Analysis

  • max time kernel
    133s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 17:29

General

  • Target

    763e8f4940b73fc2b3ce5a4113ddf91d_JaffaCakes118.html

  • Size

    27KB

  • MD5

    763e8f4940b73fc2b3ce5a4113ddf91d

  • SHA1

    53bd6e718837b5efe0de105402a224bda638edd4

  • SHA256

    04605a828fb5faf192182d65cf3e29486894f77b72b6afa7004b72b16a434551

  • SHA512

    fd56aa621cb9a831624e1b526d013577c80ed9fadeb8bc9b685449098d8e18408c376421a653dbc3ae4a7055aa88eda3ae201bb13eb76030bdeea42a0eaabd52

  • SSDEEP

    192:uw3Mb5nJanQjxn5Q/0nQiePNnanQOkEntQmnQTbn9nQ9ez7m60nVjQl7MBvqnYnW:4Q/omNAV6SlO3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\763e8f4940b73fc2b3ce5a4113ddf91d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8ce61a9f51ae27faca9b2d9a54d4370

    SHA1

    5e17c9559d187fcf8f6123dc95092953173b1e40

    SHA256

    fb9795ea528ad03f4ab244e0591b80badda5fd70dc6e68fc5951c0bc5609d9b7

    SHA512

    9fbcf9092acf88227a9b5f4000f1e6187b311b456a607a205a59b0e47fe4fee8f2c40f8751ecdb96a62c91a50a0df60be52ceeb50c532c68babf86d799f28122

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ae9da11016a7b8f3ab0cf3873ba7632

    SHA1

    bf5166bddf50cb7360cd2e7116cc70797a36a646

    SHA256

    93c4e196548a488023ab10ce0e90c8936be4bca412e4daaa4551ebf53b93b688

    SHA512

    8dd49d99c70605b6036c2a4b0f820cd6a375588b1dc42579d2fcd40fa8e55ee0099659bb00c1fc5463d8466632913a8ea6e511b54c4d4c53933e2997dbf4e609

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    502f937797323e1c92b80e24a49c0fd6

    SHA1

    0176775df0afa2a9f2df02d7fe20b8ecb3876fb9

    SHA256

    8c347d70bd32b4b25f57c109a25489f91c9307a6bc7a340982834a2b4b955d04

    SHA512

    a2e8a6de6a869e509b890e43f1e55fe2f190611bd774961b49b1d1630892b4863156da171e33e6870c21a76d1ddad146fb72288da177689f0199e44a89763538

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a10bcd8654ae4f9fe1c340223229cad

    SHA1

    6284477f720d13e389008f578f1c1bc26c7d4291

    SHA256

    1483273818a5367be0525fc2d3ed756e3ccc8472bbf608afdd74ee7363620a14

    SHA512

    263aa6474ecccf3380747ba9b0f9f331026a788cb95612fe4b52efcb71a99949018c8fbf8ccd4dae9be4828c00d3aa2d2c019bdd63b7467f29152757d0a22023

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d71fef83ec4c579c3fb718806d652c30

    SHA1

    98ab81b8860f27ba525ebbb41289a2ed442b136f

    SHA256

    ad6e33b0169569dc5be7e69fc88868eb917ddc12372711d12bde50c17531f23b

    SHA512

    013877ea74138fb307472fe11cdd082e1b2111e8fe88ffa5728543b53b5a62e14b61eb09e6a367a6d88f18cbb3eddef45ba3bd084a6ee5b1f436b6a8ce0cb770

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bceb6e98ff15814c26407f5389e32d07

    SHA1

    036ede0efd8f046d16c9b16928a8fc78a7c14667

    SHA256

    a7f2dd493d3cc9ae002e0116995291ad4ac842aa417874e3513a09c3f624b560

    SHA512

    84e67e9bad8c8f4125845a0bfd07b9c6689216373b026d9073196ae825a754d229bfddac205067cdba46c1fba48f4c02fd70c5505b11915b63a93441a7d0bc05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7abbd929086a976a2259f6356b863ae

    SHA1

    cc0e73e6c62da612ad27c25000848139f310b60c

    SHA256

    367a67ca58e88b626a548b74903099b0f7d5382397bc3c87492c1c6bbff837d6

    SHA512

    1b1dba98a1b04df9d6f835cc150b72fbc3c62cc75d4d44df4bfc619efc48b60f3ef4bb80543a0d6baf09d0d4262a454405ef4730fa76a160f41ede4be4fe0290

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7944b0875bcfc2732ca8a68d8baf5a79

    SHA1

    91c310f6bd32a7c022078c59d8657cef61c6cb4c

    SHA256

    6bd3e00d2e4294ffa5af0f38b5b33314621404dc4aadf478665a4d8bc0d4d692

    SHA512

    0e2bab2a3e947ec0d8e89a66cfe9503727686357c058d2aac35226335de3c8bbc601ad814de9998bb450361b0e74e675dccb4f199291dcfdcf4db8142b0ad426

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c28f983287780c81a093e5524eb170b3

    SHA1

    85bce6822c65a44bb1ed6056fbcd3a09b3b24eb7

    SHA256

    f8ec0b9e59d1d40242ffe55fae1fd05fb1237885bcfa95ddd783326792768df7

    SHA512

    f12bdbce147aaf5811685f3d452009a74f2d410ba04085c3d63233be1b7a4bb8d9ab8c55d51de816d64b73cf3a92bb83fa1bfa6f1a2724164ae445e372246891

  • C:\Users\Admin\AppData\Local\Temp\CabA23A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA3D7.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a