Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 11:05

General

  • Target

    45e0905a022324ae598031907b2c6e6f_JaffaCakes118.html

  • Size

    214KB

  • MD5

    45e0905a022324ae598031907b2c6e6f

  • SHA1

    cd6190b55c2d00a649b8baba13e7e487c231e318

  • SHA256

    366056dc09bf14a7c0446a7f9c73cc99b7a703213f7b027003050bebdeb5db21

  • SHA512

    23fbddf2cb1fbe94f2439c07333af8b7b469300462c8f940b54ef5469a5a72610934ddd91e517972a748b1ab702868545ea1f4e2b7a200f05a0109302c5c0290

  • SSDEEP

    3072:JrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJLq:tz9VxLY7iAVLTBQJlLq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45e0905a022324ae598031907b2c6e6f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33fda131b56b89f5d39b6e89ae83d3a7

    SHA1

    9ad402fec659f5bdb0f65eb4bcf5ee670bd19ad4

    SHA256

    f72287bbddf8196681d601680eb8e2cca9bc814d7e7347dde5eb33bfce9ef8e0

    SHA512

    7ed8477429097f21c4a7eeb79fc9790ce6e8f4830a3fb3827c4fa3d0f11601cb0c25c8937ed1b771f5f080403d2dfb94f7474afb3762fc85c67676c8909f67fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f77a9ee9f1a7e849e7afcf08a9d49ae6

    SHA1

    f36bf6b71261308cc1362e95a8a95912565059db

    SHA256

    9e1700702638cdf432a624283d6530e80bac1491fcd221b0fc8fc48eed0459c6

    SHA512

    b2fc6bffe55c21118ba95478b1aaf18a39a326821477016c114cb7fb6fb15edfa1db9218caa00704788ee204298dac17affd383be70686bfba484bd7e4a6f99d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5dd5ad7503e61614a40d1a2770071d0c

    SHA1

    7f1d833ada25b966787224fb3c33747d2590c60d

    SHA256

    298728ebc1691d6d7bd274e8a65b99bd6dba299d935905de0775e2561a0c9623

    SHA512

    db0e16d2c928279d717f54e6e1aec653fce7469a40a3ce349f9399de0a833b6082ff51c00cb494184e8e9c49ab7a945c1e7c610aab58c94ff2e5404a0e10b4d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2234e310954bab059cff5a40a8f63677

    SHA1

    609000143ce050eeea58fccd736c5fad66945d94

    SHA256

    d335f80c53f4414e58fa757ea7dc5227ad3d240e8482712254e9624b149d242c

    SHA512

    16da369127e37f486ba10f5e105ec0023555801dbcb266d1d322cb972e8b63cb789a60815f7b2eed1243385c6f7ea349c4acd542270df65db114555323a5006e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    feebae4f2fbd027be378aa9332228f90

    SHA1

    29d291bbd5b101ae5fdcc31a581aa1afe8c65e1c

    SHA256

    b6682ad42d08ce45ceb79efe596262ac23a8170c91d9d67d817e838fc1115206

    SHA512

    b96ecc2b4d8437c41d41448de7af346e21c0401153f2fd0543619f1f9327f776819155e9a0b422d0e7650fe1f0ab8c840f757ea0d774c03745baf20793cc3d32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3245ffe28e3115a6c5f026a83ef32bc6

    SHA1

    e9fdd3b662fa0f1e5a6df9b27aee20e417152dac

    SHA256

    420248b606e7cefe1f04131bef5ef0de5c1cd7bc2f34890e58cf7178558618d7

    SHA512

    c9cd10f11b421130d508d93b23401c9a889070bc66cf374e65563a669dc2de805f35668ad06e76311ed9b014a175815377b30b42cd13464e63ab3a7788c3b5de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b96622adc2527e5230252e9a09bd5c91

    SHA1

    5dfc271d4531b1c69330535730351233b06a5a4b

    SHA256

    3eba6c6e5d2969a7c2d90e32e5efb7acabb768266dfa398574ffa0731b3fd5e9

    SHA512

    559474eed10e8ecc67ce88fdb9652fd0d9c4c4bf712cee601d9393a5fc99cec32cc0724141dfac39ed6173236d97c5acd813ef4a2a8389edf90f18fe30584728

  • C:\Users\Admin\AppData\Local\Temp\Cab1D9E.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar21F7.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a