Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 05:15

General

  • Target

    8d002791fff48246bcde64814d5e73de_JaffaCakes118.html

  • Size

    19KB

  • MD5

    8d002791fff48246bcde64814d5e73de

  • SHA1

    967185ee6660a7e605a255f01e0a4d2b34b33e65

  • SHA256

    7a328bbc0371727e078dd40f450c016f8dc2c2ffd6010dbf336484eeaf80922e

  • SHA512

    af7606bfd0a8ae723ee43873b04589bc066d75b466f105b164b4b98e6ea25c67f73c9732d1ece0cbcbf029d9d242b8786e4c48317bcab2887b9e62e7c45accc8

  • SSDEEP

    192:uwLab5n+d0IXW+nQjxn5Q/thnQieCNnonQOkEntntJnQTbnVnQmSgHMBiqnYnQ5z:0Q/Bq6N0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d002791fff48246bcde64814d5e73de_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    728fbb63380066183d4799e7e6d72d7f

    SHA1

    691f2f5ad0e6eafa9b4ed8f772e472e793eae7dc

    SHA256

    e90d37cd462e61e8408afa55e6733214bbd8ee6c6a78a88be19e3ee2cd548279

    SHA512

    bc734439e87beecaa9a8a007b9cd7cd03318feea6ecf276bf1af6b229b486d824d0b0587b61759a2f10461a21559e4d90bdbd25881f8b1410063841b6520de02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    990cd5d79d2635fceae4eac41c9d925c

    SHA1

    a25b05287b44ad3e576e5172e708bcc51f93a44a

    SHA256

    ca2cb7dcfa03499a2135f45905e82420347dadc807c796082ab39f5399ffb3b0

    SHA512

    dde6f272789bb1fa948973e11b60ae5dfd5d9122c2ca577539ca7bc29c495cfe72486088f53dbab7fe3847db6294de148257c078bd3fec7a7b070b377e176c8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    167a002de1fad896dde18d9dfe35e481

    SHA1

    57486f8149dd2cd2ed8601e695334ac56f5bf70b

    SHA256

    67a2c3bd545446269a361f4f8ce874cae618da13f5379fb13a18a22fe9693820

    SHA512

    9c1ea1410d5c1a204079064c04eb9ba776d786c2884dd6dabc77a97813b3499b97c53503cd6217dada0a0f5c815048712f762d24157ae9a995a7cf50c33b3f97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58644b4774e0e4652a3040c5c88836f4

    SHA1

    b35ba6c0cdee56304c8be2f55c5e6b2d2661dda0

    SHA256

    ef8dce720f08feb6d76f344fedceb00da60d6417699bf1d0599cffff9293727e

    SHA512

    97a88ce926514e7670277e13d3dad2737ec525e13f654ed98844ee1b34ec7dc874ac747ddb5d2c650d2e0f1c824244904eb4b4f3750cdf7cc924c2a2e1c49eae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9f33e0a9a68093c7881753acfcf6537

    SHA1

    5cafeda21dbd8c407268e8936e283d8b2cc556c7

    SHA256

    79891e6658ac0083106a0ce6caf7da6bb44e3d70bcbf61ee1c4874961ccb1bc5

    SHA512

    4c2b963cc06805247137b0e81abf47e4b0e2e6b9dbbc46b4303d3fdb81655300c51d6a6191c609aec6da25d386983d3c95f290f4d28e6f133c51cab52803077a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e82cfe170149818a65e42fc23dcab2bf

    SHA1

    58fe3543c6fd616bef75bd4f7008cefc151aae1a

    SHA256

    c37c0bd1067ec536eee487d0911097c5ebee5f18eccbe97ff835fc9fc7b38b40

    SHA512

    efbeccbae5e368633e3135f4e1a1d15015198d914b22e1a2ef244bfe3eba85189b2df16c76e5c812d20843b9c52232fb4a959d4c73c5d6f094bd3fc9f9ad2a2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98fc6c9e27cccb666bf538e5e7398b7b

    SHA1

    c48aec5a6ebe6a9f51a4d30957608820b909740c

    SHA256

    06690092994b99c264349eabcd870e305077a492d5b7facb91a4e058f318804f

    SHA512

    2810e4e1fa9d2f5da4627936166ddb4daf405866f4421d994d66ae21c11e201dd3042c44391bfe09cd562271326c9f2bbadcbf945b2c0dd4950ba2478b9fd40f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74881e07cfaa72477470be8cc95cd674

    SHA1

    4d865dbf8d7943c7d79cd60132a60a5f60a03c96

    SHA256

    a35448730fe432013b40b7511baf592f66300a8b95ab295abdfac03f40b8a8f8

    SHA512

    ae681181008819c624ba5b0494288dea1e2d18dcd0f92eb1524a08122b96e4896946116b1e6288e75ddf19345afe0b720a2a74073497f5655fa20168d4aeae59

  • C:\Users\Admin\AppData\Local\Temp\Cab1FA3.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2094.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b