Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 12:52

General

  • Target

    8a8248aef249f9bfdf27946cc6a89596_JaffaCakes118.html

  • Size

    32KB

  • MD5

    8a8248aef249f9bfdf27946cc6a89596

  • SHA1

    3d67bdefcab9731b6a835e85c6ada85407458e6c

  • SHA256

    0b8fa17101038e54f9782a5f90ed2123c6912f0eda0c286d9b13e22668d43e18

  • SHA512

    f8dc53d1529a20d217c7e3160f8c3ddb31ecfd044be22215b45d590610ee1b967c504547f46f56b7547281a2b2982d2bd806f9cca1be227121fc69edeab88e28

  • SSDEEP

    192:uWnmb5nPQlnQjxn5Q/MWnQieqNnKnQOkEntWgdnQTbn1nQlMCXAlStO+N2RjIt6y:rOQ/Myeh5tOe2RUt6+XOoqPHZdWYhC

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a8248aef249f9bfdf27946cc6a89596_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87637eeec15564c84b65fed550b02f9c

    SHA1

    b84addd099f2b3982b8dea492dcdb7abc6ce4e1c

    SHA256

    90fa11e9827d41027aa674455fd042c68f80bc5a38ad0f9d8babe29bd8d06ba3

    SHA512

    730af731edbbfc569ff38928d3f478d558512d393e45255cf4700cb6fdd1ddef4a7a90dd139c407128487abf39425062c28014eab7012d16a7fc3da230a9d0f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35fdeceb396dd2d42aa7fa979de681e9

    SHA1

    6eb6c5e9394e544e1786ad9b8ab902944ea35c4c

    SHA256

    6cd0d5c4326ee1154b2c3fb9a656f35cad8046cb848aef7f97b034bcc237b317

    SHA512

    54bebfc334c8fe25885fc97cb8604a532666dd7f973682d6877d7c3e5d262b8aa96cd6e4952528526f922c328e4b2ebeedc56770620151cdc77743c8a22a10e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bade6047003a8eb181990524086a3eba

    SHA1

    2e230442b28eceb454ff1d061b8487388a5667aa

    SHA256

    3c57274300b421e4aff0fbe82c009779a85f7f13d53bc47457b725b00ce36008

    SHA512

    4ad2ae7fd2616d9d4d031fe80cc4c47f9f3549dba0bc1d3843e41e1c284c49b3855946e839f35d5420395ef2a9e1ba01676f0a62ea7cc5bedf157b4bc838a317

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0f90044177493547f58838c8cd130c0

    SHA1

    0089b3d6c50b8dbcf37d572e33cd5b697aab9299

    SHA256

    1b1797dc4b01deea616df34eb7a0d66908e4affc2b7e8ae129b2583543c451e6

    SHA512

    9e97decf60b5726505cbec98afefaf500744c4be301779b02133cc940aca51c6f34a4426f1d53b66df9a7dffbb44144e8d58ce7d4a37525140a941085a936fde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    daa50b87c6a98e4083c071bf6af0b70e

    SHA1

    d3a418ec15d652734990964db9788761d02647a5

    SHA256

    c4852cb5196b8696bd222b9d08ffeb62390d54ae0307e37ef9a42222d4e1ff34

    SHA512

    7491a8d20a9b516659d35136316e5e6a0c1fe91603a77a7ce2e7ae50ee1970b677fef7262502eecee4742f55d8486ac85e68de7200a3fc7e3d81b2bd808c586f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fee748696e795f93db681e1e6ef39b3

    SHA1

    e107c62a0f66875e281c69f74c24febfb94c6ec1

    SHA256

    2ff541bd968a972cd716732d070f2acabe9f4545f6e4b9ea2d354aeae6fa059b

    SHA512

    d2380be062a89fa90c4679467ab3d441c6631f8b05a7dd1889404578fdcc455a4c562e6c8e220e07df7f910f1e5a71072eb5052bb6af2bbc0ec31f440ed81dd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6aee928c90a108843dcb0428eb8540b3

    SHA1

    96a396ea4daeb56c69f269b1d306a0fb2ee2f1db

    SHA256

    7d4115e0aaf7db693ea5fd480932e8573ab1d58c1473270825df73a1c7412ad8

    SHA512

    13262810b116b6374b776a63f4cae436cbc7947a28b937b698c53059a8a02b05fb5e0ef461a93462661f351d50bbcf6651b23a328ece0aa5c16823dab67e313f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e022fde5aa5248a050c39f2655bd8e43

    SHA1

    91a0e1dec7f3e2aa959dc9d605462aa9aa7eafc4

    SHA256

    bfef506e099b7168d9fc63c4edfa042d9d27524dd92ecb5aa66b181ae5f8e974

    SHA512

    8ca1b1ca9e5cb8e6d8fb8ab75e590c414588a67ae857601157247bb8ff916975c273919cfea9f4b69f729dba325451f60e838b08091c6c4dc03412da00bb000d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc6863ad0b4c24b501cc51b2c2e43bc9

    SHA1

    bc1d9cf3641dab714d20ce280dcd083aa6a8013d

    SHA256

    57c77aa70e6411b3f43a6983336e76215327a943d431518731b1950699e778d6

    SHA512

    a0707c38b768a8ffd078f1e44c0ad8d93d7addadd3b05aa62bfd42b21e2b488591c4c1f4e2c85d8bda1d6a16f058613e792ebc904fd3a9ef4dcde239e5077689

  • C:\Users\Admin\AppData\Local\Temp\Cab1EE8.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Cab1F67.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1F7B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b