Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 15:08

General

  • Target

    8ad7d49df614b750657cbfab2812ea25_JaffaCakes118.html

  • Size

    18KB

  • MD5

    8ad7d49df614b750657cbfab2812ea25

  • SHA1

    1d1352828f46cf26803a0b67d8ce642382ceb32a

  • SHA256

    4b47611f1c6772b688b1d2745b810845088e1bb336e19e5bd6c1332ed116425e

  • SHA512

    9ff09ca99550eae6dcf32d29403a72bcac71b4ecc4373c409b6314f4b7184c045b4d23f42b45bc988aab36ec12df67e46b79480dba00ef933fb9e022c7c2509b

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIN4pzUnjBh3p82qDB8:SIMd0I5nvH5sv3CxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ad7d49df614b750657cbfab2812ea25_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    458e89a9dceb034056e485c4f814062c

    SHA1

    d2cfb4a5827eb26260865961a2744a4793e03ca6

    SHA256

    4ee0945d113bc6279312e8b7f4680c56b4975cfbebbf9c8ec85066eca6d387e4

    SHA512

    33a061b9ee826fb8981fac1a56494ca844df1df3b2a1db7f13d6d566300fd3709b1c6569802eabd238fe2f5bc3a1a05e56afdabd69a0a06058d708adbca685b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88459a94c31799d8725680bc16e64c7f

    SHA1

    601b53d1e3ef2caa6c508917831ad49fb4537953

    SHA256

    b38c79493e189801e1f953182e2dff8268534846d64ff342f7a9bc0721fd9c9c

    SHA512

    4c8406b532f5c1ca5c464a56e87481b0ba29ebb3e9a09b68135f5157b32c69d7c40839e96073e6b7efd0ba265b6acb6d394c4d1435b4393bbcda1ffcf4d6ad31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db821b477cb98c570b081b2c14d1ef02

    SHA1

    cafaa819844fe46111a9f922a6e649ca90112983

    SHA256

    67b4b1d6b06fdb275f78f3fe63dada60378f7083d00a0c636261b6c2b4bb862c

    SHA512

    59bb86168b3f4f2b4ec9205fbda05a22ef5ea2673b85facb7634f50f55a109eaf297630ac87dcc9bc052218e30f9d257039de3d54ae2d7ce57e18a10abf3003e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7634e26141d7fd7e99cbab0f70306624

    SHA1

    213a7ed1deb58f0bac102f637c7812dc886b10d7

    SHA256

    b96cd2bac7ef9fc7416db5c35cf4079535558aacfe3c6a37c1f25b18c7a05c53

    SHA512

    d12787f363f565a8f3e6320470e605fa019709877def36b98e43f496a6e4392e1d98b834006c4d5ea80ac70cb326b7035801b8ec59677008af5d42a596465fa5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b7bc63eba12179b56c95998c997f271

    SHA1

    d03eb2a880f50d2e91823b4a0928d026a5fe3804

    SHA256

    ad3892ba36c56fe72e6f621da016d05dfa9d1eb8e9cf3a5b500f00920212c204

    SHA512

    f05a53c6e4a28e255890c018ad0d51bdcff7d23f1c1fc70cf69c8954b9af6871687763ec2673facd9b2d37bba7c6156dda9860a354131b976b08c94dc06330ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    121ad91160cdc201bed9357ae3b54982

    SHA1

    2638d2242b2aeb6cd69ecb795ad190d148073eec

    SHA256

    350ee849ed83e0f0c5e687603d94bb458c89e80a2e71156cc541138afe159206

    SHA512

    50aa629876b81d20b474b1f59bcfc1ed8613a6718a4426e799a58c22ab62328ee36c7df6bc91a098d0ab04501608215caad3858c5350d5a9fe65730da4e70b16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60c7ab1426ae29bb6a63641d8bbd0190

    SHA1

    897d63f832b7b1e6f0970d1d3d33f97f78e422fa

    SHA256

    17ce91956a567477d37e7faccf84dafbbad647b28dab0bc698971b209506c6d2

    SHA512

    0072679e05f23eb3884758c318dce25392a12c107cf12107096cf6c6e7a10a1bc3c4fa688f8b74d64db5aaf3be3f85dabe5a848dab7188bb1a0c528bb173b190

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e47f11b54500eceb7a174162609b1c55

    SHA1

    9b921cc42a15b7a99d41e563c758d24cdb345cda

    SHA256

    890b828260c9fd8cb2b06bd9482dd2340458b27d6ee7995cd00da3664d08622e

    SHA512

    80d910b9f7574770ef31e59a96a7cb86ab060b6de14e5c8c8677f4bffe05ae2d5e20888e3815dcf9643f848294d0977410fd547d5683286f3fd16d4143b730d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7ef57e728602af5a4bd6ca9504fbade

    SHA1

    83b11e2a628c04f540a4f34e465a1f22c7af2e60

    SHA256

    00579d9644cbd80442fc6a09eb9bdf01b6c157094d37d76fd5d2a2805b89e141

    SHA512

    9bf34e48dedc6863ebb6018684c4777b8035591ce0ad3758add885f998fc45440347540a50b957addf508b4bce16f7aec8ab8a7f4b5cf3a7325fd5a09f2eba75

  • C:\Users\Admin\AppData\Local\Temp\Cab1D33.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1E24.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b