Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 16:34

General

  • Target

    729433467e05dbc610ba7f914ddeb546_JaffaCakes118.html

  • Size

    141KB

  • MD5

    729433467e05dbc610ba7f914ddeb546

  • SHA1

    d654a204930afc44f92caa20899a44132432e21a

  • SHA256

    3e6811a90139932c28799207b5e36fb93e15ebc03f5f79260952804ebcde0ac6

  • SHA512

    27fb47886bee5ac07ac71df341fef95c15df4114b5f8d7cb216e36e2ccaf5908863062aa1b18efc9743faff0c6ba22c4ec028d893bd2a4dce547d63eb2f70130

  • SSDEEP

    1536:SCk+MZBxFuY0dWtx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SfBxJx7dyfkMY+BES09JXAnyrZalI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\729433467e05dbc610ba7f914ddeb546_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc798b31e808a53e6e1f226e34d0f108

    SHA1

    31bfb1893eb30da963509f5f700668a5812a739f

    SHA256

    35466ce16008b7ec810d44e808a4fae1e4e2309d97c2114b17d5a76220f98d2f

    SHA512

    9f7fb575254c61db8a1cd328e7d63ffe71e1fc9c1ab1ade147e37970e8270d1108a5d468dad8217319b499f43a04d34e9df9b12353b103ff7b627c2c34c9e7ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a81438cc9286b52560381eb719181543

    SHA1

    41b74b1e463497ed26457c29487bbdfa73fc7dce

    SHA256

    ebb934147449750ff3fdc4e09231a73002a5046e3cec9c9be05eb60884f925cd

    SHA512

    2395fdf2b07685f149056d0d9c97f1bd9d1df603273e6461af8987caca7ba4876c59598c17f30206bcf766be92ba4e7100b4c7d0a5acdb6ee66e639a87882954

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    215b2172a428ad85eddcee9d37bb2ce9

    SHA1

    cfafe4dde39cf06b458c3e5af1ccf698a7b86f93

    SHA256

    c779004c0df4f162052e3155174fa64eb25ca39e12fb866bf93e2a1a082f82b5

    SHA512

    2cf1938d26806aff1bab4cca9be844888327758fce5eca936078aef7d37aa1e403fb756dfb04ee87395e711fd4617fcb73fe9df17fe9d761985bc7d3b814d264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    272e6c56e376401a4aab8fe98b87eb6b

    SHA1

    2a0534a48cc800edac6ec81e3ed3636209a36a6b

    SHA256

    432a2d695a9350c7ef29299f57506c1df10dcb21f86095d9c7e1e7814bc8226a

    SHA512

    77a79c02dfb144f7dc137e777c0886bc5975dcb4b4f585738efba8d5d03bb7577ed5c214952da794b9d75e2cc3ad8ac361fffae72eb8dd6ce7eb36f936773b56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    499a4cd3eef5d08b679a66c043c60f44

    SHA1

    d8f720e7999ed1db987bbd268e528455b6b316a2

    SHA256

    3c175bd6b59e957981076ea0699ab13cd5aa4c712c972c8ea520d5072d593539

    SHA512

    6d243034c87c0d92e1cd309d2cbf75b74dd7a780554042c6c2040d4757bcf13f6c1a232d47e75f28198e8f160c6e619ea0543ab90eb21186fc8046b108e9e1ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98168029b1ebe1a287b033d66b759b30

    SHA1

    2b8c3c1213559e06492793af384c0d3eb45e89c4

    SHA256

    29cafac77d2d0357f5bb5728696ad8ed3c5bf10dc123e0d1accf7a5e6aa54c1a

    SHA512

    c06ef556817942d652342e3be96ef0b5f2e3150f1dbe1ca047c973bda5225bdb0f155b13169529c581e0bbc1ce6cd87fa90ddcb456bcebdab04bf441d20d873a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fb80881ac0a196ad82df43ea03a4ce7

    SHA1

    f0df5b9dbebef1b28f0ccdd6b006dfda12c7333f

    SHA256

    b68eee9e65e0e22347b2045f61ad87a23eea2ce8d80984ba594cabc0bdee2034

    SHA512

    a92295c57897f9be6e3fa2ac6eaa4966f07918d9471062a1de87b3366f5f828c47ef1cd7986e7a9d087fd13c7c1487811e2e10a17af0484cc74a235725631f43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44b71d83353b9f59b013c36bdfe94486

    SHA1

    6784c52a559bf874eae5c47f7370609f9779c77f

    SHA256

    5aa1801ea98fbd70fa23ed4e1274aa2027f2545b3269222fd68ac8dc0e91ee65

    SHA512

    ba5783c506b1a9a97732efe9881fea127cbf6c9eabd8d2e4f8b4e15f0bfcdfac0f8d181e629ddbff5ece7a927b724c60e28893c77e0bd652e81f770c5565561b

  • C:\Users\Admin\AppData\Local\Temp\Cab121A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar12FD.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a