Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 09:29

General

  • Target

    4f5a727ff329a25b5c9c6add9bc0eb77_JaffaCakes118.html

  • Size

    27KB

  • MD5

    4f5a727ff329a25b5c9c6add9bc0eb77

  • SHA1

    9010e208f2aab5e47525fa65572264dcfbba01a2

  • SHA256

    b2bc85ee97737bd524be8428ccffa7bbec4a45652457298940a1a13c2eec7694

  • SHA512

    f576671e4c5f74eaadd303881d970789d307f9aba0f70269c3735e8c4e65309917cca9459c44142d3995e50d1385116ba4a8b94c70ccbdfdf94403e172c1e98a

  • SSDEEP

    384:uIqYdHCATujFH2pWlnhO2ktvTLOaz2mqFiMTlmI:uZOHCiQ9O2ktvTLsmqF1TlmI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f5a727ff329a25b5c9c6add9bc0eb77_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21223e4741541b4343f882db206d8106

    SHA1

    365e92bafb9a0b7e265ee0f343d00b294e19db89

    SHA256

    7449da0980f7c769e59ee1a43338f89feb3172787a2f5686feb7210e49427ea6

    SHA512

    cecf718de3d0f76b6105c13cdad2f0e1169c6d438a309c0b4fdb5e5b3e4245a5ef3d87e720df4e22b0bd56d0f0e57df443ee1b4c15b3b94f511e1db4592844a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c679596895a95c95e06af9170d676e76

    SHA1

    bf131078d5da16f782b87408e82401f33443ff3e

    SHA256

    59f8e2e0b916fecc7eebe00ea5cccd0af935f2a3b43454f8f79887de4fcaa7b2

    SHA512

    c3f710444857fc7ba1fd2cfa54078dd97b2a976a98546f761fa209d500c9e3f83cdaee4961aef2fc5cd992993c1b8cb23840f0a9b3d004e20cec60b5b4ca0b16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d4dea821df95b1c37306cc700b44937

    SHA1

    769486aea2012977b9b712064e599a97a7e46742

    SHA256

    f25853a767ddc29628ae0ed2b3626a904df001295c613d865151675032871b2d

    SHA512

    0f1d4401fb108633b305849fb86e5198ff1c84aa2992c9d5920040d24cd5386f8e8a85c1aadc34cddca78ebd31267eda20ad6866e803724709a750165b57a625

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c4ce417e68b179b2de1fe2eca24b49f5

    SHA1

    7bc87162dd4ad4aebcf689a5806897b0d19e760f

    SHA256

    e9dc624c5055e0b0f82ec6ff76288027a3f0a81d56cd7417317f0063eb4d53e1

    SHA512

    ec4891bfe09f2ff61669ac448ddca4dee93484c1408d553a37e2c20ef2de5651150a2c9017bd3c6660076fa560946158b4aa8d8e8fba007f16512c718afbe2dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ed37358ed5b439d2c981e065259a83e

    SHA1

    6b5598f6363fb7b00bdffa3af060a09e11f89341

    SHA256

    d884a9025d32a1bca46d99a1a91322f7fe43c36dce52d630eaebd760f153227f

    SHA512

    e61b8174ccff56095b5ec127874593693ab85faf8d6548478e8f5106d64eb13f683a099db5fbe657b73f365d07916d966c67a2f4be66e965b500bf35a573157b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7a591b65235955730207dc62989ab2a

    SHA1

    5324ac3304d0c3c3f72b2271578c4325347c29d0

    SHA256

    6e64392dc9394e400f4bbb2a141a8ffaa4f2ecf96c30651a5a3cb7fff7bac832

    SHA512

    216f40ad1fdfb4026cd3f5fb73b08443fb3faf4c314aba6edd60ee2feb180195a8dcda4bffc2420875856889c075e737adb10f74b8ed32751589ba2f0bcbd519

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d61008b61d0e271232df2043dc825c15

    SHA1

    8f8071c5cbd69b6d51843affa46866c4145cb486

    SHA256

    34566384a904c7936b9efea00e58c1dc2a2e0d65d62316ed462845dc32042b4a

    SHA512

    12b35e147465d07615722700fbe4a606a740dc5a3bf1d7472501d3c45f9bd910131ccfed9a9babadb1a4ec9881febb3549ed9cce23e726b669988c98a83d8eff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0ad233541266b9e9213eda50b9345ba

    SHA1

    75c15dab51705fcd4204953f2ba34d7176f46413

    SHA256

    48ad11a8c1675f3e05d7fea356f8efe1140ec98bb4406b0f338bd5efc861205d

    SHA512

    fbe113882b0d0ba6f4e99916607bbfafdc6aecc0d48184f0cba09182301c84e4700fbac936bcf5f0ad187d3721fbd7fe904c19df1806b0d2b792de2099ceb9b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4256e65421d9336918af149fe4027d4c

    SHA1

    dad781501125c20d0a57bb60032fa7be74fcadd6

    SHA256

    3d844063ac4779f830eeb9cac77e0534060431b48f032cb43f8c6af2a6d6bcc0

    SHA512

    bec3558f5032a62d14ca7065497d56d6de17b6ded4e7ad91f4e844c53ad98307ffece533ceb8da30b190fad1b27e47bbf2dec46955c1ee3d3ee2f75a70be605d

  • C:\Users\Admin\AppData\Local\Temp\CabACC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarBCD.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a