Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 17:49

General

  • Target

    79fa47078eb09a1e18baee1ae63b0577_JaffaCakes118.html

  • Size

    30KB

  • MD5

    79fa47078eb09a1e18baee1ae63b0577

  • SHA1

    aef632b6d064896cbccc041e325b176fe2e527b2

  • SHA256

    5ee6cf2fcfacada8eb08bd8d7de260ef0f48c8bf5e91ca7bcb77f2fad45884d4

  • SHA512

    9f17c71676105a4a9a119533d0ca8a42dbe3040ba86db406b49e4fe82f5b7f31f340826d1f9e675797d650586100536e7903c778f97c2c50e04694c7d4b08c6f

  • SSDEEP

    192:uWnBb5nSVnQjxn5Q/JnQieMNn1nQOkEntXPnQTbnZnQBMCEAX6K+iibI3serwxwD:1Q/rSUOcca5zARvfDOT

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79fa47078eb09a1e18baee1ae63b0577_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    648dcef8b8492923ef4328d527757648

    SHA1

    590c25c8b0182979170df9efb3e3f145f483f853

    SHA256

    81e6049f325ab99c5698cddd026e731ddc8e4f2a2ec4b282ba4732547102d277

    SHA512

    10504332a31f88587a13c3892fa2f1bf7676329800b76367a739f2969145f1dba3ce20d5ab6fb54d40b6e841a9abb8e899091f0c9986f7ff1707c9f2c0783cd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    093e652569e2794640958f4e3bf4b3b4

    SHA1

    ae247b7af4d0af78dc957a0f71da41e100f018dd

    SHA256

    2a977559c52b11bbd631479a92f1393b01fad78ccb8182abdc4c166df894d529

    SHA512

    2bcd38f09e037886791c0a01d4b1f0ec9465874cc6e4eafc426b39719306affc2ed0708deace4f964aaa80b9dd6804f130e5f0db5cc0054a6e1e62df6fab8a8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2d262a3f0974fd9549c212e04ac3cc9

    SHA1

    eaf858e9ced1b98c6cfb133fdd37695d380848c7

    SHA256

    3faf2e3c8fb9fd5cf4047db5c2ca26aed2df8535c328fa7c1e7a0c789660ea24

    SHA512

    30041960bd3cb36536a1f83edd6e86f46d70c0e01d9290a367fe9ee2cf0a3cbe6b3f0c16ec7bfa2b8e5f8c565b5da29a4ae5d64a2f74b838e2b9cb6c0654e7bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65f7f44ad8b21c841683209b66237632

    SHA1

    546a6377c7f4be0a3224fdf53f38ee54ceee86b9

    SHA256

    636f73e7e0a729ae151bbe81ea5fbd2857b33600b6698caf235e3431c8b85e54

    SHA512

    44bcdcb7e1b35c677a21e6737f2610a6d4411dd0ef7d020a9a5551e4930f5f5a546f0208c3f73508e71ab2188906c1826b28fcc3b3b7086a96fc649122593cb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76c598c46876f0902fc6fd0234043f5e

    SHA1

    49529cbcac06fefa37ee500bf9e4e467614a7317

    SHA256

    42a94d0bf76a103e512f89c03e5caeb5156cafbebc184df245180938962b7aa4

    SHA512

    2085c2b3c9cbf4bb0bf6547cc22a9fdf634f8af16569240f74bcd13606bd96e8f1d540702377972de0705cbca463d8c1166e1c069cc89e1f22838b1c9ad18f1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    424eacd23c6e3c5a7a18e76092bbc38f

    SHA1

    c56794055c5bb1d468c2a9e2d099c70a44082a40

    SHA256

    a676acc1d1bdff13a8ddd9ce9c23c40943e925f10089e959e7400a4898bab3ca

    SHA512

    cf9315e410cde2ac58ba4d080d409e9bb6aadd409ff14275e44799614027d391ac4756e2f9d5ac496ce75cf9a7202cb4a844426f4e0448e45b240549eb970cb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba8e15ea31901e69e11cb0f7032be3e6

    SHA1

    7c0ebc2093f00a3ca279a11e40d75f7efb660b99

    SHA256

    9a03946db40390f3ae1bcf10fdf5dce804b79d1ae2e1f975678213d7dc995cc1

    SHA512

    d3f02b11b1ad885c06ff5960b32938b7d52d650245318c7124789775085067d035fa06a14127d4db76275ebb4722af8bac14b5fc299be72a11b8bde766a7c3cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a4b3222e456bf882219c438e0ca6e7b

    SHA1

    edfaac3a68f80efa7545087b06e2cd1c26df92b8

    SHA256

    4d8ed22d63913d404fd18fe22934984be560f33e5c98055aa3ca794284536919

    SHA512

    1486fef5794e2e54a63cf401a605457fe01b94b8080ae718146a54adf78fb5606a81401f59b994de3d0d73854608dd4b37e07b2731c7b6ef6aba827860dba7c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    357724b0328210287876c2d750a4adeb

    SHA1

    b2b8e31cbbb0e4d814760c132174bf18bb6997f6

    SHA256

    773c4e78ac3bfab695b6c7fcfe1401a16d118e9cf60071ddb5b724b0c5606f41

    SHA512

    1aabc38221fc8115eacaa2e959f4070ef5ee7ac8a5500e7eefb44050f079c66e6eb6674cdbbccc01b605bd191edced28b4c3982e63c5527956f91711f03581a6

  • C:\Users\Admin\AppData\Local\Temp\CabAEB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarBCD.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a