Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 22:08

General

  • Target

    434414f4d160d64518bf642761adcb63_JaffaCakes118.html

  • Size

    20KB

  • MD5

    434414f4d160d64518bf642761adcb63

  • SHA1

    d4ff76e7ee2432a7943d022eb1d0ac7dd4f11561

  • SHA256

    2fb82aa5e402073f3db0dfd1b84d0cbed353fe71c7c17eacaf0b402230bbb845

  • SHA512

    a3ddae62f0eed828768c47204400d0e51166d097f0bceaced07a7c0cf4ed4814b43407217b02730513412501f4fcd1c43ca43e3bcaf4022938ed720657cb8dbe

  • SSDEEP

    192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI64MzUnjBhIC82qDB8:SIMd0I5nO9HnsvIRxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\434414f4d160d64518bf642761adcb63_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2568

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          192bef271e78033652863dce08e2e4cc

          SHA1

          9035851719732f1c112198de7e1f4fffbf46659a

          SHA256

          15ada7ecc7a7b1e0695b8c9136afd1cf5e65f76e00c44234b47506f1a4152e38

          SHA512

          cf896743ab805abfbf61aa72b7826ce9f0b555ed4df9a776ac7c7bae7f33f09635d470b652cc67e65b16e64463eade1862d9daa245532969c15bf2706ed78e5c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0304ebb921793548b8477e75932db92b

          SHA1

          755eff38d3c171fceebe01b6852874d6a0fb4f1b

          SHA256

          ce7e02594fa99f1423bfc17f50aa31d98fd8c209a7030ae5a4f77f490f144582

          SHA512

          ff3ee824173f9104d216fc7fbbd83c7aa2a2bfbe35b4fbab12e246a5163ad103b59ebd1ba6745037b28c1fb02881b8286a84cb40d0e11b057b56ed4239111043

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6bd418843185d2759bcf549fad05831f

          SHA1

          0c2e63ac7a6ef45edf4db139b122f02a62709659

          SHA256

          cd0f8489751eb891ef643619795c2ec530cb019509823ff184609573f7654c6d

          SHA512

          637e35bb9b2fa658bfe5bfa75870550cc946cb876fa4475fa2ba05fdf5475197746512df454e36122bb98e5745b3d287d91a9d07a19c6d42494151657df8ac19

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a941c2cf2e5d2a1cbd685a161e2b155a

          SHA1

          110a5d22d570cf4d78673a19ca922156411b070f

          SHA256

          61966145dca691c58492aa5d1e1c130dac48685ea306ab9ddfc3ffb00e310d17

          SHA512

          f356d1ad9f92e543c5941bebeb68340e597c93a458425283c7a6f82853c48a5173f870a5b12bd9f3669c3472037a5101a76c5542869156cff1df809d3bf24aed

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e25cf873a321e5d28aa5b337b5583126

          SHA1

          496a9f701bebc383fe43883d2cde7a9af8b874d5

          SHA256

          bcdbf225709436f015518da8e00797aca6d6faa5df9eea19bfbc6b9fc187729f

          SHA512

          f43849c76492750070e15e92a3ad5ed7638a262daa883f9459f6c3079c466ef74595650b107664ee6f176564f9bd7bc147db71a7052bc5afa903713755969d51

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0d88235dbc160758e2c8f67a356bfd2e

          SHA1

          12221cf0cda090b6d9daa2cfb948392365497796

          SHA256

          f4a0b6af5c4a90b90bda30b57428d8b54c53346a12a6ecdcde054d14492ba82a

          SHA512

          99a132f01d153b6add54c8c16b607d6c3b6e4915dd1c174d586da1ac42c2217b552a6e258b9642de44aa81183ae5712899a14a563c67f2232182b90381402fb5

        • C:\Users\Admin\AppData\Local\Temp\CabF5E.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\TarFCE.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a