Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 04:56

General

  • Target

    896a65efa9ce447a96acdccf3ee0a1ab_JaffaCakes118.html

  • Size

    23KB

  • MD5

    896a65efa9ce447a96acdccf3ee0a1ab

  • SHA1

    acc3615215019b3ac7121a54f9a422768b9adee4

  • SHA256

    ac83730aa57f55399fb19cdc6d1e3cbf29b603e4205cdc65932e831d28208a62

  • SHA512

    27b8180ce8f18d057a8e2d20e9dfcfd2d393d1665524e575b1f25ace4b9d6e044df0c097989fc2ac791baf20b8cf78a981ebca805fec9cf4c01f85713cf7e94e

  • SSDEEP

    192:uwvSb5nsWnQjxn5Q/LnQieSNnmnQOkEntZBnQTbnpnQZGLnLnQtkqMByqnYnQ7t/:fQ/UGt8A

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\896a65efa9ce447a96acdccf3ee0a1ab_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b60f4b777de6f96e21a85a4ab0381f6e

    SHA1

    15ac3c2b33295626172cbbf9bd22c77d47719b1a

    SHA256

    a8e6f59dc0eb7dadf424b408bc4a5f509c0136a2f2148f716e4483a120c80cc1

    SHA512

    c8fa5b000b5258c55e752988b3706d047d766dbb05161ec35b26952a45716a849fa28abfc9e6890c0dc9ff8581f182b11b892883c56bb855e071e87d7210bef2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    961e397ee2f7129cdbfc27f03b34ba64

    SHA1

    4232b990980a64e271896d1944d6a46c60d17c7c

    SHA256

    676142f250f564912344e058fe87c8ef07dd96c60ebd3a9ef6693dfde37a237f

    SHA512

    91a78d7f08874a4ed75412305c4107c79816c69f986a8b000a58229cf8ff53290c312ce54121e520243589940c902d4935f3e81d35439c6df9a3c13b537021d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64dbd91cefad766bb8704dc963f48ca7

    SHA1

    c2f68c694265505e795ed786992201789003ca30

    SHA256

    a201bb073213487f01a9a31bb1b852dbed04247869eddb87dcef7817b331d606

    SHA512

    8a79db131f3a09cd8c303b8b60b6583797039805a91505a56bde5a2d8e78e7b17122bb4e20a996ca8b1283f24fe0dc6936f7d309734ca5156da836acea5193bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9db88f6d804a5fc9469bd227e2ad5c27

    SHA1

    20e56e42fdeb3a43031db7664494f72f243537c4

    SHA256

    8f7c76ecdd777d7681ea6210bf5ac0a160e5611880ebcd6e34ddcf5f9be07d70

    SHA512

    49e91af1a56d2242e67d06e233f39fe7b3f02247a969afc12a2cbb81d81649f5790e2cba92ca212eefdf3cc15e43a8df463148b200d1bc8bb4dc4ac36f3682e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c75898edc1179708cac7b4cd1b094368

    SHA1

    fdd77a8d5554b534677d8e498fc4fb7fd5ea8a44

    SHA256

    e826f6574a254fc0891a70c4fa7a8b8289a825e392e23b3bf7cd739d8ae5c4ba

    SHA512

    d634138b023c8db8aa0ef4ba87bafe7f548b9f01436444ef99eed2719649c3b4c547dc9fe010919bf04b7bf8d1dcfe5ba452e0309d3f098d2448bf3406a29fcf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da7b6d732ce497f802bafaf9dcfad77d

    SHA1

    fd4ca326613220abe0085e3f8e5632458bf3990c

    SHA256

    a00425f6cac884cfabe897417c70c84f2f9d71cae7778a93b2462cba069eb53b

    SHA512

    708c5227ad3a375519b7962dd7d6788ed38fd20ddcabe716d1a0c1fad25648b5a112cb58f83ee6abf42db2e4a495c75809534342b8e73f79962253aa8cda000a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38cf2087a1ee9f4d7ea17f88eee64b0d

    SHA1

    c27ff41f88890d526d1bab13bc352096e1a77bbb

    SHA256

    e66fb2fdcf5f72531509db9cf48ae00cada20271878d3f3c3ceaa266bd8ac16f

    SHA512

    07fb3ae1b936841f2304968d23b9575cdf47d19568b90cf76ff085bac997d04423399207c2dfd3a7b8f5f41ff7a7b4d86cf90d2411e79bb2b0f04e1b2dbfb020

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e120b75d7e9c1c8aa063b68c568900c

    SHA1

    61beaddee9fe1895aac0c921b3306b6cbade659b

    SHA256

    ad396e8de36512d0c40970efb01bcbfd3b9be5b698f66e767babe420e1bcf9b2

    SHA512

    09cd77f8c4ac28dc165aa588004e86cd4208a893bba02e6c6764c4f43c4d8c119ec9c49b9067e2760ae46c26803db1119c78c13627dc9196231a8126652eaeab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f95569ee0a3f0cae48dde14025641994

    SHA1

    3f6df3c76b92858785c720d94d490cd93b80816c

    SHA256

    c1a1382bab274e2713f14dfd8dfd81ef1802349108c700f9d8836a297a00efe3

    SHA512

    f017a7fd40651bfeefcec2f43d97501f0daab7e0fef1d6b11c1e144d40da3186a1cca9ec81475188c1be8c05936318cf05d1935104937b313af2d23314ca11f7

  • C:\Users\Admin\AppData\Local\Temp\CabE74.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CabF41.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF46.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b