Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 19:39

General

  • Target

    7e2700d724e143a461652859457d3614_JaffaCakes118.html

  • Size

    25KB

  • MD5

    7e2700d724e143a461652859457d3614

  • SHA1

    0878d15932c5a0b67f2bb44d0623495f2b65b78d

  • SHA256

    944176c660636c1968296a4bfa7a47a9e272060417a65b159f32262206f959de

  • SHA512

    3a90cad70370c9d01a7d0cf8d53a2db57fb32fb9ae89ab998c82619b7d6fe079e9583725fd887c8b47a140fa012050d23fbe6b4c0645c11b4cbd86e1662115a2

  • SSDEEP

    192:NGOoeZvb5nznQjLntQ/vnQieDnbnQOkrntFWnQTbnmnQ1XC0AHpdETwuXMNnFnQx:cOoWeQ/3VnEw

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e2700d724e143a461652859457d3614_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b85791bcce95a0fad86046e410b2b427

    SHA1

    7fe0f3d0f04f1cea6b24e858fe92b759e473898e

    SHA256

    71f54f09c00e703285763dad942f7ea6b08ccb65527e0a072479588d89c27ec1

    SHA512

    fd800c78801455df2c2ec1a3c99e3fcf4a2ddf014635bd987822be1f40ff60e9a7beda67360b0fb572b3211436b862c0fd27b2871607887d970703854fed74b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5b8f1f6d64041bbdd5c6de72dc69b59

    SHA1

    3b16bad7dbaa187b640e678000129a117db951a9

    SHA256

    c8aea3b616bbc68527b9a5c1446a8844085bb0f46c6d2ae401ee8de4ce9e52a4

    SHA512

    c9af8c8c13aa6daecf4b3a1b13ed30560a7e3e26f9e7f33eb4b772a909a8711ee113d509c17fba4845eacf5d44cf76038dd5f8f901bb7de8dba6de91d9828e57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    367042374ed9a1f5618ff9122f410761

    SHA1

    e8d6efefb5653d0e66738151ea322926dcb79d63

    SHA256

    ea618a50b7052f604c04396bbf08f0c90ebb0edc326fdad1f7e6e2af8ca7831a

    SHA512

    a30371a2bf3dd082e4ae82923f0fb51fbc0bf5a72185eaeb27296e9b24e6fab82df81b03f2d5f33d8dd8646d3ce5c3a1ed12d47e312bd0d2c550d37976aa56d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    713c8a7be5a0c35e37ee43b199275a28

    SHA1

    a3d6ad3e896232491995f89badf68bae8dec87ff

    SHA256

    c55fffadc97724e41b542e7c495ec2186066931dde7e381caab720fd8eb1839c

    SHA512

    cf894e009f16ecf5a0f2e80b9a0dd289916c157ed46b83c88fce820202860a49ccc2a26b694ea22634a0e9072c66fe39e5d9d3a1f2d6bf3cb0b006f967ac51e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    478618ff0878b298704bfe2651303e12

    SHA1

    3cd60a2c0119219ef2c19447be0d2e6ceaaa3955

    SHA256

    796e89f20fc49eb7408e1befc59e49928a89ff6b5bde505e6f927d5396207c46

    SHA512

    c32a75518a9bb9bb336cae4bed547c351ac6029f0431dfa132d2e43deb1d336cd526e48e3d6ed75c0cb7172e3864698362162a7a65c07423435e9ad60d1e8cda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a1b534fe6a2acfcdf6160202b048386

    SHA1

    3dd41b041828a48199a35405e33a87b33fd0cc9a

    SHA256

    d82d8bb39c5874533cac00da614cba64d47e2e0cb243ff64d84dc7667748f680

    SHA512

    aa7995de1dce1c834d4a7ab21870c08f5a9e6e321010965a3736d7e7c806da44ba74d10e57202afb8ce3968d0b450ebb137bb9daf9f4521e1b8cd61bce3a9480

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5c8cc92a9a047d3506b0c85d3196d590

    SHA1

    38f251869b9a0d92b42fcdec3a0f1f7fd42b663b

    SHA256

    4a23ba6d5bb6f8b55aff2564f57ad394c2759a05cade0bbb9050e6f1c7b72351

    SHA512

    e8e6c9957bf3e7627edab6c67638bfc766d6d8796f2655b8b57618ba186855eb19c8282cae6985151a41d8b9759c99fa0fa19f11a5ae3006714d5b48586781d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ce24df537310440b50d796de1147222

    SHA1

    47f5c4a2f8bb5de964362323ed8a10cbed33c600

    SHA256

    d362ce01e209946dd5b27522bdf69fde1dfea4fa05f6f59696b1cc711845a193

    SHA512

    6ab253bd4e131cdd4a0a700bdef7a56a079e927a7ca1fd03daf1ce0557cbd99fa4a111a92d7d39edccac9718b635d9dcfd5a9831b7ff036d617c89d1008492d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2140bfe347e844cbb437e261e6c32dc1

    SHA1

    f11b51b63093b05863f0a0b729012c2e2b10cef6

    SHA256

    c417b911d98a521c9f3d25ef31f77a9e2ed2a141f4cc363f0e3e089297f2e63e

    SHA512

    585572870f869f3e8616f549470b82b1838daeabc7f0c55aa0f5abb3afc9ada53d33cdd0b40362f5c27cc769c3628746fb12f526445ee547f9983066d35d2667

  • C:\Users\Admin\AppData\Local\Temp\CabD59.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarE3D.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a