Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 03:15

General

  • Target

    65d1908fb412f24af0ce675ac6777537_JaffaCakes118.html

  • Size

    141KB

  • MD5

    65d1908fb412f24af0ce675ac6777537

  • SHA1

    b8742efa546365b75276d681d518958b7ee06ece

  • SHA256

    08f88ffc296f2ea833218b3e2174ec6705f24089ccc9972ebe13cd919c3e5f0c

  • SHA512

    709eeb08ef3d9c19da7fb5572e2ce4d1cae585effef4d4c276f959e5cd9401dc725e9c4d1f900e54b01c7c8341557187641d8569ed718c2960c8469cd1c5a0ad

  • SSDEEP

    3072:SCPG+EWEKMLx7dyfkMY+BES09JXAnyrZalI+YQ:SCPXEWE1x7osMYod+X3oI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d1908fb412f24af0ce675ac6777537_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16e6f1b40cd6b75875dfbd2f758d363e

    SHA1

    4fc85b3bc1818c981c0d521b0cf1163ad143902b

    SHA256

    88a8e238d083dcf9e88fb2efe54a581549c7ed0e892d8eac64cc0cf7fab73bed

    SHA512

    26bdd24975a3d61e2e20189b732c80f4a5045c33fdc4c9196458312ef38bc19a262dade1120350bc10f02ad39e31f3c879ccf41b90b64f86c7a7622a40a673a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8cc38626cd3beb5681847c69d8e17422

    SHA1

    92fd189c7efb0c8c67ca918377e63948a3d1e5ca

    SHA256

    76e2ebde2af3c6afae5481be41482f969148f124ea33913175703abf97e56a0f

    SHA512

    f796ec389854d744070924c2ac16a2feb7b4785ae8eeeb0808a77c0870783a2f436c47eac3c732fb2d54f4e1f9d2015b5714dc73985ce0cbcc599f0cb4c453da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36f659112e7d1c2c8b73218ae3ee239d

    SHA1

    f5a459d2a5e2353a949379acd5190a259af84144

    SHA256

    becd61f41085c7bb500b76a01d203e60f1eeeffa7b8eb820e3e917c68ef46a61

    SHA512

    1bfe0e6836c2020584e8039d07b5cfe7d98be1dc547a6bc00ae0343e6fa4c1e0281fb1af4386d57e76de83c290ae881089de9d1e8763d1d1bb30dacceb3f420e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f65d3bd8813f8963b6f82c6bf2d8cc0c

    SHA1

    05b6d916f4ef62500af50acb96b4662a42b8b54b

    SHA256

    891111a11611323e75e6e282dfcafec13a3b9aa9e4fa6e560ba4adbf5910a35c

    SHA512

    c9597b3e58096fa65a5a06c5e7dde4a130f0763ec26443f3c3a310eec53cb4bb92afc4f2b840cc94983a5f95dcd84b5e1a7af576d4cf1e292f10ade186f3cace

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1097021d060465fdbd699cd87320d8b

    SHA1

    8bd538d64c6dc724ba848ad8dd11749f98f06071

    SHA256

    2d13322d257a80e4234ab932b0272281158bd0e8fcd9a6b41a2629180012e3ce

    SHA512

    84eea949c5635d047504b7e93540e3e909d4e2f8a83e1b7da0a80e5ae6f8431e3aea06f72d9e085451e4f879e51bf2a3781b5d62b072c99e91c62e997d072219

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    706f4303c3149bd026fe68bb000f2e42

    SHA1

    dad16534ea354bf40ca33a13168ad6c350012b3a

    SHA256

    5b56cf4e8cc88b7172506147c778f6bd1ca8256777054ce7127bcc3c102a2542

    SHA512

    f8413912d5863f7961ada426ea0087f9ff7e116dcd645b84f6002e2a3408a9af5c85c461d4a5bd3773a13133f1ef3b1384660b5d723ff41f666b2aa027f7f69b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f013de2c2c0ab399e26bf0a50aee7dd

    SHA1

    0582dca4bb7a92282480bae4267810542f2bd558

    SHA256

    86dda9c337fb9188bd38546fa2fa564b0c42abe767526d24b59381031375afa8

    SHA512

    ff369a1ee03aee79c80dd4370f6cf30b95f6dab1e91cd12a9dd740ff2da28f72484fba61925deecb8011ed0fbeac11ffdd43a25a20a12ab0cc221134dfb096cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1eab6f60946ab9da5246e266587757eb

    SHA1

    05db9347033bcbc09855db83ec40a95886a083eb

    SHA256

    047926f090c1e0cf024ee7e51b5a4c6fc06e87e479391a41cb6cb636793f8dfb

    SHA512

    7756d732903d34d193252d66b3206d734b02ec51fcf3a42a88a36ddbc519fe1f751e42a4e62d3f4b7f768beb8e4e57a1ecf298bf697f9b4474dc6af67a9da574

  • C:\Users\Admin\AppData\Local\Temp\Cab11BE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar12AF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a