Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 18:09

General

  • Target

    8b4f4c31edbcb977227bd840a0daa6cc_JaffaCakes118.html

  • Size

    22KB

  • MD5

    8b4f4c31edbcb977227bd840a0daa6cc

  • SHA1

    a7b7f3e964342588643f476583dea6358a3bda85

  • SHA256

    fddac42352520cb634c340f6deb58f9fd13d093f4f26441fe0fc99e17729d4a3

  • SHA512

    9ff3ba47e1ba254c961e3cc0e9469b3af8df85239fc9c885523e29a4bef73b9bd61d5f4a0f75719612b2f4370d5a6eb9e615a3243a8052a3ff7c2c42b5dff7b9

  • SSDEEP

    192:uwHpb5nmlnQjxn5Q/dnQieoNnjnQOkEnt77nQTbnRnQmSLxEGrYH5xHMBIqnYnQr:lQ/6kx3Ro10sI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b4f4c31edbcb977227bd840a0daa6cc_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92705296c1bdf10ccb7e704d284bf5f9

    SHA1

    b0e340b4db39b15b7a2dbd31f577fdf8980d08d0

    SHA256

    0cf3fdbe69a41d9c4be01e69924cd312ed90808f3fbba3947f85d4538ecd4d06

    SHA512

    53610fc9e3bbfae7eb4f701d80bb1e41b2f127731658082b2fc0e507f83c179c825c70d12dac6f2cc19ec49870471954681f119b907a343f9cab29a4da292d09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    560a39e9e3f677c4cb700a78f36937e0

    SHA1

    b22b9e2e6816d32c0dec1c48d26fec228a029809

    SHA256

    0fd6efd7b5fe5bc871ba8489e4987ccb069da2f0868a67ec8934eac238218f3c

    SHA512

    129dea5736e5295526358cfa2291aedf5acce1d340a725e75656109907ac7210e4a8cfd7c4c17bb0c004c7cd2c652a54d86660c9931ee73df9bbb6a95e4a9b7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f496372cc289b60916a4278aa7dbd48e

    SHA1

    4f04a3b402fa51116a5edb6db8a164c45281de1b

    SHA256

    ea063a58be0ea86b0dd1f4590475c9de7bacabc5be67e6d3364d869110d61112

    SHA512

    8df1821f86653bf2b8c6b51e81db853fed9715fa4522330abfb701a2aeb7a794caaf7f461a50ba1633e5fb06923a7aede65080db32323091c13423a1cee65403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2623e6dd6b10fcbaf848ecc7c091f32b

    SHA1

    6ae3ebea66bbee3b1128da8582443a047ac10c01

    SHA256

    824c69a976796cf62e32cde98432416e48f6369bfed09bd7baa5ee3b0909b53e

    SHA512

    ab3c89090b206c768e112bee28f2c06bf6f56eb2badbbc416be14d28f0723c175881a00e499b66c571f8c514ba7f95a64e29f41971fbc649651bd16e9a0686b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29e5fb75a2c0310190893a3e15aff5fd

    SHA1

    f0f2d92d9440af1c595006032d6a95ee02c429a4

    SHA256

    727552d2f9c2668e581ad2c69c37cfe2cdaf94df1d540834200b6f27b5e13375

    SHA512

    aa437c635bc6c6af05d4b1c5cb940863bb923f57e6011e004062c0a015f68f209d71e7f667a6c0694e60b64b292303a5c051ee7fca3fe949522dffd9d261330d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3717c6be8f03039d6181046db709dca6

    SHA1

    0dcbde2712a927dbd78378188482426398acada6

    SHA256

    dc82705a505611d4d33fc17a47cfacc5a6efbe28e193d5c4dc770de5a44ba3a1

    SHA512

    36f5441ed50aea1489aefeba79c001526e1e349debb09b1160a5f68476e3289e4b04395c98b01eb2c45ca0c2b0d1812d18565867aa4f749366b889fdba1edc72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    093722b6c29ed7b9de65d11ebee52c8c

    SHA1

    f84efe970e2e923bd85e26d545fe6710abc177a4

    SHA256

    ed0d5346ebb5696e3a2c8402fc45408999538982b68acad3963e0528d48c5fc8

    SHA512

    33fce2a0edf534f0cc1867e00453c85d44906e869c1c83c6fb7f3ae4a95a6a4607766a379c67ca8039219d97c043a00383374e8bf9add878cf9c2959200d602b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb66d5e4059e9181911080816a06b36a

    SHA1

    b74db009733bd279bbf8fb87ed2e86a421968c71

    SHA256

    264077b2a85c90d055ff0df2c44de0dc5038145dd751c46b55222e646716486c

    SHA512

    c08567e764197338a6633fcc462c79e31d8a4bbb82cd41c0edb66770c68f6297390f26d52f5c9ce56bd354f09702123c42cc16c5078767cdb71282c0ad282ba9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    056e4465733dc3b4038b73adb26c1393

    SHA1

    5f5deca763539d396e17f1623795cbbcb71eff49

    SHA256

    ee223df3081b36208c7997679348d54313a71f9b3919c11aa94661184e964e52

    SHA512

    3e8447489b46593f47e8a47ef6619fa467c90b50caa13b88319a9d0f3abb8e3142194d48235ef2c5d7c13e42fbf4b104facbe7be72522d757e026b4025898d8d

  • C:\Users\Admin\AppData\Local\Temp\CabB76.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CabC64.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC78.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b