Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 01:06

General

  • Target

    7f05309f576353bb7cf6a95820f48888_JaffaCakes118.html

  • Size

    460KB

  • MD5

    7f05309f576353bb7cf6a95820f48888

  • SHA1

    7218f05b49efb983a08a450eb7a1584a4ec2e7be

  • SHA256

    5335a54ecb27a63d21cdb78a1131037debbb134b7c0cc5cd264eb5b1a2bc8a47

  • SHA512

    e59a72880c464249685f10bc033e329deb36521c49aa8d360a6acb1f3c5f409409fe7ec001086d19d6b987e674ffc7957c414aacb315f68551b7aef3cbaeeb9e

  • SSDEEP

    6144:S5sMYod+X3oI+YVsMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X335d+X3i5d+X315d+X3+

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f05309f576353bb7cf6a95820f48888_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f47ed8d08258f48d1dfb0cacc2149da0

    SHA1

    153630777808ecf1ee44485072f56c73c0613696

    SHA256

    627caa000fe503a764823427a152bdddd2434b5bb4237bf9238e974795e91189

    SHA512

    653d516959eb4b4be7771cef1a37923721fda4c56dfdaea2940fee1f3bc2bbcc63f19301a6c4c6192a17a4d7f9da051c3cfcb5c3300493bea8dc88640f0bb1f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8b07f275fb770e167b7cb6886c1168c7

    SHA1

    a874ab172deca240c058cbf27027c95af4a178b8

    SHA256

    a74cd3a91cda07620b5c6a477dc60e99faf57c25943866051b02215571282195

    SHA512

    79671f4492b46308ac16391ff9b6a5363913595624e36d13b759de3a0572a4ba941823f7846493d28a945efc25d41c571e1617a5e45877afef7e53e0b932fefe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8e28d011f7e77a33c75e8c249c0bf908

    SHA1

    c30916798b53e51399ad1bb4c5eee5a37bf658f0

    SHA256

    c92a1f9d9eb85282ee6dd5a20a244d9c191266f7c187f41f84a68f07a7325514

    SHA512

    99fea86e8c41c4ada880c09875180a0bb7b5f5a94dc3752d7f350f450b96e4731d925c4cc4b9b274d2270d1a6e9c5d92c13211e92e308408f3876cfddfb23b6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    487d7d9075090f1c339f301c09e8089f

    SHA1

    8d67cd9500874c8a2f0033e6130d16ab850c2f23

    SHA256

    aada2f1861e22020c56d4ee92864b92d830e658ba74db58ced0d0dab5d1c7e52

    SHA512

    4d0ef1dc0834e22eb96ea1377533ff20456e061e6e404fc36861ce21a7d2d4f22f6262bffb2da351460784ba3a80016f5470cf1a6740779e8e7daa37d958a4fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5bc492ddd3592f138b7525261d59f6af

    SHA1

    29f87c0605c252cb92bf45a7383fc3b770292322

    SHA256

    2d33a7df18307f81d003e5a6ee2a610ae4f52dcbd9b0fedfa2713765004d049e

    SHA512

    bc3e81c81f083f441edaac536f17358c6b9ed93a717e1363795e3420aaeb1d4786df76b743e14f0cf4ac600077be26a271b4d750510ff69fe845d28d349fd8b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7535b797f786c24cac3a85042ef14554

    SHA1

    1ad68d5db92de47d1f2e4829cbd39da98decc8ec

    SHA256

    a693f99cb2ee6954c1de660c17d32e491a5152d86e35ce4c1f43c3b41470739b

    SHA512

    1da5ae7935d61aeeee8af5bcbc191c198ecf4aebbe0613a881ea15170b353c7be17ed9837350c50f53d34f977828d307a5986b0f8890345c1645520206ec4d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d5e499a38ac1ee287a1bcdacf01bb1e1

    SHA1

    5879c21f39e53175dbd8df51b18c748c9bbf747d

    SHA256

    9e321977b17600c29466f355d547b28914b27e6bcd3a2f8b0fabc28c3d3ad3b1

    SHA512

    05fe0062bfb6b48e59707c292b9b054cf14fb3dcdf8954fa070de6d04e91519a30c4200ab171466f8d40e7b2819e84b0662e57d338e4f1f3a4b798f4c0c9c9cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    57ce1a087f2a430e7c544690fa4203ff

    SHA1

    8b0c8402eb5dc7944d37ebd5d3354bc18442fa56

    SHA256

    c35869d4c6bec34bc31ac601695da0a47946fd579a260eef16f8f703d6d80de5

    SHA512

    d576d00b448eb11b8b68d37cbda27741458b79dbaf643ab70631f8b4d16f0e6fe9017bcee54efc9086d1f8cf6f56b3197c475f3cf66715d635cac53fcc94ca60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    385e84b875e49ba0dc39d344d3ebb820

    SHA1

    3b6571dd07e0b5b749020616747497c0c0d24a28

    SHA256

    09c07f1caa76d6248ab24c8d089c60a8f7269e975aec0dadbedb5bb6eff16361

    SHA512

    98179d7d3317e09f903cc2ec9938eddc7bafbdd3703adde37b406771e09a96b192119c05d1de6031fdf46b17e36117df2cf948d60d1aea6f801df2a0f6c042fb

  • C:\Users\Admin\AppData\Local\Temp\Cab4C9D.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar4DBD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b