Analysis

  • max time kernel
    136s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 07:24

General

  • Target

    627e4098d0f9fdeb55e62fba1a83c7e3_JaffaCakes118.html

  • Size

    18KB

  • MD5

    627e4098d0f9fdeb55e62fba1a83c7e3

  • SHA1

    210a4c43b48d65e5ace43c866f0766a046187236

  • SHA256

    2adb247039a19c3fe22f1f544fa70e8cfd2674ce6d85ae5a33448eaf0a9e8c50

  • SHA512

    a82c210fd84d257f2143fc75a5531b18efc846c16d261648c8f379863470cce616dab0262af2970c1871e72e05ea793f9d0183899ccf9cd7b94a49f9f65e0f47

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIp4FzUnjBhPB82qDB8:SIMd0I5nvHtsvPKxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\627e4098d0f9fdeb55e62fba1a83c7e3_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1ca63d4784ef9ec0878c57834b47ffb

    SHA1

    59b2fed2bf3a490b471329d9fb636f8146de95f2

    SHA256

    7bd2f1f2d567669ffd47573e491e18b9ecaf2eb49f5d140f04a73c526d76f73f

    SHA512

    03eb82d848a6ef6395d238edd7f6e0487b016b0700dbe90715de9ed727f598935caccb377a10c2b2b4fc17e16804b1807c1bee8406f4654fc45b27ef6ea78b1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ede331a58bad04f6bedb7d9e4680508e

    SHA1

    24e1a671c7de47afb0566456a4704c2cf935a559

    SHA256

    20aa1d6806174a661e272235768b4729e412cd619257b7c5ca96ce25e18ae5eb

    SHA512

    a238b70036f26bcb941b94b9cd3d1a03764b8768330ff9ab66327456b2b741569dc33ac5785ed1a553af679d51caea565902f9e64066ba12484371eb421b9a23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b7e3c50e67e62819c9a0239523da537f

    SHA1

    4795bb61981121ff1d8982f5f88cbc1b384f6c21

    SHA256

    3fbe02cb99c3ef682f5d8a395b995727f79feac12255a3fd76ef3baa0b41614d

    SHA512

    c9145029301d50c9b5656aea70998c38e69075d4629e25df4a3a9b29ab8023e09b6ae0dca7544dc8b529a025f51c6db1a465804aee40440ea66b74b649771249

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0380b8f3a2b29117715cc9a07d311f39

    SHA1

    6bbdbb91e2551824a8c96f505cc6f0afea5edbd5

    SHA256

    47d792499450854638f1bdda787e52768d4f197f9a4629572888dce133e205b4

    SHA512

    3144bbb8fad1044d6af9843d55e112cad05c1d4df899bf10d484d540df078f59fbe0f0d391bba84ba0f008fc22d1cbd97cad8e78a609a15063913ddb710907d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0467dd90303e80a229da353c55913acc

    SHA1

    1b3e5f3c3ae79e93801e5db228ffa5f20ab856d2

    SHA256

    d68b30614c28f10608e8bd5f8ce3bf4fac2e18259d457b99cd9d479b5b74c7b9

    SHA512

    fdabb7f90e5ee03ffa891d3f58b32de23cbbf2336cda5709b82bb61bf2822ee9b60444baa5a650533be2ba7f939ab949b0b3fec40c83c8eb4e9921ed6635a221

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9eab6dc5f970cb487d88f01ada18d24c

    SHA1

    1675d4c735d59a1a0dbce7a048f6642403a95f26

    SHA256

    c06cc44a0c5d738cb95a7ea4f7272cce5d69c5e2d7e61082911f84ffd72614ba

    SHA512

    cfef2d8c4672ac8d10c06764fbed78eae67240bc6952ecf73d9e5e24eaa157394caca0f4d44398d787d4840292b54af786b6f10f4e9c3585c5eee469e012b1de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1278856d8c9a4b2e3c89a5982a433683

    SHA1

    8f1d749e772b6f994e23387c1a2861219bd56706

    SHA256

    83dadc38ef231abfcb6664ba9aa08971c8d68acd4fdc9124cd936a1ba06e1a74

    SHA512

    a4c3d45b89ada7c42e88bd4ff27876c93387c21f2f2d824edb8f73e14bed2f526d6361ed923a58a6e64b0fddd245a18146dc08996bb562155b7d2a6e2ab98928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    705c194256a6c8cc6592aebc10c76ce6

    SHA1

    dbe2a6239be9abcddf00037160790f433644d6ba

    SHA256

    5d01ea821e542c149e73471d8df0967a1f25c0f017cd51a86f8a9f926eba10ab

    SHA512

    ca8f1e26944f0fb3bfac651ff2f4ab8ae6e1479aab770eb5d49edb7419b01e00c4ff62dd9409bc90fffbe60a6d94fb6de08a55c050993bb5f3dd0bd5922cb502

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ac098bd4b216ef5c368b5f95279a778

    SHA1

    ac4f8474c3cdcdd2d8f01822105b5fbcda1cfe9e

    SHA256

    1cf36216dd363f1c190f4813e7118646908d726a057936f7bf63409fefd43ed3

    SHA512

    359846b0a02f94a0703ab99b22f1074784a325a2e3c6e553d8908f9f8bb3d4d2605f737142d43c63bf39ce2ec530fe351cdc53ababcb71205f4ea963eb6b9e22

  • C:\Users\Admin\AppData\Local\Temp\Cab784C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab7968.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar79BD.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a