Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 21:15

General

  • Target

    81f3dc3b354ad16931629740e28f1a93_JaffaCakes118.html

  • Size

    27KB

  • MD5

    81f3dc3b354ad16931629740e28f1a93

  • SHA1

    53a7ade12e412cae7f76b0afc0d182dd898afe7f

  • SHA256

    8ef074ae4f2916a7cc0e2d87652609f1923d23e22f53af293ca3ab5d29404b5d

  • SHA512

    f126bd863125e71fbf62f3a36fcbe4b7950e785b25723eb99c1f780294e0873277abf18f8274ad9f26d99263df27884e39f60e0cd77fd8db9350cd9e4a27887e

  • SSDEEP

    192:uqo/L2b5nMKnQjxn5Q/vnQieWNnNnQOkEnt5ZnQTbnNnQECJVevo7NtdFo+NzQ4C:naQ/GygcO40h

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81f3dc3b354ad16931629740e28f1a93_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e70a2be18ccc182ba8581c2f3a85494c

    SHA1

    db3f5856ed6dee329f4cc4da88e0c537d521b30d

    SHA256

    918743e8bcfe91d58daaa293b4cdec1f31dbc0d2d3e63303c544ed731bc8d5be

    SHA512

    5332dfcb3f1a89b796f10ea04f93e238e1d6caec1e9d89fbef27b4f55182d7d45c7bb99e370179e22193be32b35d88ec2c0ed1246131f23566465c4321010657

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5c4692470baaf25bc18c0c5103bd157

    SHA1

    fa888eb98ffc60af4135c41dd890109184b24013

    SHA256

    33822dfd7190f500856802414bedb0541dd06b8c47f399e815883bdb1a4da085

    SHA512

    64f8b7e8c39e10f9fe8550348221ef1addaee2339ae4abcaa21c38ed23a641658803f3390d5bc479b97ddaf99f41ef6aebb251ad145a15c607bc7ee4ec34353f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8434cc586e31118c92fbe9e2d7e61ade

    SHA1

    73a48a1fe5bc37b194222f8c44eed9bbea84b13b

    SHA256

    e6345bea4c267b418c58160884f896c4140a4da53e60f792343b68ce31ce132c

    SHA512

    d03ee94f3ac3ec3851ec55a06339f4392605ed0d11d2bf60f54816dd21e6a13a39bd4cbc3477683a758ea462144e1018ce4170bba531791a404f3b43b12d7737

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c1413a26952d0ad9dffbbbd233589b0

    SHA1

    b540fd821fe52897615fb26904c6cf5bc363f79c

    SHA256

    a3a0d18a3182add98bc05a00ee8784ff03d038ff899fa3139de6593b6b14cfda

    SHA512

    05b6bde4966e00635355276d2a798472960ef8f457176526c71c5bbcf51c460abceac572ebc3b49ae3eb10ea5036a86e57ab644dd23b38ca75370ae774e92f39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af783086f31209f8afbbddfd5493a363

    SHA1

    4e9fa0921e765fa3042287251f1cb921517d707e

    SHA256

    9e02fc6ac09ace943d7e978d325894ba3cf471064c601198c88328d167cdefa2

    SHA512

    4d113b476f0487e935bef7b5d7d65d4f876d01807774d69e3845d8048e980321713abb23b0c86b457337070012c5b204090aefc95c070af07eac75330f87c9e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95496ef5413f7715aa42af807b9155d7

    SHA1

    51a01335ce2a39c1d24bd4b8432ca972755e57ec

    SHA256

    adb0553e3af61b52a0f03683ec28418b8b94541d237661c4ba0c086ee3cad0b5

    SHA512

    db350929e494ca0680814659d703ed83487055b9f17ad59510b1ab74caeae2e4736f546582a23cab87d22116ccbd2f7c761dd4b8ed0f27347f5182ae077f2e6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecf3a648f54ff3636bf5bbf32d0ff132

    SHA1

    54f090c889aa764c085b13545db126c1f841c84c

    SHA256

    b7af662188dd29d5cb32685dc447a01af1567094cf54b169afc0653653344201

    SHA512

    0c56f51de452a271fb7289877430705b5dc5e452af790ce8c76ed08c51a3e2e2b1585f5cacd774bcaa5e2ef5671aca9ac1e4745ed8a7e8cf8977c23cdbac4e12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    844f3c09e4671943939118e8eb314177

    SHA1

    b876b0e2051c4bed61ed35247b508abd8459dca6

    SHA256

    bfc07f958066534d70d9253a41b50edd27e60cfc4638990ac4231c5e53a58715

    SHA512

    a84296549f8b3335bbbed01837d5d871740a9997d106139e9f62fbc866e3dff64c2d7dd9a8faf3a4c1f1b71f5a79256c99662112b27aac68ea79ccf3092726ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c0d9a5eafe5af9a62d73c77a40560ec

    SHA1

    44dc3c83d2fca4ad5a3b9b9121838fb088075c4c

    SHA256

    83a39534d66487f260c0f179d231354010fd445b03a968f8a7c6d9e2b170ab94

    SHA512

    6e5b8aa7aec08d5019bfd066274c3350f78c276e678229ac69a9e25977b9dfbd54606e725aa50a12ebb6eb3837d88b6d510f5977c0ced0e611dcf7df64d6c064

  • C:\Users\Admin\AppData\Local\Temp\Cab1383.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1483.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b