Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 14:05

General

  • Target

    7234729ea73104e7b9b015651549ac3d_JaffaCakes118.html

  • Size

    33KB

  • MD5

    7234729ea73104e7b9b015651549ac3d

  • SHA1

    b6c55ad5c572a7f8f2419be24365fb81ef96f05b

  • SHA256

    d7942275c41c6186849bbf27a5e378316331334410aefc5e468da7b74714df4f

  • SHA512

    1684727a193beafdbd4d01c251f45360631e402b302cad5eef4f66c3c414d9f19836b5b35f94f38821b6711b5f2a69e36d30c203978d547bbbd47d29bc9867f1

  • SSDEEP

    192:uWXcbb5nn5nQjxn5Q/WnQiedNnSnQOkEntOknQTbn5nQG6kMCpA0rxvj1E5WFPro:BQ/hjX/CTZyvkxwKc1QbKOSg7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7234729ea73104e7b9b015651549ac3d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d64ae85039a0123c692ccb16380c6c7b

    SHA1

    4c7644bb493b0649f1bbfa4e195066b1fc9f95f6

    SHA256

    3f7926a05c5894ac2f70b7c5353473d6217ec56d9273c38df7eb3cdff6141cbd

    SHA512

    6e2c9a7c667fb2bbea797fad3199570049fc00533c155ea3bc68e28953f4c94ddb1263b7ad12d5d3ef7953678217e1d398012e9e8546364a756141939d97e95d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70bf720ce513de312a2bfdebc1631935

    SHA1

    c267bb68e94d6b628b5bfdb2a5c0cea4022d81cc

    SHA256

    8116f2b2b54cd7307db798887fc0f32bc96e32430e16f6d1a6fd7d789000fb97

    SHA512

    80610e39ca89ab961b016926689a482525efa9eb85e3b500568146e66e76172621f668468642f1ff755c93dc5ae4b5f358734439ad5bfae270f5feb97a475170

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08dfe503b0ddb2a2367b4ce2d130fb5d

    SHA1

    1a7fd9c490beb843b4f60122c1cb822185cf7424

    SHA256

    8b7008901b6e3798042cb481a6718f99f6239e950d800f7fc2260bbd07c4ed19

    SHA512

    4b1df633fe88c0664992f8c7ca412a1b01cdd7bf34c421267cc3499e0a13708e2e9e84d31ff3a4750da95034031f5aee61a0978eaf4196429c26811c216fd89b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e63dc2386dcde5edbf22543c5b39768

    SHA1

    bf02ec0ac07db2590bfb9267969322afe7485fd4

    SHA256

    605f82e22bd5a7291edf93cb564174a579990dc18e4783d93a77bba6fc1a3bee

    SHA512

    ec971984ad1fb8bf82c19a9d54a3cf7ed7f72da294a7f631cc56c3b1ee7bb4378b89fd28ba577e36c3a199037cc6eb1fa907953508c17d78547d0c3a25d731f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a5006c0f4ed0591be1b0e58148bb5e3

    SHA1

    7cc6f693c9377791155851a7c1abe472230224bc

    SHA256

    20035d48db47db5aefef361682266a3e2b65597fb8b690771aa268210844e95d

    SHA512

    ed88df450e195fbd37a813a3af1af6baf895ec0fb9825b58cf6924a47094c4d45289233e78b7a85382da9cdb88992b76fc103248e5c9250cd2df1ae21254252d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c7e67bcda8af7636584f734579ba6c2

    SHA1

    2af4ac8ff8d26c3a727a4ceb149f668e65f46802

    SHA256

    d44f303df01722588dbb965b81bc0bd37b5ad0c239f1e7364c63f7d64d1af5ab

    SHA512

    eeb042ecf512a3d108efa4340ed39aa47f042ff4a432ec93f6db1079b25b3ee6e7a714536065ce6a68b204dbf6afde1ec94ad70847fa7ec5d8383054b48752ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38050b6233408fda209c0cc69e399870

    SHA1

    00e7e8769c8311db5a0caa88dc033a158310e5c3

    SHA256

    eb9a82dcfdcb1370692eccfa94611b07885e97d16b9773474d29ebd78bb11d11

    SHA512

    8f9df8d3a3d30c204592bdfeca66044179df044728947e2696f6d12d6af30a11ad629d09796f605ddf8dc8a584b26169ee56f2679d8855712d4443c90ec15d1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    982260c793ce832c1b4db4f759fe8427

    SHA1

    f9d01b2adfbb89bd5af96a44b21a01e1f878006c

    SHA256

    5b623918d88bc12e9f4693608eff3ba1340a1997c1841b08f5a26c495337f917

    SHA512

    bb6df531d992a55d3d3874ad011a1455763a4fc5fd5339aa8e1bc525d87428a91a1c9fd3eaddcfc3ab18fad4739fa459c7328c244d744fff679d46c42cd7a88b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64a7546489b0eda3aae1f845895af727

    SHA1

    391a053670516acd722938baf115ca1c72415baf

    SHA256

    33b9b3560731a534d2c1e309b6b5d7f6566d64b3c3856dafa19062b4e8fd66a3

    SHA512

    e3e3290f90d4b057d4ecb11974c75343c1276999bed889584d2adb59143a6c5cb110d5868a375a5037cae570d3a7397d395e776946d32828aaaaff3dade81747

  • C:\Users\Admin\AppData\Local\Temp\Cab8B11.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab8C0E.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar8C43.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a