Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 08:43

General

  • Target

    89ea0343d67e56044eb3f6d777ffdfb4_JaffaCakes118.html

  • Size

    214KB

  • MD5

    89ea0343d67e56044eb3f6d777ffdfb4

  • SHA1

    7e0b3a9cc9f33b61b9a6891ceb6580bce08ef7f1

  • SHA256

    785cd7e182439fab56386a4e8cedcf2b813edf34fc7a2e83500a687a62144630

  • SHA512

    2ab99aa813f610b98edf50fab9254a9c39b37e22774e5adb7b30e6a8e90d2a2b70147ae453b4a2a34e9fa3d8923ef6ef6f2d0007ee06e71f40b7f52a25f7d65d

  • SSDEEP

    3072:crhB9CyHxX7Be7iAvtLPbAwuBNKifXTJy:Ez9VxLY7iAVLTBQJly

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89ea0343d67e56044eb3f6d777ffdfb4_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee7489e03058086f32201f455cc79718

    SHA1

    7947b3887dd2a304fc3b91145365bca826b961b5

    SHA256

    445b79efe23058cbc62a38963a7e6a4c06a7aaf22b92d504c03ebe0232633cc3

    SHA512

    304a7b53c9c33502d86e79b5d5307edd781c331405e60444f785f2144d4bdf7fc7fdaeec548ca6dbe72b24dd5a67d3f45625f891d9c98fa70070028823f36a8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1624f369b7585cdb938c1a43c17d261c

    SHA1

    09403536a93e94c01c9f8d65bca8beae1eca90e9

    SHA256

    f0d0360acc000331df9d78414bcf8da89b65b49479c48ace7b15f65c01251a79

    SHA512

    d247a95006542aebf23d6cf7d79f8cf114b3f06c205f9a34c1e1fc319bd3abc7feb7bdd9096fbab34e53aa997b03714b45bfd422cf3ea7fbe935d885c8a4ff2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3521f632b6a0e9f358e1132091c73f62

    SHA1

    ec00b928f65bd61d9b9a274ce1c89792a605c7a2

    SHA256

    c0cbc55c22cd29e52995c06f4b2867a206ac8030c5a5b42759e252ae7b1760d0

    SHA512

    483fb6d1eb57e768ad96f393753b08272fd7dde4beaab702352e182a7ea6e0947ff9bc577d0bee343bafa1ba87b7cbd811e3b6458f7fb0317f7ed058f9dbdd7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5510add6b20a04a4835d5afeb9574d90

    SHA1

    4fe5dcf18a73bccc5c392e24576146297529dc06

    SHA256

    7ca6687cf6ebff79056195f641620c02db2691fa291c6f27e30c1b9885cf5814

    SHA512

    e92ce0e87ffdac715d5565b36145cafd278370fc3ec100d6d3d14776dc7066c0d9ada22d1bc4b4058c4f36d789e9042d2e4f59545e171c5d4472a6dc81ee3ef1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    302a320aa0937931f5092e46a767749b

    SHA1

    1f07efb0f54f31a78b0c0911252b188e9a04235d

    SHA256

    17332a449d26086f2261e867fe35a56dd9909b6dbca59ca16cb0b63b317c033b

    SHA512

    6e9ea7ba32a969515b4f7b24a8d5ca2a28ccae0a8fc83f1979d0a8d61e19254b8bcfaf84a41ed56b7dfdbffedc4ec386aa4327a8356b10d73f742420f6b66614

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20990f159a51ae6b7cf0b5a3922ec0d5

    SHA1

    88354f164cf319df1ac6f56324485c5247a8156a

    SHA256

    8c0fb91c43957e2603133cc3b42a9f75705dca693858af30cc821ad51874c2ff

    SHA512

    42c9e86b135873dc3f6647cc550ccfde38b8a0e5e8bc0cfc9c17b6968917fa5ab330da8b9abf1b043f2cbc465ac9aea892048db6c9a1856b2be1d0a12935925e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85586218077b2e26c39b9b945636d770

    SHA1

    4d3eac456351ba8f88db4cb5312f3065e70a2e49

    SHA256

    ab6c4c726f9583f6c968543ae75aaff29b37be3171ebd28be8818c51644de3fb

    SHA512

    acb5db61fc7bab7111d2042e29dbd2d48dab87019baea43f43fff8d26873a46d06f2a41c7ac0263a478b470135ea985a635463e8a885524a5901a02665d95dc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c11ead4dfe8b1acacf3095a0f6ebe267

    SHA1

    50e2b75e8202d4090aee68b26cbed1108b5a4007

    SHA256

    f540c5e4f747f15466d89e18f10703f334755e0438f656c271885e54e2533fc6

    SHA512

    99472f590a4e2e35077da4dbb18182b25710eac102a6cf6c63b68757c4411e886dfed4e72d20d62676fa98c101efe9e06886ed4670179c04c5e8f98a670f955d

  • C:\Users\Admin\AppData\Local\Temp\CabD2C.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarDC0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b