Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 10:45

General

  • Target

    86ba183b6135af977880183dd50fef70_JaffaCakes118.html

  • Size

    27KB

  • MD5

    86ba183b6135af977880183dd50fef70

  • SHA1

    c2006ccec1b70eb86b705fcc2f1a4b7a75b8def6

  • SHA256

    6ae093cda92ae81e2b3b4874505f78def7f1d519d909e540b4cb2c05caf92c26

  • SHA512

    51c64c6d0b607a9abdbc5176306e10559ee6d1742dc1e7073c85cb4626e1a90f16f2c5496f407f5d72fce746e4af921d3c9700f1af897c08247546e13df5d780

  • SSDEEP

    192:uwzBobVtb5n37enQjxn5Q/WnQieNNnZnQOkEnt6knQTbn9nQ9eFxm6uXfBQl7MBk:KQ/1wb6foS70Z

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86ba183b6135af977880183dd50fef70_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b7db3b6dcf2980895b982b44426649e

    SHA1

    af67283dd9fc48fd96d7ff90a9100af552f29914

    SHA256

    e3604e77bfbed1e25953f59fbd953e0fb55e2f03b33ecc38cb35b6e3d392e92d

    SHA512

    747c003710dbdba993e5758d8e880593d288ce260d7a0f005486a0dfe616b8572ad42e70c2754985226b48f7f5ad868e24b285d25ed87b4d34ef5d2a1d25604e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a55ab2b2b5f114a1202ee308287030a1

    SHA1

    a2a77958551b680ca155b7f1961f7285961098a0

    SHA256

    daca8bcf056c93be8dd95804e67993ec18b9e387a2ba4511bdcd42c0df2710d5

    SHA512

    a6036dd5afe8fa2ff90f51be7202541598f78843f3c4b4432b7efc016288241de62280031529c8bcdba663b93c64442589c20ee202620972b5e5e842654429b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4404b91e956ef465f2cbf4f3e383d3c9

    SHA1

    b3392ed0885f0c495d23ffe0bae6e3d6396f4064

    SHA256

    9655bbb5d75c8746e95715ade9b963a9d291dee2267de898ecb02b806a573de2

    SHA512

    0989763a51cce7c4d14013cd0d00bfc6fcdd4317b3aaab93776ae1750785cb7d87592ab5d7bbc30f4694d5cf51d72556a11a31f596f5505ce4530cf00bd8c77f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6195aa6a8c142f884a80ab5c4171718

    SHA1

    e0aaf73dad86d3e9666908c83cfda17c44f50640

    SHA256

    092792f80701b32d82fc7c819801e8db69dfda08f90e969da4deb3b419ab9326

    SHA512

    b546ba4a19c553aec34c1addd9a1afcea95f1ccd85d0af1614741830e37ed7604165469d094e93a518a33872738d0b53a8fae138387e057471ecc101f044818f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e14d92b18697adf733f92ff192f716d

    SHA1

    eee4ec0b2762933a2d87fbf00b30f7d8f7d82590

    SHA256

    57c319e54164c8f2069bc5612e741e882c56639749d43939ee89e36f582c07c5

    SHA512

    66d678d42d59297eb5979ab080dcd0de183d3b2583eacb24a74139de409a9d29dc6029a4060db406668180113c7054537fc4f2cdc93d6be7ea8afd9351476589

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb91da0ddc5bada6fa759a0875dbfb28

    SHA1

    80a806feb2dced2b1d94ab249691079e61660188

    SHA256

    d4c3e004978574fabdabfe2673332038715808e702514fac553115ce871fbbaa

    SHA512

    01635130bed10903c3d8148d6a7b8f416a94d188f4b0cf3e0ead4acb587f04395c48534f61a035bbd80f35221d1198cc71717ef3772069f505d71d0ef56ae03c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14af151905438dd7cbf1b18ddcebb0a6

    SHA1

    d44c6daf5868b7ffd89b32f6128946636249b818

    SHA256

    9522e1e73ea7ab64612e8754a044e60252ef1d1a78b15db1166fbb38c8f956a8

    SHA512

    401451fa20bcdb2e665ebb718d80f06eeb7cb792111dd16cc2a624cc779c47208a16416ac4b53eb23f6bde509e172f56fb5d65916af2da537b15c688141ae2d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23908806c82aac0ccf24afe5a7e1d2cd

    SHA1

    615caf40c1b939d139d32ab4fec4109bee2e8dfc

    SHA256

    1b7eb5c18dea7116962a06e78191a4e1af01ae4dca94bd648ea369953a913cfc

    SHA512

    674c6c224644b7803634f915a7729173fe669e22149d16930efbab8bfa4f40b5cdaa288557ea775c6fcef292b643a12e9b5b139d798466d33beb0de8bc0ba020

  • C:\Users\Admin\AppData\Local\Temp\Cab1CC4.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar1D4A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b