Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:12

General

  • Target

    6879c86eb64647e095f7985a84298431_JaffaCakes118.html

  • Size

    19KB

  • MD5

    6879c86eb64647e095f7985a84298431

  • SHA1

    679cb493f88c155acb58edadda63c93ad5af50b3

  • SHA256

    9356238858204f2b4613009105e76dbf137b02e62462e8cf43d19ee8e518cd63

  • SHA512

    07d22b0f8680ce69475bec1c139415eee3f68d4fe9bfdf8a48a483a6e5fcca795e51dfef62ecbe7379b88520403771b69084a6dc388e70e97d7711013f15b84c

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIy42zUnjBhmY82qDB8:SIMd0I5nvHRsvmrxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6879c86eb64647e095f7985a84298431_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e70bdb4ef23c846c2f4bd2481e4d829

    SHA1

    620c80843c497246986f1caf4339834a16e9b161

    SHA256

    0f42b8d949b507b490669f85b89e38e04534cbbcb5aa58acb46c420bfa85a161

    SHA512

    d16444bd7c681c059ea03c8a327e605ab48bfd24f75a26b52de183403500da02ed26e4f2d80226e50b7690e5e22d96655c59c7c56b54d3ed27ff7c7c1736892b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    643b82e154e317f93e602db482c394cc

    SHA1

    aa73efdbb4da0f612a4a5da402fd4c7becc27699

    SHA256

    0b154f72515823354461bed3007afa36d9ff56cadabae480c21c29aaa09b5510

    SHA512

    9afdd21e981bb812aa000893b21a14e12149040683f5485a2083c2865c26e075c09d619aee97a2c739453cf4b3691d1fc1935d3a1f2b4b8c95be796e016e98dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52d7c4954a254f93a44e9d668b0ba618

    SHA1

    dd097b4e1686895a3e02e245870b5d2694d6f456

    SHA256

    20fa73edf1d9e3a9deb5de89d3116b23241fca0e49d2501b8202297059752201

    SHA512

    97e75276232541e5ca5e1316c9efc636c783cc07fcee4551ff5a52f12721b9b9e7d91c9c0d778e841982d719f3d8221cde0db9e01f551888f08c52ad3d5b9cfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    229e7e20afb0629b343a3455ea8643e2

    SHA1

    88f8ed22991f7182374b1a672a687232abcd6192

    SHA256

    afa4d7d0508615f0a0a3109931ba6ab721c9c8a77e9a790ba93ca36b5b2af4b2

    SHA512

    11274c7def97b748cac6de800961bc93fe4fb5a641fefc7a067e6e9fc5524fdee071c8eb014ad20afb4ef8b570e884676f3b65d8cd116f0688730911e30ff1f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad143a3bcb74c47757bd6d007208ef43

    SHA1

    7f1da567013f7d3d075690648122ebcbfe880e29

    SHA256

    c48dd6ada3d41502e47ec8453bfe62a07732dd7d300688f3ec94096ec9c8b38c

    SHA512

    104198f25d6d69b19bf34790f9ddce3250a5a2eb44b40e3e793cbe68a65f349b2a860db80b845d49ea5222dfaad4451e7f752637d86405721d188a06aa07b43b

  • C:\Users\Admin\AppData\Local\Temp\Cab84BB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab85B7.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar860A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a