Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 20:04

General

  • Target

    8b9d4a4d38a2a3297f55dd80cf3f2977_JaffaCakes118.html

  • Size

    23KB

  • MD5

    8b9d4a4d38a2a3297f55dd80cf3f2977

  • SHA1

    15f98386acbd40f27db824fa7290ab88d01210a8

  • SHA256

    bafaf326255606077a775f28eedd94fd5467252b68b2fc634cff76669c50c926

  • SHA512

    d10e0a1568e675fba3e32de552f36ae5dff49d27c41364d98216b32d4450703a6de6d9027c5ce35c38bb7ba3b51c7459c756d2250c5adf32e7344a321fb43ed3

  • SSDEEP

    192:uWHIb5n38dEnQjxn5Q/FNnQieaNn2c08nQOkEntBRnQTbnJnQQCnQtwwMB6qnYn+:rQ/FOc04BR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b9d4a4d38a2a3297f55dd80cf3f2977_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8653abb7fedbb6afdede905e072b4965

          SHA1

          72a88a6a4e221e7e41435fc1acb1d9652d2e1db3

          SHA256

          05549f9ff0cce581eb02778ac4aaf989f7a09fa9c9b44f5ef747071a7b9e98e7

          SHA512

          0deb7c1e268a36d803a1be746d0c603c61da3761e5696da185594706d64b45e7b6c2411acd725794e0c69f9be93a5ed9ad39ece8849a960117f6eda161f6fb18

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2084ae866191e7923cd7616976884aa5

          SHA1

          fab154dc96cfbdbf6758140e0b630081b42f75fe

          SHA256

          ce967997f0c7b3adc818197562e18769b9031cf81aa2b8bc18cc8a0785abd88f

          SHA512

          8831be290b1d3624375ff7163845c183dcb0055ee68274f672b4fe82fcc813216f7b7ed7ab14d7b953e33f4ea9801aa116fec2ab1ab147dac8a94793b6cbe028

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2625d75e1f2b7c34b3b6ad0d6e9798d5

          SHA1

          c9e662064728fe152e2ad05162540d51918cf66f

          SHA256

          06f97c00dd162aa6053bcc4690c9dc2b8ebe30e1c95b6f4a7a694711adc0241a

          SHA512

          313b26687145acf49b0dc747169d5917f3f03844ebacb37b2280603b63e73f80379b3c99b63a90938d97809b06e793f5947b40c1b3a3613d9537a55c28205323

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6c084ffb2c8a397416319c929ce55b10

          SHA1

          0fe1e5eb1f909a63bcccc8c6cd4b1d675ecbfe49

          SHA256

          771b6a9df29672a48114e9fc03754582a64021ac5c86e590b2dbd12255275729

          SHA512

          0885e595ae69209259814212764d146d288f7f463c6534abd424abbd8985fec8d0dca32e8ca9924a9a52cd861c177b1a664b3d7e7edd2b39016e0892d974f144

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dfc57116454df39a44886e6a548c45c6

          SHA1

          773e2ec102212dd082aa760cc79172f229378b79

          SHA256

          7b69992f523a925fa605a149821c946b29f93b89c540500c36424e4c1931d234

          SHA512

          2fe8465bac9b1980f134efa97c68aa1597ba4002ad0d63b0c42de17a0d6b511dad303609adc06f60369ac3dc8adbc1968d0864204d22a783a2ab1bb70c1fc267

        • C:\Users\Admin\AppData\Local\Temp\Cab166E.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar2018.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b