Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 16:21

General

  • Target

    7d9b52a4026e7feed8a20736eb678921_JaffaCakes118.html

  • Size

    22KB

  • MD5

    7d9b52a4026e7feed8a20736eb678921

  • SHA1

    e89448a866cbaa23bac61e820b740effb91e5558

  • SHA256

    ce7bf7ac0b405d9d79546c718ebcb5396eb90a8ac4fe31613a9c697afb41f04d

  • SHA512

    2bfa7eba01e4a4034206ea6ce30a77fc424afc505267259d5ca7515c26cd2dbdef3c418ffb516e45514b25acd076e26cf322f8ac50e267fed1281504d3247663

  • SSDEEP

    384:7wqPYSVvl5chzR20lwnAl/8bQAe+6H6kDnDgsXff2B://Vl5c29AlUbQAV6H6J

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d9b52a4026e7feed8a20736eb678921_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1bb347907414d0e7811475f5db0917a

    SHA1

    a58adb6adf78415ae2e1f50db50e1f755b04903a

    SHA256

    2ee62a9d165a2e29ba7a0c50c765eec40f8f5154f6abeb6640ffc1d709ff6ac7

    SHA512

    702692d0955d92f37b8c52221698d068e57d4969ec41881762e195d970272b3063f6bd68731e443a3ee91fff66708af283f0dcf02ee49cf898cf23a23476b2e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b605cee53cd1e7023b14975a1831c62

    SHA1

    d3d1c62797e3659cc3e8eb837924b27ee23816d5

    SHA256

    4b6fc3d8218c329304c725e0c694b027da2ec06cbc0a3d93abf7e02086bb2af7

    SHA512

    c673fee78c40eecc930e1d4ba856d130c73314884c4579ca6ba3c16b7c001be2b0c516fcf3de017ecdfa7d98eb2828086febfc8afaef35c06c59065bfee2280d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0a94c12af0e1f370ed6775aa6786aa9

    SHA1

    a3fb9c54a2b2eca80417f5af73028f3f095c0f28

    SHA256

    d29236f5a39b3851c511a207b21997be561195659b7b6137185d47dc58a5782c

    SHA512

    5e168e2ca5754d99112028fbc686e76038318a6cd4707a969642dff090654061ef66617633f88f17742a29cbc5c09f3aa187916a74cf783fd729119834f341b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2f76521be8be63b98ad784392d4ed10

    SHA1

    488f19656e867934700c5e867797d5373b0b59a6

    SHA256

    8d13217ac08207fff3d197e8c161bf4ecb8ee1ee1a338190f4d184f69585b21d

    SHA512

    b0ca7718d01f8807bafd86d8646ce8708f635e9227d88b2d57c28e4315a592e023d9da7860a3fb9f2b4844fd25cfd607d4143988b6d22e9200c641e159f700ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    939e0fdbe20875efd3256498bfb2bcc0

    SHA1

    218d44e363e060d7638c37d67a585a6d35dd832b

    SHA256

    ffeeadba84e5f3fde0f5b390e3843bdd1ead8f77ded072286af7e2a90079f260

    SHA512

    424a4a050d1a532d4624163b4774ca70857f717a7bdd73361e7ca6a6ba9360804adba357c0448835add34282946c5d8e5eadbae41417a639fd835e5b04dcd30f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    49d2e792e3f08484a69d2db389f718a0

    SHA1

    c143517f540fadfb09fc5396e44996a485fcb3a8

    SHA256

    df8e550cdafd6bebb067c4e11d3040ce5211f5ee9eae5a9baaf81a6e8544f987

    SHA512

    4d1c906f66cea5fccf0885feb2cd16dbc9ab44974e3a7368f25b3f89c8ca267e73cfc11af5f5db635eaa3d87c30cb8aa98a46c78cfa66713925f1f49b5e6cfd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f2e3ebb40dce63ab8c168417cec17a1

    SHA1

    ab5541bdd3f3a69c40b929c0e325cf3161f01d7b

    SHA256

    c9026e8c5e6855ddf4fa8743606cf3641763b3231cd1566f53cd9dd65db41bfd

    SHA512

    781454bbc38c767c4dad8534f2338fdb9aeb79c5984b5c28df6a1853f51888f4b05d6b712287bc9f4f0e61a454f2e1af4822bc1bd33c684975fad1f37a7aa811

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51e925cc578f50d17fae7bb76f91f8b8

    SHA1

    c9057afe40f44de070aa314dfcefca48ae585665

    SHA256

    00cd83488b41af0a152b635efecfc8f88a4d9639b2218e66aab81f1b09767f6e

    SHA512

    5b031a8b4334d2f974c98b858c47627ff43d25cd3fb10c767dd8e42c9a43f5500240f18bc7eede3623e05f9469aa6289c80cbe9a1f4014be7f95733ae3e2c04a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84af5fe3000e811c1716eb87e8d1dc0b

    SHA1

    ccf73a0cb407feaf67856df1524b0ec0ee39221b

    SHA256

    15895398afc6dce945c6a76a6b0878aaf2d25889300e455c7c597dd94196bd87

    SHA512

    6e9bebd423741f4780569b60b164464ae229d62694c62dc4d0f088a7c580294be608962b678654210ff73f1851e073f3ca34270429a7085e2bffda861e9b0663

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29ba4d7a263753567a75d5b97f1bf589

    SHA1

    5eb690e90d4abcf0579eeb1f9cf2fb67c373f3d5

    SHA256

    8fca72914771fef3360655e2f122d663c23d8cb325e797f98a4c9bb47122dd84

    SHA512

    c12d531d1aa84997e362f671e8d025e74243767210c0ca26f003c1167ab28b774b8b4423ebecf6cf8464a334055a15c3560baad6cd371c03bb754d4b429d451a

  • C:\Users\Admin\AppData\Local\Temp\CabE43.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarE44.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a