Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 03:01

General

  • Target

    70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html

  • Size

    22KB

  • MD5

    70a67f074193b1aee6c84c5344250b80

  • SHA1

    9d6d606eab25090295ec88f4927aa116357a3138

  • SHA256

    7c9da4c885a4d303e275cb9590cb277d6faa344085476a082b3100f797a3195d

  • SHA512

    8a37a7458cb3ef9005c03ee2c31a736da1ad5c3c0b1acac9fb5b017ee7451b81f99a673fab61682cd4bb6170d228a3822263a2068b9ba876942d17dc222fc6db

  • SSDEEP

    384:omOH9iJzPMrGqi+fErlub/fQ/JvgShb909v06k9zY6LvFvjUfdsYOwP:omOH9iJzPMrGqi+fErlub/cvgShb90wm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    516788c7339c46bceab85d6f653e3713

    SHA1

    b99dfc86dc3a0581f1d7f4f8a53aa824e618a87b

    SHA256

    a48018d5e3e23ed49d754c7b1b81bb81141972ce635c8a2c51615cebfc040d7a

    SHA512

    b072cabcb04bd888af56d991716c97ab31b891e6ec9f0e378d20983c441896938b89008760519cfcb5e051559ae9967b057ed5ffd56c085f051647f26a3851ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8aa16b9f6adf27b0ccfc26d4fcf10c70

    SHA1

    8e631122c0d2d9df6c02a75ceef69c702e63aa24

    SHA256

    d19262fc0febec73b669cdc9f8d273bac1a8be6269edce5cd5bfd7378866c5d9

    SHA512

    f4ff10bfa2dbdfe1d45ba0d6413c375f08d8f9b73872ba0f7f86e86e87a91b16f4cafb5080459d4d34e2d76555123fdd2308980aa7208d1bde93381d979f4657

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef41d26ba423efad6d9dada716ea878e

    SHA1

    987fbb09e953a138f4e39ac3210d9ca0f298813a

    SHA256

    50d6bbbced4f49ed7e5c7065d884578c310b76ecf25e9e8bad8a9e6ff6303599

    SHA512

    0be366d361372af2c8b879244889b36a18f05ffd6f13753de4c70b0ec683d52212f1862f6af145341fd188f7dae1be6e4c4669daaa8670f72d1fb0e0822cf118

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    273a9ee978be1cd2620c5e3459b15351

    SHA1

    d9a166a7dc5b91b909d222207b5a51285570d3cc

    SHA256

    ca5c530e7395d144f94c29fec702b409d8fcf5d7996174df157a69ade7901175

    SHA512

    5aa7dcddf98abc0c7c4a601bcb2e5e8efa49cdbb14fb241aa6d76e1ee346f859be68a103ae10c82f7715b66e2ae1a8b68dfa1d364ac30f2eb616409a5193a098

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d351a02303051f63ffb232adb46a2c7

    SHA1

    791fe0b20cb8a25a57b8207399e601d2afa35b83

    SHA256

    f8aec69bea59cd114060147d8e53c3f167d5bec54b30fe72b9bc537b02ed4f5c

    SHA512

    b5cd9d616f43f931e96a9fc0de092c5a86cc3239ad6686bff9f5fd95f6a0c6b5432827ad601cfb2e4889cbaa2eb394508f17bc4796a92f2f4baa6ced0862f35f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89d91a2ffdc7197e65e4696f40fa4da1

    SHA1

    be28738c70dd15deca44dd3212eb79858370c4d8

    SHA256

    73ea53fb90230f99418c4fb84c1954aadfeb6fea58fa0cf62c5e606e582fc07f

    SHA512

    282a1f39d3808936797a3c0cf503c87f008d5d13ad1d81fc25947b1323e9ff41f28fd9d0104ce934ec553f98235b46087e4136058658a123a634c7c8e3216708

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ddcf7ad75c554300be286170265e6ce

    SHA1

    1f50c953a4434b267c0debee41b8b3c69a775ae6

    SHA256

    301e7b7eca5d6a30b5d304c42688abcfb326a716c9e6dd0d7cf1751ec1a5c9b9

    SHA512

    7bc02f890545abed5cd66a83d346e71fcfd3b027b70211100173023361782426fce6db01b4d1e4fe2833df8f0e4680e2de0eec86b645cec82e4938d2654c9099

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e636f7f3747ee8c694a6423f77643abd

    SHA1

    afb14e405dab39611d64150a698e239903978918

    SHA256

    bce027890e4fdda4e4745e8d5d717d9ea46b76dde9af7fa5ffc5e1eeed7c5e92

    SHA512

    e31f29ce1da7ac78680df948b90159fdd92719bcfa69599f5d0293716751818d39282e42ba9c1e54a9b1d99d4e0fcacf960beaae6eb4b24bf1e90b3a7a2ede34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8967905ffd5bc6dde20dfd7a84742426

    SHA1

    cc307fae9021d6b526e3d303ccf2a10a42f638a0

    SHA256

    774ac737d9038f6cde4af981b8bb059f3668248ce676945c9e9fe72947aed0ac

    SHA512

    539625a2de5a2c40ed40c638f0f4d63d7d5f8021bcfdff72fd0bd237eb8d96cd76d59ce6c22f6d2736d50f05af574290c90d977993377e073581455a607cdda7

  • C:\Users\Admin\AppData\Local\Temp\Cab9C2.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CabA91.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarAA4.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a