Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 06:44

General

  • Target

    835204266c0daf77d730706eb489122e_JaffaCakes118.html

  • Size

    26KB

  • MD5

    835204266c0daf77d730706eb489122e

  • SHA1

    9cce73a8cc64f171223123fa21ddd71bef2e468a

  • SHA256

    073ed7acf4ac565fbbe3be054fb8525852100bf980db3a8fb949d49864961846

  • SHA512

    9fa26225187e9a118ed56ba9a9223b0de350b5eb7cbb8724788febb8cf68d0512fbc75b7e7cca9c4b5ee07edec2cd0c09afd2baed81c5ba63e70b5d96ee3b4c3

  • SSDEEP

    192:uqCLP4b5nienQjxn5Q/FnQiegNnNnQOkEntX7nQTbnxnQKCJVevo7NtLFo+NzQ4H:nwQ/gygcQeKO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\835204266c0daf77d730706eb489122e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d626e9edc1b68b9fe5e94f3fd629712

    SHA1

    ea82709b0e1304cd0142506933020abe487cb5d4

    SHA256

    f48d21050848d70be330f08e3e3ab01117054bd95173a4d7085622a7ee7363f0

    SHA512

    0ade8be68462755f914cf7726fbbcd99febe6d0a980595133a56baf6f9eaa00905eace709ba18838ad44d282b836de604e7edd3b567f18a351b7219d13ba7e86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a3d1c0c0b45585e134f384040fd0bcf

    SHA1

    a778316d67d0e7b4cdbcac46dd85f1669ddfd281

    SHA256

    beb90adfd84cfc3136ee40bd25092833e2676209ad64bb3010f451bd592a87bb

    SHA512

    0fe158a8b5efb31965452a472583838aa4c2952e1b9855fb4297109d483ab88254b8d15452047d2c03c3adbb898c4f70aa31ec1d137bcb79ea43eaa8e32ad0a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78894c28527af60097188dda8a1b40df

    SHA1

    f1953f53da4324f5811b9d8954057199940ff98b

    SHA256

    2fd9b6bd8aa5466429c041657665703d7ad4a5183f3c5a7267aedd1a7684709a

    SHA512

    a14402b5440df3a3f62dce221af9d05e3fea719400392031d776a24afe1ede1d6347012be9972596186eb5896b93b35a6ed8dadf17455c491a25406e2dde7738

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a662a749096c710970a3dd79b0126cd

    SHA1

    b85d3ee1c6cd82526542fbe7c0a3831a2bd16b10

    SHA256

    1ab7bfa3804d8d06d8ed9c2af66c46afba045b60b4f9730496c4b046d5696d3a

    SHA512

    808ef0daad28cd851313498f10ff41e52e45ee07fd3719c69f5e606c5acdeefc40738b3dcdeb84945d003f102efab569d27af12ed0b7df55ff756a60b00a202e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bef7aeff06c0b0268f78bd5caf77699

    SHA1

    c3fd79f9a63a38f3fd058fb330c4f15a9d581fe9

    SHA256

    e63f7ec7606db680872de667f594447c53b30cf85248d21d60e90721453e8be1

    SHA512

    2db762858ef5836346ed84de671add836cedee6aac904cd33f7ed9bdf24ca50b35a8bbad8388427950f789eb7469d436da2a5014a91f800a512882b34b493b6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5eed9d086495cc8fd31cefd935de463c

    SHA1

    35372f2859ebf41332be2e0b20ee781bb5bb171f

    SHA256

    08b790b41298799ecbb13da2d9f3537968b74745bd0dc158f57b06a26caf527a

    SHA512

    dfcbabaa0ce1da3de42e380d1ab2f9cc40d550b77c2b0d4bf4b29d0cb546d8a1b591a6976e3f134924659330c0b73001926219a57a36b7ebb6f23cf7640501c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05d1b0c71b8c6cbafe881930bde0cc31

    SHA1

    94bfbf1fcad36ef1e4c0334e1204dfbf80ca7109

    SHA256

    81b921aa13cc67a537ac8a2b8cae56a73bfdc4273dc0e5239668d0fa7274483d

    SHA512

    78b1806e16fa34d984aa8cd2125fa26e76f5cc0b0b16bfa3f9bcb1151295f7e412ff8ebb047c66d8e39f94a0b8a2869c9809f54f5358b6ada1a25cd1a48619c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e3f189717104c4a1ad4132e2c5202b3

    SHA1

    5a102e2155ead1118d1de92f799d2d4471c0ff5b

    SHA256

    e3aade7e34b8b746e3c4cc8946dbc35075bcdb0cf1e211cae66d3c6b6f280060

    SHA512

    32909498b4da6aa387caae10652a6c15664e93fe15dcc5e0833a64ef265de89045331abb07312bcffb86532e0b379d5f2312dca767869b4fdb2c11592c48524b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fed58cb3104d5cc9f882483b2ef67122

    SHA1

    87a74d51f44dded2349fcbba2c36bb8d888e4343

    SHA256

    10860085c883a37ee98db22e8a597534abe249bcc7bc2500b799260a3636e000

    SHA512

    becbc0581aad46c1bb7652232a4510bd3544787de596e642c036fbce314d3327b2666e57cc53f1ee03f2f650870b1cd0867135110918fde666ff8aa093afe9cf

  • C:\Users\Admin\AppData\Local\Temp\CabDB9.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarE9A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b