Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:13

General

  • Target

    68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html

  • Size

    47KB

  • MD5

    68a82f34327d8fb217f64d3bfc527cac

  • SHA1

    70e2eb14ee06436173ad7343e9cb3b1fa5f646e0

  • SHA256

    8cb9d0344d3a138cbeef63c23c628d2d569be1ab3118c44dd6ee1db38e50b802

  • SHA512

    7d66d724d5c4c704103ab66aa09ae3a05dafeda8b5dcf60563a5fc86f66776a5b8b403e8d9ac6a257dc7eb3f2fd063e0933decc855f51374c53a1147d09e29e1

  • SSDEEP

    768:gk143goF92QJQx6mS/1YTfNdw6tMR10ToqWXyigNANvZOfl:gk143goF92QbeTlX2R10ToqWXyigNANe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79870bd9f5b4a7b350c0e7571dbce0c7

    SHA1

    3cf75bd302c41a4ceda567f401fc639c7bda0e69

    SHA256

    8810c84ade6b5114dfceaee98185a953f29981cc6773e3d452b2ea62011ab79d

    SHA512

    d20d22964db887090099dc8f79e4fa4254815430b7f24f2d331f7ab7413624c12af66a15375791ca3a80767e204996175831e6a390311e0a882660063416185d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ade5b48b933f816276e31bbdc8782586

    SHA1

    2062514d32ce3b31bc2ce9ac04dd7f5f24606414

    SHA256

    b7d5b5b9bf6e92e6587547fc65a6ae34c6cd619ecf4831e3c8baf6277901b173

    SHA512

    13019dd8598608b388f5eb174a88d7a34c27fe70ee35e31d7f341492901ff15c0da1da4ccda30dcf3dd871880321070c95a0cc1b43209765529818acfbc405cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    edb116367f099d43864d93ae6e99e338

    SHA1

    7d214182c4453f907514fcc95aed5842021e76f9

    SHA256

    bf3c831807fbda4deb72a30d7f78b49e78b35f184e5faf2442f06c370da7b40f

    SHA512

    3a589279c2d98300ccaaf86c38e985a1115e00990920cfae4d192a6323bb0842b9f8653e030da40b826bd7e8509afff1c3f014ce0a9482706a9054cb15d0ed18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3459e35889820527aface255f1cf3f3

    SHA1

    5426e2da16ed8618b9a1a03737e475d6e5c9bbca

    SHA256

    641a95fb9ec97f8e46e0e50423c171906e1be16cac1d7aae817872e7d2f0f2d8

    SHA512

    07ba0eef58d3549dbc2839affa1f920d66dd9c2f0be2090315ea3cf118fc3ceeb673fe210e956b83057f5375ba2d46d683d8643aac90d59f1e0f2fbc18e3aa4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    161a62f30d96dc068e65d68885b4993d

    SHA1

    6061d7f464b9b526257d55a9981b7aa2e000e3d3

    SHA256

    a97f3e98c41645b5e1d8242134a95bd729ec3310ec198ec861ce7dd7111ca4c4

    SHA512

    daddabf60c96e808787262fce429fdae2ddaf8c808060bd3d92cd990e7088b8226b314cb127448fa4320ebf26c3a0dc8a53c541709eb21a25c4b0dfd9a699963

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef82b9cda6949bec35f591aea94ed419

    SHA1

    313bcc73e4555b3db0fa0fda87c19a4f31f07efe

    SHA256

    5241561de304111ca99bb47bb5fa4ad554b577e236145d2a995949cb4ae161cf

    SHA512

    837d01c56662904bf361fd26b38ef062c6caa4b46492fe19807aa5779d5b0a9b613dca1619442d86847e2990578baf47bb9a1dfac767df6a1bb9d9587c7b3ff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    abf1e6c9ad82c560da23e1671e1e7e4d

    SHA1

    f7d6692207e37ad5f9728544cc07add03bbf841e

    SHA256

    5b14a1433c907fcba6b3cc8f9d3d7ab1e088892c53bacc81f0299a9e123e5b33

    SHA512

    62a067fcf02a24c6993821a6fc868999a4c460cbdd663522fdb2c2ed4b36f45feaaf1b30c4ce580f1183b65f3f7c4da878d63da1536ae3219aab92a84c2180a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4c86c803ad1f1a49ead50b1133f6663

    SHA1

    dd76f87836afd78d0051dc8472be03ab54f25e65

    SHA256

    a6069cce0766c12a8929c2b88b86499e91d1d2e4eb820abc98c8b964c186a209

    SHA512

    cfb50f048c982b1374bd3b14d4cfc3a47494bde002f5059afa41cab41f5ad548b4844604056f7abc65204c3bbc28915c251b22a44709c974b34b1ef20e748cf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dcc12f4d06498315243881707716a69c

    SHA1

    437d2a2ff725074bb62af3c0fb170e2be364d600

    SHA256

    e8561cf427e726c232b10efb38c0d497f39fd96747596530b8b92875cd9a164e

    SHA512

    c61a2f4ef7a567837aa87417a18053f1e6bb8db129f0b11f588f5fdaae0772c71a2925977f69ca99776831e6d8589cc2f0fb9d2a02f06b7b5878e4f30bc00ffb

  • C:\Users\Admin\AppData\Local\Temp\Cab342C.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar343F.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a