Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 03:46

General

  • Target

    5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html

  • Size

    255KB

  • MD5

    5d055130ebf85c6e5f512d73582a0ccb

  • SHA1

    a10783a7cedebf422fac55d8da1bc8c90bc70bfa

  • SHA256

    79f6c3e2b5fb6db4bae081042668705434f4c8a5e3ffe41fa0d62d373469c471

  • SHA512

    95f91e1e3c22de7d3bacf548a18c75c6827bf2d7f0e7d6c24cd2503e5429136bba06ad33b56b4412b7c3a8b1e8d18e8a21faeacc1e2810390797e737609472b2

  • SSDEEP

    3072:SIgRNyfkMY+BES09JXAnyrZalI+YPyfkMY+BES09JXAnyrZalI+YQ:SYsMYod+X3oI+YasMYod+X3oI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4839b64e366d58e8f46edbcd6ec50e46

    SHA1

    deed04781550974f0a1a51ad16c169113ae74bdc

    SHA256

    f75116949185a5ffdc9df72f9586c5fe41374d1d627e464465b7ebf1befd94f1

    SHA512

    aaddd005f1a39b2970c2865e179dbc854b9c8b10faacf6a3065447194e4bfc349ccbfc197c3c62ceb61c76bdb8e92bef8821b8a462b3b6e30b92349fac4746ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    778dc618572c962e7fd05f792890bc42

    SHA1

    a0ddcca675b5c7a7c300faf313192e6d0d8a11b7

    SHA256

    8f8e1fdb30677773e66b5a50083fbab70de39529025c5ff7dab36692ef115746

    SHA512

    fd9b827ae856492a1c5d8a37c329d5d7a1d7b2a0e7b1d6d5fcf05fd7f242d8ef812773c79aa602a58751aefe6e07e814191837efec189be7ee080a5bf9a2d2f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bef7969467b62fdcdbde1f4f63c1625b

    SHA1

    f2757f34d21399f6d69710b34c376f51e03bdcba

    SHA256

    0ea5b6f6735c2dd97686fb0f6293ff371093069226ef310d2c0c89caa7e61134

    SHA512

    076d1027afac813db60073a640caf4a0cf848c7490f5c95acb5e228b6666a8840b66d7ed90856f7e835d2b614931dfb6ce44c37b817dee4b7bf0e81a36e507d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    836725782816850e421d149834f85127

    SHA1

    495feb34356abdc3a6d503eb6e8df4247b4011b9

    SHA256

    1770af3834dbd2085e32bf0bbea13dac4130efc6fe9d3dfdda9c9fc96f14084b

    SHA512

    1eb65160e95d0f2b46f93db5eea81f3adf14f57a33542062444434e8a277a009e4fe2156ba72f8bae1a7cd093c8794c49190b91ccb2ebb8faa8ff356afeba0b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    843340c7826e6830de569c6cf49a5f1a

    SHA1

    ed400dad3d29a75af6183a775ede43cebc05ac77

    SHA256

    70f6d97a796753eb72712e8345237e82069825afc99820245ff372d81c8f3ba2

    SHA512

    533f56d16b6108b5a51e16b68cab0da9606b6c558fe454950701190137c6c050770600bb82e57ca4979afcd0335a0392dc7737704e45cfc13e74981eedf3585a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91176f383af941f65a38cd73982d5a5a

    SHA1

    c488b53c483d8f53a132a11b3286baac70060dfe

    SHA256

    49a571756d855b2b28ddb0591d18276ec25aaf9b5b87301ffc4988fe0f069097

    SHA512

    46d2404c763392406617180067d4afc09e0d7a5dfb35e90ecbb05aac230777f65ec1f220649c0324860b2ceac0c60c14037c814cd4a8d9d8bc7c4e95c0473fbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51967e507bd9d308a9aeca7eee820ef1

    SHA1

    cbcd4540f159a608582546775ec80d6d64777ec5

    SHA256

    3edf6afab647b654b77470f8dfc485d0a863de34d5cd55d214902f70a43da5b8

    SHA512

    6679866ef73daf33434347057c1e5db568955f29119a1b3a3d8358f2e469c8ca595d94a26f468a6f71ac6c7ae0080aa23a50fdab542de7e410ee3c7ae7d5419f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8ab5d93098a972c826995d208ff9fd7

    SHA1

    95ed82672f9d415dae10fb92d80fbf6bd3951477

    SHA256

    e755e07ba70b4544215187111b56b4148b4a7ae5dd65d8e640d3c03433a69524

    SHA512

    e7051fc766d7ad93188da9716c17d84d66d0ca1c6c5b56c2aa4b1845c98c6cd23ff480e40456bf5059810ff72719998b4e61d3752c4f0a2de7f770745306f6a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24dfd01474b7e2e6bcfa7b6987dd1fe7

    SHA1

    19f92f361015c2fa5e8bf63223f0c675c9a686ec

    SHA256

    536baef7af9ce70fb09cfec7535c0311f5a9400ae70402d011677724b2ea7d96

    SHA512

    f0769751d57cae102bb32f3a770c784bfdc9c72bc7c52832accef47bcc2794d5d14ce0e77b7e9d7282ac551f2b731a4e1ca74fc957c3c038dce8319e211af288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6e19a5c5aeb0c2ce02bbd6162e6f8b9

    SHA1

    632be2a6671399e8cb1348d6fd0e7c24ccb138f1

    SHA256

    33d2a356fce5d1b4115ca298110113ed0e4c491183cf7b3c36a8c0794deea670

    SHA512

    70907e8eaf80fd4501a42b1048837e9fb335d4a4fc16c2b271303badc2bc293f78444c14517933bab3dc501920275af05defb7849c1990058f51bced1036c920

  • C:\Users\Admin\AppData\Local\Temp\Cab30E0.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar30F3.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a