Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 11:47

General

  • Target

    8a613596021fd4cc244e8c85054bb3c9_JaffaCakes118.html

  • Size

    30KB

  • MD5

    8a613596021fd4cc244e8c85054bb3c9

  • SHA1

    ec775e379c26c33fd9578a519229df94e6559a39

  • SHA256

    3971a438877180d1bbdd6ba7b170eab3bd4e7aea1977301f8d2b05366813e87b

  • SHA512

    50265e11ed445ae8ff74d39ab85ef801266c83c726e95aeaee7cd5c022629a501c0ff1a8fdc38e8a0bdf8ba9c7c9d69e985efd4e1f48b1850c63b3a0c40f7be1

  • SSDEEP

    192:uW/xb5nGxnQjxn5Q/9nQieoNnUnQOkEntfvnQTbnJnQxMCEAT6K+iibI3serwxwK:hQ/SWIOcca5zARvf7Oq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a613596021fd4cc244e8c85054bb3c9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2ba9a6454a556f7463953181a3ebd5b

    SHA1

    f731fbf4be163d4fc0b4a8d00cfed02fcc598aad

    SHA256

    7b012490559c1121e5c604ea465347e22c29d2b764d76a68d1bd14962700f340

    SHA512

    9248f21b6ada7f6b817a82c82219594146690d544390888b0780311a999f1041e2e579adf7275a72e657e997347589f3279d46261693d20dec39ac7e645d9bd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd0e927034933be2d344a82661ceb862

    SHA1

    746a1d5ea6d7dfeeaf607e1942cbadeed2767822

    SHA256

    7d21785a1af033b49bf13e2d96fd93555d27b02b9e7bb1443a8b7b7ee47faedb

    SHA512

    4f50472cf34eb15fb834b58b4758f59ef2b5d34ad15ac089c8f24f9754ad647c7a9822860c8e5f72d688d5c8a1429f03d91a8c7b933b6a091c2e5dcdb21bdab8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77190e883a69b7528d64c74466f365fc

    SHA1

    46d51f9c3c4163eb4b97cbc96c80ee993ae99a27

    SHA256

    ffd38a83fd1b1019a4dc028f99890bb91a439684d387bbff332d93d3e6422c93

    SHA512

    f6dbff495806ba191d720f11e768e44adaa34ea12bfafec52f5511239515964e4da44ac37cd1c3150858974aae7ec9af21ad2d56f19c71f267a32e229c0faaf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b460bbe1ec0aebb1a41d7a56aee1166e

    SHA1

    2bf8278d65ecfd32a514708cb062e9613e3d0df7

    SHA256

    4f4a06816bd9f4605971ec51859583420fbcee44c6da6865f8e98e62549e274d

    SHA512

    72ef12b4ef365094383f64f2abea16c26088ff2c46c090d1c28777b107f2142075a40fe19b2a141ec19259e73e46b00de311bb1265563bfc6f33e76499170b4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5c890c348330352267b3df7a442b524

    SHA1

    5650d2ebc0d2673e8caac92fc734c9a87071699a

    SHA256

    94d2b3da3f7ea2e3fcc995cff880ffccb126d0c70f75106a544c8e4646dac974

    SHA512

    4f4517dbc89b9611ec9a002e5c3067856336fd37206fde4c6d6436dfc2c3b1132119867de3f5e57a88b83d69bada3f5205a51b5cb62e4b52457f095f2d53f7e1

  • C:\Users\Admin\AppData\Local\Temp\Cab10F4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar12A0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b