Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 10:57

General

  • Target

    71ba19b476b6006aafcf1cddfb547521_JaffaCakes118.html

  • Size

    23KB

  • MD5

    71ba19b476b6006aafcf1cddfb547521

  • SHA1

    7928813669088ba3811b79f7b0a9668eae2ac3ad

  • SHA256

    1bbb81e0a4749607df63f50ffe2e0623dd644594d5e89fba69e940ea10bb0182

  • SHA512

    7ec0cffc5933c78ea473d0f2ff848de95686146cbb9a724468b8bc1ee9bb89ac960d71923bd08a58e42721e98a3dfbf8f6b79399a13c2c642e52885f4523d4ee

  • SSDEEP

    192:uWfAb5n3c9snQjxn5Q/7nQieSNnQnQOkEntRxnQTbn5nQACnQtowMByqnYnQ7tnw:LQ/+i

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71ba19b476b6006aafcf1cddfb547521_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a817c651f97fedd7937e50d70b2ea885

    SHA1

    6319e2b48e127f8b7a8f500b3517f4f4f68ba8e2

    SHA256

    20b35386f151969326d78f630ef7b493f34be8378207e8c32390e777161cbc67

    SHA512

    3fb99a78bd1e0892ca5c60d5a0afe1d2d0487be84bfdb45d01c879511cddd910149a8d5027d0670c5ec9299097b7ac1a401c36f319933bb6980d6732554d588a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65e4ef9cc53d298921e9e4dd5456be0d

    SHA1

    1b0e0a3098b37f409a73e8b7771ba5fdff92ad92

    SHA256

    ba179b83caa0020ed12dc35fa4d66041dc83bbc31024022d83c241190039d30f

    SHA512

    351015815c98d56e9832f8c8d5ee907fefd33ec897b28472c31579cee7d811a5288488cba6414a664f3f83e3e137f9d27b2ef9a9f0b6a93237ff1b7596166612

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93858c2a1fc58b548f33caefc8ab8a93

    SHA1

    2f361b6cbba24f56751eb864dd73a208d943f910

    SHA256

    e673c6dfddb9dd659f3ad118870e34974307741da8d8c9225c105c0a5b2af4db

    SHA512

    7075a358bcc1541f05219d36c8bd9954750bfd61a24e08e12e900d7ac146295cfa81c6f1338d69f34bd7103673d78e1ef1cb7ea706b8105b49a9a695a54340b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d5fcd22788d84475dea39e6af38242a

    SHA1

    ce3c2ab5d109f8b9187d88b3c0abe1ba4bd2f42f

    SHA256

    5b8eed099e03dd74f967eb08b8a6c3504b0f364c2d12d9a24205080a1ca1e23a

    SHA512

    fe2e1f22b75ffa5260a0197ad5ab00f498d5cd4c8cfdf1473b22e825f1402ebed49fe727a56bcfd5b05d906323f8e00e8e03460fc38d8a9685a85fb739745bc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    678e0d4235c1cbd2d8400875d69191fe

    SHA1

    99cc834ad0d4fdc67ea069d6b25258ab394dd945

    SHA256

    f8b76006dac1966aa06c6932feb67c6dfd0470fddcc49b4e86954f1e6129ef64

    SHA512

    16f313f264b2129ef5c02c21dae94f9d056b524901f074806d1b03156fb6e2b2162109fbef94c0b60412fe54c0241ed513b27a31aa036860cdcb7c7b2c3fa905

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0565dfd58cb6780fb56d4eed6cb8ddf0

    SHA1

    5c91e53698596eb106a733ec9cd52f2e79256943

    SHA256

    18906400bb034b0e9c911e01ffd05792af1c65315435861f1332d24f515d9b2e

    SHA512

    d6f17101d9a112f4b7c93296fd648169800c783912969dcd37e8f4292effc8d72f56098a6fe24c9ee75faf07456017c1218ac06eec0c7775941bbdb87f26c8c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e37b8a6f4e561152c7becafaa4edbbb9

    SHA1

    1f8cd34ab873d611a44acb8c681c003ea973a620

    SHA256

    f257b9786d229e5242568ef25661973a83e206a690116bbe968462f18eb29ba4

    SHA512

    834e57dac8578ef35867ebd8032a43662647d8d4737126feeae13e9d8f960aeb2ff887006ffb7a9e0d60b62b278ef014138a7121f6c9cbf770a44b4e5a0240a4

  • C:\Users\Admin\AppData\Local\Temp\Tar20F0.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a