Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 01:59

General

  • Target

    9031b5fe0e0012f5dcf95f7d866b4138_JaffaCakes118.html

  • Size

    27KB

  • MD5

    9031b5fe0e0012f5dcf95f7d866b4138

  • SHA1

    361751fee5d1cc48612e578bd39938cc90f1f014

  • SHA256

    3a5674cb91003f31d6a046fafe0ba4f164ed9637d7261916a706ac8abc48d024

  • SHA512

    5b63e441194b87f2cfd3ccffd15032b6e5b04c44781481c39d96f1abdbe2dc669583a1bcfda5fbaa223084071ac6c6c5ef10db0d522de7f1067bfdf58d5805c4

  • SSDEEP

    192:uwzIb5nICnQjxn5Q//nQieONnYnQOkEntRNnQTbnFnQ9ecym609S4Ql7MBuqnYnx:tQ/MhaWSLS0Pj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9031b5fe0e0012f5dcf95f7d866b4138_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c2f5090f7d20fbb494e8cb930a789f9e

    SHA1

    91c9daebea5a4e8348d10a19495d49bc06cabb24

    SHA256

    33e7bf744e909356374f5f09c3cd3ebb0f1a7b7cf5ca68f1a2958fa80eacdd87

    SHA512

    7e76f76c9e550cbc01ac1db53b41611fa41d202b5b9fd61d6fd6db15bc32c0437050d10dbbbf4c0c80c8510de1492f3fd26bca86306c0c91160452677c95e8ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    491b78ba52d1b41827f7ef6401aecb3b

    SHA1

    cfa3f0f2d1e64a71db055ed0c78307560146f5f7

    SHA256

    e0f02ae0d879cc4f1a6fff01975e88637fc22d8eb3bd65912810f0ad979ac296

    SHA512

    47a55efbb9b54d85f315655fc8f0e06ad4a1c4926b412ee2d950d66277373af1e0b021beb454781a1d24d071d2823a2376664bacd6e3a7b0b2982ce261f55959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c5b09736dbf9f986aec358f0c3c7602e

    SHA1

    17396aa2c06763d65fa8671bf0e6189264b673c9

    SHA256

    a0a9a273c5e23a7c5d3669cf98785fed399c10fb977277c144035064a8a4dcbf

    SHA512

    2c1c65a7c6297d4398edaafd6b02082dd2f30b2a5a80bd8faa54e86c052b598f69203131292f8a83ab3ed467177a262eb5587193296d92218d56f075aa193036

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b216e7e6a2fd28fe21326935b38b1aa4

    SHA1

    7ec8141d55eb5872e298c63a06050bedf4cdf8a5

    SHA256

    ab8d3871be3ace3e2279d1eeaefb943c5e144f7956d9f4ecc9559091cd819724

    SHA512

    731d13541968dc7e736d2f31db2681cb05c3469b2a8482f42797c8c6f4240c12b0ad3dad5ddf9648641ea7e4d8e11dbff6cd4133c8336ed29335df31bdfa9d7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    92906eb2a958922975c884cdad1ac42e

    SHA1

    fab012bea65f0c4af7584449f856bbc2f3ac8f8d

    SHA256

    b725d4bb790e040136dcf490dfc8d04c5b33334d6e7e61f087a8ed2b121baa28

    SHA512

    828ce763f55f29d05c25b84b03bfd28dacb1b8f04b1da27def36f640361a6123a2c0d00123552b5ed7c36dc60b33747c35867e30a6bcd8674381b1522cb1c67a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    233a54d353d59ed9e289203e98dc0b2e

    SHA1

    e0e9bc1e0c5c29c71b6af83be1112141e7dd9f6e

    SHA256

    ff6f3eee2db94000fdfd56adeb746c75a0c5f2e03b718970d8a27fcbb8303248

    SHA512

    69cd89127cc7d9083c7212937fde2e0a23f8a3e9981c1e2c383232e7adfc2918b753db8e48e76bb67dfd788a7ca371b47c054d5bec23a6e0a12540d4b643e954

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ce8217e58067b3087431694424e42867

    SHA1

    1e818e8b632f0049720e72518076934e68420dea

    SHA256

    9486b8b2bea1c1a71226f31b65a1375a0e8728e90d90a750fcfc1e99419586a7

    SHA512

    6f2df9d6eb8bdf89c29f5de87aeb3470055a7d65ae3ed49ef6c85f8be543f5ea10d11b98104f8e4d6bd687b9438cf172911ce60fb68d4cce8590c377c6ff2a03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bdd5de03f913d8c3aa9f651d88d2d96b

    SHA1

    18445d23bc45407274fa6001c412ea7d5f36d6c4

    SHA256

    21b8591872b986cdc75b4b176de824250e21f805d46577e65d74f5cce39fa26f

    SHA512

    58ce51ebc55a0240a478b3075ef81f060764964e008e38950dfb059aa9a52fbc75f377db09829b4f8cdbe5e899eb7346ee5a9b8f789ac8c72ff86abbe9f841c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f317a39ce79a888a6d267a1a01d44f78

    SHA1

    efacedb8d20532654c2b00841e37c0d34c30c89e

    SHA256

    d59109f3e36352d64e96a43b56db99f7593f9c1cb625af156bfca8d381c9a6e5

    SHA512

    5a6fc29fecac62a6b011e593072bcf7aadee873f30a7c846d5da25f7320090c39eeefc25f805c3a9dc4b07820b8d02811c7460a3a1155c6dfd865f63dd884868

  • C:\Users\Admin\AppData\Local\Temp\Cab3822.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar38A6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b