Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 05:01

General

  • Target

    8cf58f3106b247a65e71379ba978751a_JaffaCakes118.html

  • Size

    19KB

  • MD5

    8cf58f3106b247a65e71379ba978751a

  • SHA1

    a1671fea5f1624213adefe695d31ab1e7a549e82

  • SHA256

    7699e5fd5bd275b55532abcaf175bc3bee4ff0b22d08548459aa74453214ba53

  • SHA512

    1f1624ff9287bafc56f63388a34dc5c8298fdb7c1aeaf29b9cf5d2e99d0268b68984af24d3a033b98ef378bbf6ccbf223e5b918e59fd51ea4846b5af803388e0

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIL4ZzUnjBhbN82qDB8:SIMd0I5nvHFsvb2xDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cf58f3106b247a65e71379ba978751a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02b90ea178727220466b8557e8030a96

    SHA1

    71310ebead6af73a412355e70c55e3d6a2e755d8

    SHA256

    ea0c34b1c0b5a643b737312670771078603c142f5c1b71943ad7a237f6c080ba

    SHA512

    babd1717d1950eb7d5fc8f96119f9eaafe4cc8ed470d0d3a2bec08d502a92db6b07effbdca2e30f4cbbf75f6ef18df33116ba91fe041cc3a4bffee82ffcb2035

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6fe32bc2abd37dcd0f0a9ef102412f4

    SHA1

    cf60582ffdbaf00ee22b29d927eddad4a90fa783

    SHA256

    4c689e926118571408656acb42599f53c356670300fbcc97b1a0e729ff222cc1

    SHA512

    a7139a408f70b8dab540e925aac3862e24a2bdf978921c7ca01d10104069ecafaf2c505d1bf0328c9d6606dec458c4ede792184dce23eadeb7561651774b6217

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e761f41e5642fe34835f648b825506b9

    SHA1

    3ee5620268483fe6293edb00c0ae837705a5085c

    SHA256

    a2c23ace7177b649bc3880a10a142d2b2e6187e52883443dae25b84f7b792385

    SHA512

    ccac8ed30dcda6301b255b2082a6f3d0f8ccc50b1de63091510d670d1473488074331ac3fd04de6192fd4677aed6dc499b6adf592443ff7ba80766acf3ffb1de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5caef1554cd93262a57635d5c8f6e42

    SHA1

    042365f26f1c5629ef240cfef4f41f7562aed02b

    SHA256

    0de05be9c1a411696c395e957d03ae709ad3378bab92c5c4b7294c167e2a65da

    SHA512

    f71962f99d82351cb9aba9ee9da0f9590a3dd2d398f478a10ea8f7062de3cc55f5582aef05508fbf534859d06ffba4a9b59f986bcdc0955f646af1b8837b9bc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28bf519c63bf3615aa8843a2019c9c14

    SHA1

    d4108b7ed925e2364af6c1845b3f9be77dc0b552

    SHA256

    7e77be56d1baf2e0d226cc48b4a8415f36da53dce2792dba64c2f1c1277feb95

    SHA512

    c3691da11296e460e9a0dd17ee451c731853020ed41b47cd114cbcdf6c9c66868476d9d0807b0891f3e5db2bff054d606b9ab8fef4f4b81db13bd74423dd2026

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63252cf4d7f025ef30b307f99031982f

    SHA1

    44c40f1e3184721f3df56b8f6ef3886f85177c98

    SHA256

    be7cd8331ce9dcfc7c8a10727bca790bf5a0ac25afc44e815f6c76248f299b83

    SHA512

    21b2cc521742499101ffe58dee3cc0d870f0a68c4501dea0c66cdda1d940669ebafc0a9c05f7ca7461a0b8b0fc854d717667c0ffe2c5bee1092b6fa40d7b4c9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f41975b51f6629cee2b1e4710621d2d

    SHA1

    e88ef9cbdb4b226276d273c66dd34e6b445d8e11

    SHA256

    92dd6d0dbae0e1afb9e74c35b0b03cf36bf89e3a88ee1323dfcc255e3dd2ca45

    SHA512

    2547de2901b8db0928b03dd99e57e834c45bfe3432c5ec094bdb78153df320c7b00ff0a241f0400eceacaad277b13cdf6652be84ea3c931a3f4e79d42229f095

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb60ffafbf52fa785cd546785164927c

    SHA1

    0b87c42f84f687c232cae0f777df05f5b2399040

    SHA256

    faa9ebb345cf5f72893d18f5e4066bf0d3169e6ed9a3f982d4f57219fd32e03c

    SHA512

    e758876f2016113b30d357822f2816f9c5f4c86433ad2cd49944b326ff21a5ebd1e3bcbc81f2df35773ec3240dbcd72302c5164103449cb883509c58eecf0b40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88ff4b5711605de81002f369b64b6a8e

    SHA1

    652cab3bd4da97df03db55dd7088f76628978a23

    SHA256

    3b51078d04039e7a7a855c5d454138eb7f8454aa5c8211a3502e194fa2f0acd7

    SHA512

    c2af0ac720f355a928b664496a40a90f1e0d85481c3e6d9b7ecb62b95de9905bd32ef69837af67a37b4012dcd84591e8eee2747abb99cb33cb674fbffac4103f

  • C:\Users\Admin\AppData\Local\Temp\CabA8D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB5F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b