8

    SHA1

    0b03742e18b7a3409e5b8d156c6f5ce7cef0d68d

    SHA256

    0719cf485c44cf0e2370fa39f9e7b69a5c1c1a6b3aae1d6395c65f64f153b9f2

    SHA512

    b35275a7e594bda5cf35808617ff483df15980b1721aa71a818afb9ad6f584fc5c2d73909425391aa1e0c661832172c1f478905283729bef1c06a33cd0088cda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    175f96a168fa8ca504c897a6eff0fc50

    SHA1

    6206c64142cc6ea63d79c0b3f774cfe54287d932

    SHA256

    fc1019bad5b25668b18f46b54ddef229366f20900cb2671ee3c802d06d541281

    SHA512

    ab69256898af8062f9c79fb3ec645dec5af11d4fb8ef2507375c6b33b6603d18affc64c4783d3af165fbf3582748f362f05fd7561d28b9d999f9e29ce2b4712c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a1bb7a8ba3ef8f88102b2a8d97a581b

    SHA1

    42630b30e919879effd945073c38821f23f5b9a6

    SHA256

    828fcb5031f8eff4c89a9d61127242822a3e77cc3c1eecab96a5366cc271e921

    SHA512

    5f5679a7bda1c2866ce8ade98fd2a3e96aaa313cd84d1e42ae850dcd75f428b6546cf80b3bbb08e4cab08c5aba91ef725ade265f744ffbf764957c476dc7fa1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e5a2fca00704fe68b10b0193461570c

    SHA1

    87620e808c78d2c933d644efced7dc04c04c43b1

    SHA256

    5c45e78e5adaef74a7cdc835ed3a91c61050b5c7ef5f6b2b28afb5cdfbdeb4c8

    SHA512

    b82217061904b6290363a989b5e4a81a12b4d86211b72045e45aa2b7a1a9beaf38f1757a2b043785298bcd5658635595fd347e370b05007926687b0c4e412879

  • C:\Users\Admin\AppData\Local\Temp\Cab8642.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab871E.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar8790.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a