Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 22:27

General

  • Target

    64fd711bfce37e18caece4e514c2f41f_JaffaCakes118.html

  • Size

    18KB

  • MD5

    64fd711bfce37e18caece4e514c2f41f

  • SHA1

    ceda847506f296dabf796d67140082f90c7ed5fc

  • SHA256

    0e6f4a9bfceeca7c336b78aea28e847bc4cdb5d48410c68abac27cd5085ac35e

  • SHA512

    c0df29e3eceec64759355b6fc2dff6d2c5dfaf1fe8dd5ac760ef46d5a6b69398fce648fb568096532774e2559aac204fb5d8c8b73307732776e1e6edb4a4a55a

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIS4OzUnjBhqM82qDB8:SIMd0I5nvHhsvqfxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64fd711bfce37e18caece4e514c2f41f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b533635881c80dbca6c5c950b3e0b3e

    SHA1

    054729309cfd6e8a8c52df497cbb632bbeb303c3

    SHA256

    49989c754adc0ac6e7f51cfa51e80bd8574a497ec745872fa08e27c6b580a743

    SHA512

    739170c2daccb6c3370966944382bc12be0f22de5fc29b14dadedf1b2649d8e3e4e6ecc57740e8e9c892ef77f851ccbcde4a2c0f353bad80e95d7739862114c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db96c82da5547919374c2f5f92bd9006

    SHA1

    ca94263bd6dcbe1291ec89b19f564b02ae887b00

    SHA256

    373048fb95aa3a964674532eb3be9bde9d12f17aa3d35dc642d00249b688a8a4

    SHA512

    b654249bf9dff88b4276033e6690725f867897f8e7f3faa12c5a95bcd7c6d1809558d7e73a289aaec405d349da016f7fa38892295e9b2f4c409ca0f0721101db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e66192023abf27af45216c26249726b0

    SHA1

    e88bd203e4e3b2aabd318c1ac60229f414e04dec

    SHA256

    e3faf8e54d647c3f26c3db494294092747a1197bb8883d6867ecbe87685f3837

    SHA512

    23fb52da6d5a2bf46f17b46b2c15b25aa85cc49a558f6664bb0f84668f584b672848e987c9eba7c2edaeaad3b0578ed2923903242f1c4e0dd0c9371b876871f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed6bb7aa8731ef1293a808829f409ac9

    SHA1

    a3b9b0c5cd18b09ab1636d129020b6669835e93b

    SHA256

    a7f79490f87a25a2325b405411cc0e83a112a2e2bdd100b112870a2f3b38c4cb

    SHA512

    e1b27da71770ad13930492f75b475393b994fee72b738becf2fb3189f36e9b9601ca3a52994c601793dfe3b07d6885b6a2d4e7774b8896677598905e4f8c3270

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf39fdd42e034cdb0270db19bcfe30a9

    SHA1

    b61a33424e54c2913d3f3be27604cbf570996f98

    SHA256

    56d8ed6fe2f21884f50b61d3da2ff2a517e0fb8ed5df2bdff0fef4f4547b99c9

    SHA512

    3d201c7308a2445449ae2a56b80b783c92a29b22c2a0591e6cc5e786961ebb1ceb5b4a5368c25f6dd7168d9875a901e4c199062b272fc5d3c016b774da8a07df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53ae885cc1898ed2049d55f0596b8cc0

    SHA1

    f37ed312df62f0aa2d82367996cb24de3676092c

    SHA256

    1bfb8596f4b8eb8969d1dab2104ff2ffb93bde9f5eb8ec8f27a58df80384ada5

    SHA512

    b5a84cfc3434e2ed8cc0624487575f8ab5c0ff05594b6c614a6be71da6f1027217ee809fe9ec3677ba3385c34986946299777a30e9bfd2a0d43a9b94d2cdfaaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa7f785ab06f700dc99d117cecc7afec

    SHA1

    6d882890ca0967071357eeb23d27a0ae732507af

    SHA256

    9d65d1fd80fb6674d15e9c6883376faab0b6a621b6b927ffcb9d09d3ec842654

    SHA512

    8422ed13442f90d3b0d97c07ca371fea53d530fd8498b836d32daebd56264c4af13b63eecbfd29672391eb89ac1665b6b7823bb7170d8635e50b5bc3b961d475

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2066e382a7bffee0a62fc58c9d5d5773

    SHA1

    87dc815def66e2dcb49a99ddb0febac37c15b845

    SHA256

    e0bf53a4a860fd5bed0344ea50f45b553209cd7d6c609f3af8ad6d9fd5bd4b34

    SHA512

    7bfd5d91a1001dbf42e82dea1ba890dbde84cdb2ca6f1712981ea5a554bd6aaf02f5f57e67f33803a5be627ba1a08ea75436cf01420ec21e9d1283f799207838

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0405b63c28a66f066be605cc61a74d36

    SHA1

    3bee2d560d93b01dac402ffcd12bdb322af8e891

    SHA256

    d7e7b793f76a55d8f3fac4ebebd7bb58ace037b89591239d55f273a3f46c2d69

    SHA512

    251665fa82e075caf38950614f7b2d5d3dee9227b654b664b4bce4605da8fdbf9d6bfe4eaac74151e1e1ec01e27169f1784083551c3a5912970374712362d33e

  • C:\Users\Admin\AppData\Local\Temp\Cab8A37.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab8B05.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar8B58.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a