Analysis

  • max time kernel
    132s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:52

General

  • Target

    659777e7adb4a6b1a938868e6d8788de_JaffaCakes118.html

  • Size

    226KB

  • MD5

    659777e7adb4a6b1a938868e6d8788de

  • SHA1

    9d3edf98a75341fafd8682a54022eebcfb5d383a

  • SHA256

    49f00868f0db527997110f0e4d519f3771be95f687f04243fc0a4aeed01e5856

  • SHA512

    1aa3de433d1c58cf0402342051c3a5f8626a22ff82b017d28d995cc3a81b23841080413884605b4baca377cad4f38f3456f3d31c05d5c07033eb67a4af09eae9

  • SSDEEP

    3072:S17LyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:S17usMYod+X3oI+YLsMYod+X3oI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\659777e7adb4a6b1a938868e6d8788de_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5a461655afebcdb0313efcb6790feab

    SHA1

    d9448e28a9b7683ace1bcac42dad03150ceffc81

    SHA256

    e5c36befaef1e93916b500432ace18946cf803e2877846ad73381b147c3f2bce

    SHA512

    445bf44a3943f162f86021ea4a8c0f9d1b125edf5b2240b64671f57fbd60dde9f973045fafa4556998b05c7718127688b48033960527a6cf425415b79f22e1e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b621c0500d5587e6e63b6a8bf705b212

    SHA1

    fef4a874a8deee847758d6103667ea324c5b3129

    SHA256

    76fe76bf9ac5e7c614870a2230942cb2356c766d9db5821305fd579b055d5cbe

    SHA512

    12b67d9a11f0f98ebd5c7d5680af158133f0a8f501b93fe7219228e04eabb2cc941a781f701c9af25d9163b924f62c6e906287415e97ac2d042663278ff977a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e4135b0b484ade179b13fa891bb5c8a

    SHA1

    2d8be1576bea47df9696566778438dbd65b6876c

    SHA256

    27f3aded8c2e2635b630dcc70f9216f3881d3e068af445e2a3e6b178387492bc

    SHA512

    26758a254ef82cf455e6fa36f71d7c67ce39fce2224b6aabb230fb4fbff38f3821ae68e9113d591cc1fd6a91fea6b01c07fc2e6ac138f24178da62ac820a3561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84f3dde28c1967d30cd5028b9d11e2ba

    SHA1

    700c61e420d9324ab090fec00a268fbb488b077b

    SHA256

    8e488b568e9410fd41c0361715ada457a53a5dd511c9a12a71d5ee1f48a73fc8

    SHA512

    2fc81908b8b2c818e8bd3a8cdb7c50c0442caafc313722cbc92a3e740b8704333747b4368e32f81714e570ecec6caf73f774dc0f745e4888ef0d481c84700243

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fe0effbfc7152333052c919e62a4473

    SHA1

    003d007091e0cdeee6f4604b847a596fe78c7bba

    SHA256

    0a3b7305f0a9254844185a2fe2b56b76db199a03164bbe9a9a4a3b9fab5edd89

    SHA512

    6504c4d48572f1bda41a2da9abf456e06f73f693a570b3d997aee8a1ac95900de03065bdf58de12bdc8f293313be9a426f886ecab6d11deeb38d7416c15a4b07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f44765695fe95e684b52ad0c399de1bd

    SHA1

    581f4f3a492599eb48582a85311dbb478f1dac91

    SHA256

    d507230d4dd839adc05bd6ff46f15c4d3702997681240aac9f4327032890acac

    SHA512

    af355d1ff09d8e4d641517f21a1ebde9fbaf0f2906ce60171225b53a48d21abf94558ed7683987fc3c844bd25446780b5678b28113ea5f0e09faa5ac18afcc0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a88ba8a0a081bc96aa8b50d1df1aae0b

    SHA1

    01af7831a4b44edeefae1326173c395f85134e82

    SHA256

    e9424fcfaf636c1a1cf448e0cf05cfb359c8bc3ffc95e449bca724607f13afa8

    SHA512

    ba567734ed9ff7aff1459da9570d0fc5ba46eca82d71d8de92b8a92e26f4006b29782e8ccbac94595940194d49bab6ff33e7f1ab5ba37b2c67dd965f38c670c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    adcbc72f417e69df2a8b02540c96cb81

    SHA1

    34656a8bd7e3d2ee6238dd96ba31ce40a592e86d

    SHA256

    14ca2061bfbc1cfd49da62c6bfa827a113f2f2ba024ef64e6e9ce031ffecd9a0

    SHA512

    fdf9d5b03e301e0816fd431fbd7fc4b0077eb693df3bf88c4981a54fc117a5f332d2efcaf8e18a4685e2333727118978a5dacd4c514e4fd35079888fd5f9298e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84c538c8a3fe707e0f1ae3a3d8546ab9

    SHA1

    e9cab5fc48cf71119233bb2437f668dfcfd18e99

    SHA256

    1724317e57acadf6a794ea8cce88137184d051976276f7f619b4afd4d933a022

    SHA512

    239be9a2efe65d4323ec50ef7f28dfd7302c1956b5a8b0c6a22667db2fd7f77144e8c191738cdf202936414a37a14f80d8ca6ee283e573a54732848c3a4fde07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92c6889ce4026af5f7bfd60ce25fb152

    SHA1

    d467caa283b7c43a345d21f400c3a0b1e12670a6

    SHA256

    36086a47883828e5ae4b08ba05d3e9a95ee65d540c9fe8b0c885ca4a4cc5ddbf

    SHA512

    2b37e5434348c1c14bda0d74c22dee528c19bd2cd0c49757b6f080de6330eae610f6f9f4554988bb41d791740df094f13c1a51797d383157b0b6855264904ba1

  • C:\Users\Admin\AppData\Local\Temp\Cab3D6F.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar3DF0.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a