Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:09

General

  • Target

    68775d53e0faf7dcc1fe352885e7a67a_JaffaCakes118.html

  • Size

    19KB

  • MD5

    68775d53e0faf7dcc1fe352885e7a67a

  • SHA1

    66d092f14b5d5a8d61323c6d8d15db447156768c

  • SHA256

    9c9d37e0e531c4515a7744c7911f3966714395a0caacb1cc511ff67b57bfa2fd

  • SHA512

    2b2a7e76f55fabc0b57141b35b4eb589b1fd5756bd2f9dff039178b727a081d407c498827692771d439758d71aeb0b47b2add89fc97a74dc296b35f3ceb6e2a9

  • SSDEEP

    384:WCq3sjWLyf40G3fgu+vi2tB05tN/THVckMNRdVZUy:Wm40G3Yu+a2tB05X/Zc1ZUy

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68775d53e0faf7dcc1fe352885e7a67a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ea2489c41a57718682ad25a29607fbd2

    SHA1

    1e8117bc0063dc7be99a2f792874311e69425e6d

    SHA256

    858fe492532ca63e5562fc0512c34c5a1f219d86fe0dc323345dc6b2eab11f8c

    SHA512

    b29ed10cc4bc9d6176f6a4cbe4c2f401ba04393399f8cce36feec09141dc20225dce65f01ad61a7c118377286690f9c6b463de6e0d677f6e0856ea02ee16dd18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d66de4f3e2b06e15b2a11324b963342

    SHA1

    8bd2f814afe2030b3a69e52af173de59fc488543

    SHA256

    5327e4c5380ad653f2b804f28348f9ff3f65a4d0d5e8cef72dcc0428218fc5c8

    SHA512

    ba47d93fa494c652662e79af1d0dcdd0a3e7472ee6ab0a00c117e186a4f2a0106f0db94aae10cc440affeb60583fda9828769e982ba6a277d371034f8acf4034

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3710dca86d68875c2f7169eb843fcf7d

    SHA1

    fe3f034fdcef3394e62b3b7fe405c5d2752eda22

    SHA256

    36ebdd094a13326dec2e4ecec7bec9e0ce2eb317f29fb8df6b5b05fb247beb4f

    SHA512

    1a718c588cf0cf02d64e66df0ef7f8d8edc4234075667cdfff30e9af4e577a12a479f390c5ae9ae2008eedd75f17abcbcd0a89e82d326e98b91ad0aaf7c44552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    674aa74017aaef806c0fa37b26775602

    SHA1

    db961aa0e3521c7496b26e05b06313321591cdb4

    SHA256

    c723ddce7aee9552ad17fb1f5761ef805f39696c88974282517750b6e6aeae34

    SHA512

    e570feb55a8c2f0e5ee163549bd5ee5b4978d901c61271f5b996d5a3a4af3f5eb8c5506982b1d272894dfa9a7c8d77406b1e184d4cec6e3d2f995d3ce8b70bdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec93e2bef7f50415b35ee548e92176d4

    SHA1

    441d2d8d39922c879d5acde4a5f02fb12606c5fc

    SHA256

    ed9482bd8155995347e8c4953f9f17a15fc08cac0b754a86558604c9ef9e4747

    SHA512

    b940b3643f3b24a5371696fb3b1d2f4dcc46f5800ed304ae2f5793d77527df6c340688ea8c3a38e7c541e05f1db30b52581fe0d1811019ff4987150ebd4df506

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    90a2f73521ea8d604f7d3a3c4a6543a3

    SHA1

    a3d81447f16af79490eeef7be5ab38788b74e615

    SHA256

    389698429ec9d1defa17454aac05ca7bd923ae290f002b4f171348042ff49039

    SHA512

    e2e919a802ca6712d0a77574cbf2ee4a210c4cb742a84b95920944fd21e37bcd47b02636de11ef077a723a850c58bc606d63b73ee1a6ddcb9096d540ce4164a7

  • C:\Users\Admin\AppData\Local\Temp\Cab9927.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar9DAC.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a