Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 12:18

General

  • Target

    6aeaf15cc22657f717de1ac057f08e36_JaffaCakes118.html

  • Size

    19KB

  • MD5

    6aeaf15cc22657f717de1ac057f08e36

  • SHA1

    c59345e823ad9a3c57e4388a99ba0f20205ce25b

  • SHA256

    bc688f95579e39b4e2e1cba2dedefff07a157d986282b0142b96607a95f1ae6b

  • SHA512

    5f25a69f12bea79604ff4ef5dd7ff51411825052fe4bdb4cafdc70d6e2391e0bc16339fd308838c388eea9f213ab74d70c5d1dcdc71e3cc49394ae8a7ef67839

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIY4uzUnjBha882qDB8:SIMd0I5nvHbsvaPxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6aeaf15cc22657f717de1ac057f08e36_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53122edda00b086fcc1faf00b2220fca

    SHA1

    b27766c66b92db60f5173330bea52bd0cb09e125

    SHA256

    6b5bdfa1b98b32602b76606deb91f16c97ca10e15748397b4e5acc34d656c4e9

    SHA512

    b5068d238aa0abb807bcc3d90e2f29a7b2b84cdc1c9b4827e83689f4d8fa90effffa820a7db81efed85af415263b01405361a2ac82974e339a8ba910f8fb794d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7b3daedd4d6868e62ba91da6b5ba44f

    SHA1

    eed28ae2bcbb3ab27eae9b30518344b650464271

    SHA256

    ecbb74cda5cc5035e4b2c47968a74479dd48062614bf0d763fb176a98b77504f

    SHA512

    35cb4f3e7f3f78a0cc752c86d48e95c3a739c149d728b95c839175f44c1495b9fdeb709b407a3d315146e468db625c4a267120d524f114a069df260dbf0b60f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ada62f1f8d87d462e7388fa3425cf222

    SHA1

    cc7bc843e7ba0bcf10c6afdd60be5509b134698b

    SHA256

    f30bc66cb8c74d647c19f992455230dd009c340da3e7dd15a2260bef5bf86c0b

    SHA512

    b69b6f3a34cf267379ad152dea416a072301b7794f1319d3d40106368e34c42e3821cf4198b0bcf5937c660c97a11f0f287758ca4de1835e635ad99f15209aed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d34a29464b24ab201049a74a7116251c

    SHA1

    1df09e4a14fab01336c7621c274ca68809ada7e5

    SHA256

    9d2c0e0a737bf80fe5eeeebde6f9e257a56bc92d6cb26ccd9aae17fa4ba308d4

    SHA512

    b3742189b82e33483a50f77fc340190e6955f8de5f8dde0479954e06704fb5a71ad811d254acac2185b0913b2136f6231b5e63ab9d56d8f20245df38ad5cf22c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66252c832529c3cb9ec4a65e77de822f

    SHA1

    9ee674113e78a20bdc0326ae28dc719906370308

    SHA256

    32cd856d390060cf0551ea6475a9b828fae0e085c6db0afe9cea371a115c0de9

    SHA512

    5c9420f83506188e189e24ee8533e72f1ae2d00d078ba4f7d0ea332ffb40b27d2a97cc5cc212844c5c6eafe7f070ec7e17ba69671a74e03ae18d1cb4be910cc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c06ca34d3597e8bdbcfd2b94c48bab0c

    SHA1

    4bbc2b77106a212bd43a820bfbe9b783fcc00cff

    SHA256

    2dcc57bed13670fdf3e18fb3be5e15bca9624148dc84a92c83305790f915a459

    SHA512

    638fa7ef7a0f10b4b6ceff159fb5ba346087ba3ed02db0fea991ccd8ce71dcc71645f25b5f7a6d979c188ec63cd178eacda42ad6e6dbf377901f47cacf3f40e7

  • C:\Users\Admin\AppData\Local\Temp\Cab38C.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar3EC.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a