Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 00:13

General

  • Target

    3d289698b55e02e39e15c0201614ff46_JaffaCakes118.html

  • Size

    21KB

  • MD5

    3d289698b55e02e39e15c0201614ff46

  • SHA1

    ab9460b528313242ec2aa45b1d3832a9fb64fa39

  • SHA256

    6973afa3187d70b5178aa0766377ae45c200dfb62116009c0a18f0809439c8b7

  • SHA512

    36849f4797b19f02d48af773fa2db0945bb2c3a7f4ba3c7a6ae986005e7cb7df8eab17c37cf6cd21fba94449c7a7eb38a372c0a1515983bf5220911b821ad14a

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIQ4wzUnjBh8282qDB8:SIMd0I5nvHRsv81xDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d289698b55e02e39e15c0201614ff46_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    327d94388256201fa8a9869435140ac1

    SHA1

    85521201e6201ad0b6f918d2495b236d993f4af6

    SHA256

    60ce6214423cbe84b830f4eb8a4148496dbda589c8ac7044e0168c3bc3def132

    SHA512

    59c0e4d1e80b60cf16fef76ec445a9b4714fca0ae56881e1cab8d119339ca6c8013583efd2d3044a5a6c0f176f9b3ae1247dbed931be9a341dd4c041e6e197e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4cbd059a2f393a736d8eaf43a0902d11

    SHA1

    51c9dfe2f87597ac0e5510c6b7b67f5aff6c8e02

    SHA256

    e03c328d419768c8c4036d6d2eb0ad802ceaf9dc80df416d3f741cc5dd170c15

    SHA512

    4a34f4551c3a1888abd837e658b117350e0bd0884446fcdb8212046eca10690c4b5f298272b15590b05725be56a12eeda7ce491016621536531fdf4c5641075a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04b905b1c3b4e2b8f49094a26788af10

    SHA1

    9fc5e0fdd239cddb0a6ef2e3bff3f136708fd109

    SHA256

    5c9f1cf1b095c67fad9c70239565e6c8438b5765f39f01338257482364d5c7d5

    SHA512

    40adc0111c19af765a5ab20ebd8ed6856e27299e77cf83386ede1e70b15560553c47c505c2440f73d3acca654ce4795f2a074ae7243e0d39830784d8befa2525

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42c19da78725667356701d9e6aeeddf5

    SHA1

    befc17f2cb5bebc05d29047d0ec36df656d50e44

    SHA256

    83e21072320d3fbe2a7b2845254e5d3474f406a2116d9d47e2bcfb5c233f316e

    SHA512

    0f6dd9bdf92acae8007e33d60c2ec1df73380a8395cafec99b8d66f96014b9a4cf712b2df0ee347a22de484b490c9a34174efaee7b1061fe38fbce00258d025b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bd38a5a4d718416950e98e6d9ce1761

    SHA1

    dd7551af70190805709edefe036930397d7d5625

    SHA256

    2a8c6e2523ae01f58f2055909cf5d44538d3248a7d018a9e9b5456c0fbe655ff

    SHA512

    0b4417f68c2d75a44b562d5329462c291b35f7edb93ae3df14625d77ea2743111dc19edbdc150a766535d084422fda3d9924eba00c6de4cfe5c40f22720d411a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    03a8d80a7dbe0f68e1bb7052a1e09aec

    SHA1

    b862f037e584e49c6acb21418ae70e84195f8841

    SHA256

    e0f112edb9d74e20b5db81ea2025314545b1ed51cb6374813abf4ee6b6d8cceb

    SHA512

    0de0ff630ded842578144c7a55e6d581d07ddf9b09690a260e2215bc2f1ebef30881eba68ce7c0757b1835eb2d3be8808a4ebc01f70829a33f3ef3fbce353b9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d59bd67779adfe01987737992cc8748

    SHA1

    91690d988113b40a4c6c6a3cbffd43a898c042b7

    SHA256

    4c4230905de13a63988836b63752687eae2f6751c5a89a0057ca5b6ef8147535

    SHA512

    94185382ab584547499b0719703975b0e2babab1e3fac053ae7103a090bda918263051c7155a1a7a722cbffc5f5027a65dbcfc1b26951f5d98bf42c08a942bab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a6fa8618e7a3d2bd475b91518e7f011

    SHA1

    d31d3cd86cb37e0ffcef2f66bc8a4cf16d069ae1

    SHA256

    af0e35e7786c8eb64e07f5a3da2b188cbcabfc1514f291523197870cd245455d

    SHA512

    3a4c8938b866e623b2abb2321c94f858f32ba80ff3df17d0e5c7b3c7b5ca840b1ba34766b5b3e694237be613c819ef408f76bb55507b88c302eb16146148acc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58f325e7613b45872bf1313c85c41be7

    SHA1

    36bc03dde2f815825d49b940afb73abeadf400ab

    SHA256

    76066410a75b3036ad708c1bc3714c3ffbe7a8a91c16851b021f2fa7fdb91615

    SHA512

    15bee6da339d3d4a0246045a180f7141e90c33da531fd5985f4d3ff7c5d78ff0aa56a21234e3e690d09ab6b3fa49cb7d707b83c18a697bcdd7b901303d95f1dd

  • C:\Users\Admin\AppData\Local\Temp\CabA0D1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CabA191.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarA1C4.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a