Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 07:14

General

  • Target

    836670eddd3c45885c6ac6894d400635_JaffaCakes118.html

  • Size

    651KB

  • MD5

    836670eddd3c45885c6ac6894d400635

  • SHA1

    4b46743a92d210e03d94cbdf97d55e7e2a726f48

  • SHA256

    ad8f280db38a29a9e23a0a33f1679d190c25beb8a369883c1bff5503f82ac8d4

  • SHA512

    1cd6fa4c65ef58a36cbce9bf3eb46894a720102815a49aba56bfbe9dfaff394656a582abed2d828031e0add38589f0355530706b500b47ab9d4bebbe247cb567

  • SSDEEP

    12288:S5d+X335d+X3G5d+X3Jlc5d+X3W5d+X3+:o+n+E+ple+0+e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\836670eddd3c45885c6ac6894d400635_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    303a92e768627588091ec960b7b0ee1b

    SHA1

    1218a1683079a4f4707a6983698ff66541b0e4ec

    SHA256

    17048b5a7972be1f2cfc617cab9385cb8f9716eb2f4ff791c84b69c94743d032

    SHA512

    c6e64668f3422031d29a4ab8dbb31106dbe861edd301dde94f8ca55df6e2e3c8ff8f6f8aafc256dac68015c89a39eb548fe8c57fd9e04392ba25577ff8278ae6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91beb0e027508a2ff79c935ae4e5eb89

    SHA1

    9f46bc941e5488db07df6b5f81b76d237357ee6e

    SHA256

    d37829a971070be8b7b5d9e05603f9ba3d78652aec952bdb56e242485eab6996

    SHA512

    f6ea7ecf836e185610725154c06fe04a347d8e17eeb9e610dffa98ab805372d8a448bfddda42a04324777d830dc63a2eaf2ff0cc800d3b82ac1519f2aa40ec49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3907ac04c2fdc46616c29a8b89def93a

    SHA1

    8a1da259da46dbb5771ab98edc654d25e8698c37

    SHA256

    234c4e70da2907fd36f769b4c87d36358b5554e9e5538f1980b5ad97e028531e

    SHA512

    1162d2e38eddb6faf0c24d11743d40ee1ea3044757a9169a2dbbeaa013d16a5ead092c8bf62666b1c9c353c98036ffb968f55fc02914418ca3594c63eb1bc2c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25ab1eccc55fdec90b99c695df96af52

    SHA1

    a84c7b5bee73eaa28710178499b0f09645333a17

    SHA256

    f22721d7891549eb9828757e5e140a0182b1c2481038bc39d72268289979b79c

    SHA512

    59551cb6268f91b74bfdedba8ff24d66db741840accb8c53cff458928bec3201825464d50273eb9ea1f2d872eaa0a4ffe494e99163f8818af1a90472c890e8f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59046ec29956eee1d87953761e3838f7

    SHA1

    d6c7f6f3257af00033f8d8272aaef75eaa4123a3

    SHA256

    f72da442d5fb89ac461b3dc9fe13dcd2ec438763697fa29432293486f4627b36

    SHA512

    ca88defc47dfea2a90cdaceadecd9d1235f6ef782fffdb481fa7bdccb046f20e1efcd1dd59b1b2db8666a97fccf762dbd3f6602aac32eeadd3f17e86cb91e873

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cf5786ee5890703e83772b958c6dca3

    SHA1

    93a73ae077e9bb1c20b943450ae389cb91ba5efe

    SHA256

    4380c985b57260e21bdbcd4bb0ca9eef686984500126ba9622e81022d06c0d3f

    SHA512

    f8c5bb27933b7b118f29101256ec7b3dd6bdc8a8fdccb024309103f5bc0ff4b2f7f8306344272b809a59da0c1545b512ae31a0eb27f0b30a38edce4c37a177f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bc5c036b7ef75d558b4e277d1bdc214

    SHA1

    bc5226bcada8f8f9fd9bfc7f9688cd9172e0f85b

    SHA256

    b8c81b6e50a932f15dde4e041a63c8ca4bfe0ba8bff7403ac008ca7f3687500f

    SHA512

    ffd55c0cb4a783622a4361e97315fce36ad3b425bd636df124d19c827a8efd22aaccf2dfd723e2ddfc87f3441623af7fdec193508e63e814c74262aa78bab2db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e568735fc68e6607c77ff56453454ce

    SHA1

    253cd7c810c6e852b88c9da207e2813b632df26f

    SHA256

    0290440e2b2fef08fff6bd6d7250c4143feeb7d1813165cb6e99bf9e33a9c3e6

    SHA512

    e181e77e00060e4f65132c7cb8da90d2c4e2099c19cba8d47cb90577851b8016bd56cdd79e7033206b0765cd1dc861c705d244c470747a9a7e6ec64cdc451724

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1409972fea9d73400bb9976f32281d78

    SHA1

    08d9301063cad47d0965da075fb28fe434aa6599

    SHA256

    8e133cd748d8a9d87df005266d7769f409d203b94b900347f413b18e43cceba1

    SHA512

    a2d8fa215375d06f03b9075b748f1d27e7ec2d2aa70f5c363aff84cf3841eba9f5b236d84414acd77a0d6fe0ca962a10f9ed5e86095762f6212c145357f1b119

  • C:\Users\Admin\AppData\Local\Temp\CabA5F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB9E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b