Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 08:33

General

  • Target

    40dd89d358008d5d6ba901274e7246f2_JaffaCakes118.html

  • Size

    33KB

  • MD5

    40dd89d358008d5d6ba901274e7246f2

  • SHA1

    ac92c49ee1c84dce91fa915532afc5830e4736f3

  • SHA256

    8f6bb19fad533c52c52038617b216749e62df95407e2b2d53611bc45eca0379a

  • SHA512

    757ed2be745846f8614f942e688820a716866f05bffd2d23b1ecbbbf80664ef00efb52329f23ca44695ed99aa41be35092bbbfc227a36309cc767c8c9fea9760

  • SSDEEP

    768:OFjbf1bVyDb2vby7mvQ/F9bQnAb8UroGeE01Ju4J1YAX2VstXP:OFjJZyDSW7mvQTMnAb8Ur0e8ZG+BP

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40dd89d358008d5d6ba901274e7246f2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e15a2ae446e973e3d0341f62dc50af2e

    SHA1

    3c478eef2cef20bc76ae358a7db7b77d87849e09

    SHA256

    b93f609cb97ff29adb2935ef0a4b061ae1a9c2ef084b54ced2a5e3c369698aef

    SHA512

    c2da58fa277d4fcb4b08c273e511d80af4669b1895e677c750170f45d05aafdb3aa397b62495b77f33ffd5c96459b87125d9be58b0cf3d40496d1d3abaecfce0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97c9445233bcd9dc7ce382fa23638fbc

    SHA1

    193c0af1a7682402d39b9ac4957194060076d702

    SHA256

    83f4e4bc6089c7c83183c4d71eca4be5f41c136284d3b4c979f8dcc5cae14ed8

    SHA512

    56281626ef16bfc8ce8c29e41f8037f7191452c4c799f6ba721266428d8cb0071d0db31c6ad608dda639ebaf7bdbf61bd5fef8dfdb1bcdfde0cf4917a1305359

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fc5086cb064c79b89a8fe9ddc4a35c8

    SHA1

    e2f8ac51e1e8b202b2e207810fce9eb84d648d36

    SHA256

    b62c9966259b4c14ca8bb26dd07074835eb44c183144a3406fcd7800a8f43734

    SHA512

    5d371b8c55ad161c6c36dec507f3eddf1fb3a3fe81f2f7ac307607722411bd8d0de0d06cb15a96088712cc6317529e53c6b2491ae8f205f56caf4ddfda686148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7292811deb354a931f48ddf284e61690

    SHA1

    1ea63d15d3c56df305d2cf6cf5b7484a1564aed6

    SHA256

    ff820d2ad3400dd06ed8f75da0a402af8df08753859200ab774b91650cb86add

    SHA512

    a9e1d7e080d7917751f27f9c308e18d7bfb0d5a92b4fb01839a1186e7da5d290dfe68f3ba63df24eae3cee5142180e737bf782a66b7c5c064b4921c68bb16e71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9cfc57451c404f63e265cf57e71e364b

    SHA1

    58a751df327e132d895ef9e7a4f554a7b3ab8cbc

    SHA256

    8c3a502ed6d789b9efea0c8b7e55ca76036208ef9c2ae26fdf1db45aec207cdc

    SHA512

    2948263e60100b399317871cb8c84bb53575584794eb652cf8a9b97720af47c8bd9889198eecc546637c5960d4be7c2cbda662306f99d62645293a5991a70196

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81298632b8b927bdee1e0a30c286466b

    SHA1

    d716b18a66d8d34f2bea645e204cb7b0cf8df65d

    SHA256

    7ee20a818189f8e2feaf5645a681e2804df71d924061b86530da0ec14fc911f2

    SHA512

    ce8937c49e542d4221337af4835e71903291b0fbf99ab3810048573ee9bbc75d8c0ccd2e728d4c7f70a6e4b022a844622e9827bb8057dd904f64b02db4a82c86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b031265c6efc4216feb2f8fd96bebf48

    SHA1

    170f4a711f148eb3e3ce580b7e11d1ecb5e6eca0

    SHA256

    66fcda6b943f1df77178c9ea66e7ef3d0419923d63ca9f50126493b72b4b7b70

    SHA512

    6601acd3deab67499fd591bfa5730aa15bd209b1b5c98372578ef6b4ee183ffb13a8d0ae280bb2c0816c12ed31ee1f816601d181f88e21afb86459be3727715b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e55bf82d3802226c8e8c32ddba907101

    SHA1

    fc9c3043888d2a05ac3a6a60ce31d0f4c83149de

    SHA256

    4e83ba4295dcb0740c1870b591b6d8716f73f33cddf4aebe3527794597296b38

    SHA512

    c3f54261c07680eb7bafc5514825aa58118c7d17a7f6c1348f9b993e623666cd35d0506fbcaca7113ab78c0264e6dcdecae92facb9e0570b0576607c8d687a77

  • C:\Users\Admin\AppData\Local\Temp\Cab15E3.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar16D4.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a