Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 21:56

General

  • Target

    8bec510291a046b6e61710cff12ae011_JaffaCakes118.html

  • Size

    27KB

  • MD5

    8bec510291a046b6e61710cff12ae011

  • SHA1

    92996569941a331796fc85e017c0688faccafec6

  • SHA256

    89819ac2ce40b1d6653a02aadd23b5f0fa69e7f1bd9abb6febbf7f00247898ed

  • SHA512

    3f062eef7d20724cad7925c1372993ab58df1c18b375bee5e412102e257d3fac86a50b486806bf21b92a7ccd9a2daec4824f50ab5adf43cc82af0ac3ffa21fec

  • SSDEEP

    192:uwLkb5nrinQjxn5Q/anQieBNninQOkEntiEnQTbn1nQ9ehpm6uTbtQl7MBhqnYnO:iQ/wIjSbcS/u

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8bec510291a046b6e61710cff12ae011_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b50648ab44563f2b6d8d7815d9d58c6

    SHA1

    10741cd2d853be9b16b6b3bd270fc01bf28e0b1a

    SHA256

    4e67264d87693bb3ba358a0e9a71f349feb0d94750d1cd5fcd2f522f924fe279

    SHA512

    b39a1bd80f47d1871805fe5c23c95c33cb7cb5f1ddcdfdd386015583d1c705bdd7513470bbcb595ddfde4afe8e3e81784a46571ad2d26b2931fd7545fb94b1ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4b8e7c8534c8adcaf9940c85b366b82

    SHA1

    2ad63309ab8ea667bad909d98bab6d98396685c1

    SHA256

    bac337838c143b73fada35517f5b30495b6dea9252c09ea7211756ac5a6ca470

    SHA512

    645b603522ad689a75f9dcf8e72b84ea9b22f801aa5a90d722aeeb952e0d27ceed94714a3e08719e83b0f537cad3252faf54b4ce4ba337d461ea2b75a742dc25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2224d64991e2a631bea9ad2d7d12f9d5

    SHA1

    40dabba7be1199738d932bc71362973509f9959a

    SHA256

    1826c77c477b339caf134bf648af577a5028a03b4fb0621052bbd23375fc0f50

    SHA512

    20a0f5c9ae32436d746c5611bfaec329be9e94e9b46a21947d1dc729dad08103b76d13321321fbb2bc1ddb3db6909e05d0eeb86520157c7ef26c4147e76c8a08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c0c2bc8ed79847402f8b9dbdf2dd0e6

    SHA1

    67b8f750bc18577411fbfa54f12c7a024acbdcb3

    SHA256

    e235768ae26f6b89555310a755f312a9b825bf53d7cf15d53f261f47b47b13b0

    SHA512

    7c8c0649b4fb87b3aec2c4d0ddcfb55189df763c19e85e54c93d60e4d4d8c2258fc26eb64d74ed00b4efb9b3be71fb257c9be7a2569ad006aeccf82adb1bf5af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08c8e2c0fa0fa83f879a5de4993470af

    SHA1

    209290c2fc08ed31e86fe447df0d004f35ebd874

    SHA256

    f9fbbdf0bac433a2fb3a77fa5b9cfb10ff115c4d602a426ccfc7944fdb288db2

    SHA512

    b7365adfe351acf45117147cfe19ac00de77ae458ad6aa866f483e7a44f71385f4cecc418bde9997145ae1fa65afef16a467897075c27e286a52520fc0552a36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1256b0accc7ab9456fba6230e0ccc1a0

    SHA1

    af371a70b2c65b9f1daeae712567925f6def1454

    SHA256

    c7440f76763a6532ae3d8602354c51735884e003d3cb5619c9ea9280d1a7ed13

    SHA512

    6a7006d051dfb53520676157161b997b5d32575862ec08240656a306c874a02458755f197ab2fb858d5b3ce9ed2397e248f02142526ef000e0495db46aa2244d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b68a153fdc5e8c829b45f1e4ae5f572

    SHA1

    d33342e5854866b8dfa9187bc1372ead57eb84c5

    SHA256

    7c050d79e1d05a9c9466daa58ef7f44921da873ad7b7f1fe3fb0075073f1ee99

    SHA512

    f395829529bf12169aad0e1a9f95429d7d82b12d88bf77fa5a453084bd675d39ed3e3609e5dfd445f01389305655634c8897b3e54cec575b316ca8c7dbe826d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efa01a080091eba8bb3fb910b24f3bfc

    SHA1

    acfce405dca631fc09b61bdef3794ed64b2f8c12

    SHA256

    aa9aca011c94c1653f18c4c2f0aed8c3e76bd81d296eca9bdd954e76517676e4

    SHA512

    793340f144d2c2ccf0bfadc630c8abadf749a66d7e0ab376afd475acaebc4f44526b97bd3556fbc587dfc701afd9768d4a1d3b432e063048d1fc3a8526489f2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d35b90e4f62afba6d96b5a98d9c5d94e

    SHA1

    0595e719df5aa2528223621419c6981c2591bb44

    SHA256

    e80beadbc3332afd61898147e048ac2e24874752d48509e5dbaab07f85a2ce88

    SHA512

    ebd7e4484c6f15d0b42e51c27a6d464c563c570b0c5a60e402a1697cc3ec0fa0b355054d2071547807a241813355daf3b66ff9c359244181f3557d4c09df3b91

  • C:\Users\Admin\AppData\Local\Temp\Cab16FC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar17DD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b