Analysis

  • max time kernel
    148s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 03:05

General

  • Target

    65cb4c2c45bd886825d8b62a0f7260c3_JaffaCakes118.html

  • Size

    18KB

  • MD5

    65cb4c2c45bd886825d8b62a0f7260c3

  • SHA1

    0561e0887344e00dcf3ea43703904364dca76609

  • SHA256

    430d32a7bd89ba7e6e8b5c6bb5896b5abaeb10c41255773b0f265967d660155e

  • SHA512

    6af1cb0532d69b5a19902b9be75d6931f6f84ef84644dbde7c1dc3509fcbee76a72cf7d611a5d48f0c4c36025ef4e2ca6243635718ba46c0938d320c22141383

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAId4zzUnjBh9X82qDB8:SIMd0I5nvHdsv9sxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65cb4c2c45bd886825d8b62a0f7260c3_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    190848412de27d049168279928c87abf

    SHA1

    75d404a6987e6b70f631c8b3e63cf11f1ecbd56f

    SHA256

    1f1a7592beac6e3740ec2ec40a153a3f54106207d1568f7cf5046cfd548cb727

    SHA512

    b9bcf6d2d0b99ca6a3df041fcbfb6ff8082cd127c680f647c4132861fba275d064c5f73264893c483925caea49192da0a245485688b3aa6d2695fb76014ee212

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3202f82c324855d6488a15bec01456e

    SHA1

    fb372b0e8b544128a570cdc5168a5ef6e37029cd

    SHA256

    c9930059498db678f1e1018d76965d14061084fc9ae2bbbcdf7def9aeda09373

    SHA512

    282860ddc9f19f2093c5f6cf135e561def846160b5bf906ebb385eb4d4d94763ccf3487dd303cc31a4285ed503862aad93c02459742c97762500b51067644575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    750246c4552a3e3b5e2ec4b3c72290e3

    SHA1

    0fcc3babc44cc3955fb3c6874d0c267626ecf9d5

    SHA256

    3a181a322e7a28231a93b47eb22137af28ea254dea29b63501cdf4e4344d7311

    SHA512

    ff2e1d45918fd14e84b265cd2e625f35ac4dea2b2da7bf5756581d0658cac6759d3d10f6906d1e3774fe1ea778e86fe51a886d5e6e6cc7e2c4079534288b51f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91bf41a2466d23c9d7edcd59001755d9

    SHA1

    d9dca05d96f973b1201e0ca3ac5685fc33c41fa2

    SHA256

    407407703eb915a23d82659c2af0e7856fa81d50ad71997d08d6ded44da95f44

    SHA512

    c4515c9523889f138e4ef36146f65e373333ef00e8445f189bbfa881198b7e3215c3ed8ef0f927876f3d88d9b0906096e9d0fa2ca714220ee1af832e504be623

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4976334a32d6f50bd593c11af8f8058

    SHA1

    37404c6aa9d3a7474a3aa45f9aca7eb875599812

    SHA256

    57b0eca6e13194a4a74e39a9b1677b73754b587575df24f29a14a5f76d8a27df

    SHA512

    1b04c51c34679cf43d5884d6cade833f2d4dfb0e4a48e07114627aa22cd2317475557ba20916111a049a2e8abcdc4e958fadd1ba2731ee77681bc491e6c7dd13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ad712920724d046d4d309e4cb213d10

    SHA1

    0e3b6d1b8f7365636f137c1ba6a76b9ada37a7f2

    SHA256

    77775b25988b4238314fe19c3b4f202d016009a5fb39417f5cfa5e4a29487a4b

    SHA512

    2935e479a743406a04626fd4f79e2028ac7bba6a5d11df2b01fbeeefdf57f89d5a7e5806d23d92726cea1c4675530a993974aef11cf802270a301793aae52097

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46429cacf4dd81007ab9ab9dfd2cffee

    SHA1

    26978d7a46963739ca2fdd6c811390a00157b704

    SHA256

    d8bb48afc6f18ada3b13ee0f98b46cc1fc1db84bdc52233fe0f2b6f53af428ec

    SHA512

    3c04fd7dd09c8b3265966e768f33ae649e7160ffdb9681c4f71d19cb33eafd2efc54c5324cf83e3ade373b476e55d0112cb76d2e8223823eb7dd83683e15fe62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77a6e6f18fa1a85f0f5ef1f832a80ca9

    SHA1

    6ae46bae76d1edad4c8fc6960ea32f9abd0037d2

    SHA256

    221d784d9429512a9d5f73dd4b408c08b6b033215afa0e5c7457ca49be002719

    SHA512

    ca38178f51b1a4a48651ae10e6a56f5af1f439d2e20c4fdd2e0d007f93aea9437ee61264f399b670122cec46b0e7a560592db4566143e4ff42963f4b9488fee9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    251f3413a7e617d4e6caeb49ffc9b1a7

    SHA1

    dfc7d195f44f3ad78430228936211471f1d138d1

    SHA256

    d1192373416eeff4340733501942c5939d67490258e316bc42155eb34f836afa

    SHA512

    63cc9a2311f8b7ec7387b93872bf01505b94e0da8b119849ee89fff8fa43aed70f5f6906368702dca1b65bb2386a99712e296d31b2e4ceed93504e37c8d7f515

  • C:\Users\Admin\AppData\Local\Temp\Cab1610.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar1663.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a