Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 16:49

General

  • Target

    84d1d40106f6001cbd7ff7bfaa9875e1_JaffaCakes118.html

  • Size

    24KB

  • MD5

    84d1d40106f6001cbd7ff7bfaa9875e1

  • SHA1

    82d572722ead77ffa62a0e98b5d5931e2234aafd

  • SHA256

    1002b89b9f665fd274da3c647d829b7dee46a25a59de34bb80541bdc1c927039

  • SHA512

    7fdef234b433a48520aa334b66e31950200e5d7c72a4a29755ba32f98b98c0fc88219f055507fca3d69c06225ad0684cea4bcde4edc0e65bad1d1e9eba2a37d3

  • SSDEEP

    192:uqN7HRb5nW7unQjxn5Q/fnQieZNnTnQOkEntFYnQTbn75nQeCJVevo7NtIFo+Nza:nIQ/kygcnnBj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84d1d40106f6001cbd7ff7bfaa9875e1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f97af4dcb1e4a1f9b3a344187cfeef0

    SHA1

    f9ddf05df8187a0b17b8e79e7e131bc49a9f4ae1

    SHA256

    f2f207432a9b1488b410e5fdfedb6c6ea8e5d76a50c40a87381d20bcb0f80688

    SHA512

    63238ddf57ed302f6159a89bc376cd0339a3f73e74dbc3ea3496402d1df20e6a916861d2a6d7db5c448ca13940e5cfb6b4ae9db2e4ca48f8b70d5b267c660d2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93e41bc71a336768a198e0ee50570dc0

    SHA1

    819284175e302a491b33ca2832d7f51aafda9940

    SHA256

    d6eb653c704fc77bac0b945f4c4e1aadd16849596f84959a7e2b10111bf4635a

    SHA512

    38c5cca6bee90089d8c7caf33fecea178dc8697517504049e1b919775a6dc68b1527e36dfaf411de72f3bbc7db0f5d4c3e4aeab60a59ff41094473bb29c3a1ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dd3c09d582ec38a4e058661d69d2981

    SHA1

    95cdc96ce9700de20c67385b26da7d025f6b6f2a

    SHA256

    4b1d4e3467da7c0636b02d7f4f45d64d99487ac1f329bb9908a0abe7f7bd331c

    SHA512

    a6c1d2528883c496b54b0bdee309d52140a607101f58ddf6d6a4c27561240824d7800d9aac8c824246f2039d3d5c4b051e5be252d3fc3f9649325432e70f26a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb3d2d83ff1a3e6e4324a4fc8f58ee2d

    SHA1

    8ae9ec7450bc69f5a813dad8dda41584a0d3b61d

    SHA256

    92da19aeb1fd96ffa49939cd710925639dfa278fc26fc91e10eba8fd56cb4b1f

    SHA512

    945b0226a9fbfb147cab6f9a9caaafeed25893d06ea08b563ad048fa174210ecbb0cb7b1120dfba611350118dd9678fdcb1f7fe4a7aaf8f0103f3ff06d8a229c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cb4d46e105cda37fa6d5a8b1d7ba78f

    SHA1

    e4e1b69172d4d436b3c4579d15aa081b1b1c0a7e

    SHA256

    779ba381082747cbbbe0db0194bd98ff90b4c6afd42d253a2183ca6213d94623

    SHA512

    9fe2f3714fdf5510fb4d4939aa42ed51ec6deb81d03291e0059cdabe049d13d1098fc3bc94e56b40b74f38ce4388831af43fbe96d38744c0f550187fe6ae262d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46159ef9cacfb25682ee65fae2e58604

    SHA1

    3722551533b8fc6db5b7289c17de8c117fbcab53

    SHA256

    d9ae5e6f6dfcae31669f1da7decc215220f5e48b03f2017da27710441d56f684

    SHA512

    fd5da14aad5a06a394128a1ead57dfbade2c1ea8c15abc1e01ac4a4cadc0191de3c504d56672de66c5004e34d507937954629f456015923983b30c983faeda97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91fa3469de86b658b3df4602bf198f02

    SHA1

    abf185631a19913251bb726c49fa3faf5dcc29cb

    SHA256

    ace7eb9791e35e8b33495a41483bdb9b9f3da6ed196df0be69f07bbbc213979d

    SHA512

    c144db4e22996555469f10de87784833fa01a473ae9863dd7afd5cd94ebd9cc59fa8c4e41ce336970d5ed1e8de1dff0b1169dc5a01263756c818f7d20d3d757b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e934985bfea9d1f65af6ab95041862d8

    SHA1

    35f5b4757a601dbb4cb4c5f22b4e22d8073b990d

    SHA256

    f93445aa3274f85c368bef2702a32c8f9a19c3db60317e4b7336ac6595b2952f

    SHA512

    58df6653e17c919c3d6c6ee1dfbcc91f3ead238be4e41a1a7659619b27de24627a5c58c43367ddeaa730c9a901294d0cb0848a2d8a0e624bfa6e12d0e34015aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00d47195c1804517eb6e6da4b1889d35

    SHA1

    f9db876d2b4b8235334a2a4b1c6442a87ddfe151

    SHA256

    9b7a528db22fa99a175db7b38bc9153bc0b07a3a757e8805bc36b5807bd3930b

    SHA512

    8474f20820d0305a6449f0b4388402486229c7d3552b2b5465f9238fd5b74a7a4869de0e3bb23007a3d457138eafe8a43f09f881cb3825599b2315c1de6e9954

  • C:\Users\Admin\AppData\Local\Temp\Cab77FD.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar798C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b