Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 05:32

General

  • Target

    861954ef330b00195333820e9705d022_JaffaCakes118.html

  • Size

    19KB

  • MD5

    861954ef330b00195333820e9705d022

  • SHA1

    c058f14afe032e0aa3b9a24f9088ce51e099d849

  • SHA256

    57d465dc902f2902ce870616cd8c2883083f2e1bcae16e10ecc82f2bff7b9956

  • SHA512

    16db3165f68e2927e247101c4b94b3e9522f6a85ac236032824303e06d16b324de7ed9892bf878392b155ff628680bcfe682011550af1de5555a29acc88c503d

  • SSDEEP

    192:SIM3t0I5fo9cOQivXQWxZxdkVSoAII4QzUnjBhga82qDB8:SIMd0I5nO9HVsvgZxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\861954ef330b00195333820e9705d022_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f99302d36846d9b37a4cb957d0d9cf42

    SHA1

    ba8261994940e1b6551f3e9e99fba0195dc77247

    SHA256

    6059cf4206ec8b6b2c2c99e4fedd70a3abd09a678927fa13eefdb4c7179f20f8

    SHA512

    6ed56eabc9f76d5dd1b5afa17aabaaa53c6ac6f4b96a200644f5924dd69a8f7d84442a4f94b41de81ca48ab300f86ff21abf0490ddba815a2263a7d852eb173c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22bac9e52af3b7ce59287e4d3d07ee8f

    SHA1

    ed22ef55351ece81bfe9abb500cc3c8032b52626

    SHA256

    a82d1a13ff6d3ea1581c82cc5a964c881c39393c3dbc681d54d0523f1bf8f7cd

    SHA512

    40ece69656431d9795b773bfb5bec2ba7f5c1c75ff7c4838aa897c5aec3675930f081852a00cdc0899fed17000cd924ae444942330c7aecafa3cfba06c951ed3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd1976df6ad9ed260042a3f0bd25c702

    SHA1

    3321fe57bf3d2d91d5c3758117f6e8c5b366b799

    SHA256

    dfaf3f24815c0281fad8d183dd2574118ad7a08c681d4bb2d8d5420442266588

    SHA512

    b8eb57d24a230d3697c599a2a03ca6e001a21026fe2b959d0082603d053fce2da1ce9555e77c5da7e7439ce49dfc76a7f5f598d5515cda73afb1aad7cf781721

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c92388ab26d94c9863e2444c3533315

    SHA1

    ab495dcbdc68998401f7dc474f9dc223cab8157d

    SHA256

    35791a27cb5a550b7a18d6487e6c65da4666e76a1e8d91b8b2bf1da6d058fcfb

    SHA512

    c427df1ea1a19cf0ede54ee311c7b036b78eed8641c00e1aa8671d91d5f6f581c5ae2f41972e4542abbfa2c99cf958a7ae2f3b94a86fa3998090de90b92c1410

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9ffec8d834b16b875701262c50cc13c

    SHA1

    aa692606affb5c6806b70817955bdee92b60edd0

    SHA256

    eaa9e2c4acb29bb7e6d344e58a155287087c8b04e3f9e76cc80432d27b8898e2

    SHA512

    723db5c681958a8f719b05e9843d1e1b9b5b10bb454832f06761b6d7ff5d12d54560c450ca7dda528cfcd182173260976c3d4a252c11d19e66c5bd89e6cb0918

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad872a4ec232ca93b9ba9e8ea0749b4c

    SHA1

    974995361edef41269ea28ea62183757fc7839de

    SHA256

    d153b3aea3750b90e1db9d0c6df5c502059ff638b885611039037fd52523eb2c

    SHA512

    bce1c8a6ebdb11e3c3e9b2285aa69f93dbf2bb9da91c69a5dba5ffb44140c4b01c3d9697bffa455acc9db60e1fca5d1791be74a0b522e0ebe30aca90102a1be1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d354362bffd30081a2b08e01c213028b

    SHA1

    2bac72e0413d3d1964d62bdae6310c8d2ce760ed

    SHA256

    13c1695c9f4d0675943a4798b38afd4b9361591b776565d00165a6642da49f7a

    SHA512

    f617da910bddf4dca0e94ce28ad97bc5ed2cfbf07116966d9bf33c4281fdededbf409b1ef532c11706d93669c720443804090ffd94bb853a103fc706b6e18681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    108b372c2335926b8056fe0d2db33770

    SHA1

    270257b61c8244545691b24dbc20c652a731a461

    SHA256

    67bc836587a5b105c0c48176c6a124096c654c32f187ff382617e94eaa9497a8

    SHA512

    5cf733176c6b36ff2af69e797502bf7bdcba7b7632f8f84c763b6e39b497e77fd68f6d03e8498907f60072e373f5e8ccf480845a51ee8996c47c87edba03a911

  • C:\Users\Admin\AppData\Local\Temp\Cab1D71.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Cab1DF0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1E05.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b