Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 04:28

General

  • Target

    448727341ca5127abce93e61cd51ec46_JaffaCakes118.html

  • Size

    19KB

  • MD5

    448727341ca5127abce93e61cd51ec46

  • SHA1

    e607a8bc6270a56987383a426d4c880c59b3a3f4

  • SHA256

    79507b28a990587adaccb26dc3e53fa7a52ebd46e5de617b3b0708b2d51274b9

  • SHA512

    8ef482ebaa41620cc6d4d789523168504641b0e0bb55bbcbe4e340fb01b84a84d1c2bfc7b1c44903649ceff98171a2eb52201774f307de9ec56939600e2bea8e

  • SSDEEP

    192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIN4bzUnjBh9X82qDB8:SIMd0I5nO9HBsv9sxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\448727341ca5127abce93e61cd51ec46_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ebd973fab412c92028bbd520e4b7bd4d

    SHA1

    f57b7457919b05f3c4183bdbb0978b6fd97c5a2a

    SHA256

    c314b531b89faca2f0f64fcd5d434515c18afd4054ba3b0b9b60f00adf157bec

    SHA512

    411f2377bc43a5533c21b82b339489334ba45878d08e17fc3f522594392cb2cc82256316f46b44a04545f33a4832858c66886900d348779ff3e9e37f9c1889d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    304069378d17d6a04f3f0fa2bd34f4a5

    SHA1

    d2d1855d38a8dd1c29fecf8400cbf2f0dbf83ac7

    SHA256

    08c35ddc0d9e1abe5eda50ef34221bb4acc33b147d2902540730219ba42fa7f7

    SHA512

    8e745453dc165955b83155108b6bf997ad7306b549b05a7ab695844084d05fe77ca524781597c3cc695a84308f06492143bd07efef2b09a87bb058e8fbc4f208

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e0b5904852e8dc9ed6d87e0aa293969

    SHA1

    ab38041a67639f7ca8ab1dcc84fe495c6424ef54

    SHA256

    5ab295a8a78583506f68647d48ebe553186e0449ebb3b9f09c0e37148743e3d6

    SHA512

    30cfb2aff4d7f17a9be0a947564a6bb72744aea3b6b2602d6eb368b2cfcf140b8597d4b97eda810492b4116f6cc5014819f0ba2d93a5d44091818ebf25b510cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02b8860955f08c0bf88565312867a709

    SHA1

    32dbeaf74f48049943a65366c7808eabd7691f6d

    SHA256

    183bd2bf84db7f809f93d46727bf50c43276490c5e5af74f85aea9c5c089bd3c

    SHA512

    12029656ad8adf36adfb6ff7c781a1edfdaab6f4c56ad05b9fdf14395068ac7e0152d05ccaa53cb73fc98dd3f8f207e15a9e9b82832612c5c15a28cceb462ce0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b13974a3b2f3fa12dc6093e4256651eb

    SHA1

    8d43a638272253274985e3d441eb5ece60c1fdc1

    SHA256

    666572e5a74b20c705028d15b68a6a18b1d695df991d6e89f65f6fe9b613f272

    SHA512

    579578b196c13de86ff04cb732c9d8efa881d99633f24facf51d006da5c2ddad26a730de73b0ce6cafa935f592fbfc3b6ac114f1a58c5d322b57cb56b6a58d3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    203be229ee020666068fe047bdafbc71

    SHA1

    573da0cc1b0487d6c02c3e19ba35dec06f8c0ee4

    SHA256

    b4498fe57183af977fcccdf46edf98fb300cab00ce74b526dd00d5690d3ba7b5

    SHA512

    290b2ab560c92bced5ead24e4146dbd9043dcb19ef368bcb6461ecaa9eb544546daa3f50c3339b59202cce0f8522efea319f4044598ecc427ac0ecc9a17affa5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    30f2d6ab164120e418adca13d4cfa9f8

    SHA1

    5bb6f8444199402fbc34cef78b4c8792a55540f7

    SHA256

    0ffb077e7046674d7092ce21b700a2388196375cfe44a555086a378406e1100c

    SHA512

    e3edc26e80a4a20cb9e8f6e0750a8daa1aaa3128efff3d41d23bfe62a9e27c8fc916bb8fd2da9a3cbe99afd1b8315371c39ab1ab925410c4be484916133573a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c73077caa520e6e6f3fb652aaf78a79c

    SHA1

    8cd9ed11cac6d453cff4126547868bca59721226

    SHA256

    154ac6727a37c481da89f79bb801a12bad64f503fe460f2995a2dfbd690ae43d

    SHA512

    b575ab4074fe01e5590a1ea99b1f693e32c3379576ad3e9d62813b1731be25354a39901b301c3c5f4f8ec2ac0ac5d8c26053a880ef9ac01f9f3b6b561ae068cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc2fb0e18459f5d565621992728dae4a

    SHA1

    e923326a4b3a6162969d1b592e00258a026fd632

    SHA256

    c63ca76429640720fa857c6f7283567101e59c422e0c4919bef59c505e4cde06

    SHA512

    9b811b2af532ac720d9a59b50c9f77859a054b101d41d47efb5c3a680787dbe15ac74490d5c61d1083531c6b650f0df670509bcf7319391f8106eabc48b085a7

  • C:\Users\Admin\AppData\Local\Temp\Cab5AE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar67F.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a