Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 12:05

General

  • Target

    91b88acbc78fe03742ef096d76be10a7_JaffaCakes118.html

  • Size

    23KB

  • MD5

    91b88acbc78fe03742ef096d76be10a7

  • SHA1

    bdf0eba770e53fe43a2a5abbe6a63ec2a88c8815

  • SHA256

    8fb86fcc8b1b2b0104b3b59b6b0f5070c11321d0752a04009bc81545da06cad1

  • SHA512

    76dadab270ea6836a7f510f625b6210ef41db259a42eeaf9b03497f6f949ccc8c1ea632a49ce8c3e16de789867f0f9679c868ab04485ca744a86fffb068ae28d

  • SSDEEP

    192:uwvlb5nQGnQjxn5Q/XnQie+NnvnQOkEnt9lnQTbnJnQKdjMvMBeqnYnQ7tniYgn/:IQ/e3ID

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91b88acbc78fe03742ef096d76be10a7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5058a66c1d9bdea1b59d93882a5f89f6

    SHA1

    dab17e27c6614e43d7ac960d67569591be26574f

    SHA256

    8fae4369bfa892c68b64636b8e18128efe60f80f69098dc3858d224e27bb9e06

    SHA512

    378992de55e17a0bbb23d219d55513712ef3dea9bfdbe64918a5abab8ba988027e1d94e2d8b2b73ccc58b882c6da0c5df29399403cb0ad1b9c51edb36b91e42b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a406368103a29959b6626d726273476

    SHA1

    b1670d7f3ae42cf122c6fc6a42bbcf841ac11131

    SHA256

    985f6bc6e1428da37c655a59af9d5349ab8190ec32689b02b9b54fceb5166a55

    SHA512

    b5be60da07699bedc8d8cf566fbc66d06310e148c890685b0f1c3625a50de88a298051f8e9f66faf3de45b8698a768e75dfde771943035161fca010daa5e1808

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    655037b8d3f0fe2e3cc8be4df6eae49c

    SHA1

    e67234f35fcff145b0e009679e65e1b875c0deb2

    SHA256

    793c98fbeaa6115b592f8661b8338846edbce62350f0c15a00efd11a3a587afa

    SHA512

    43b55da58a8f6a4cd070bdbd6e59215ed4399e585a336620b639ca4f108785155f111dafa7737ffe60d2a5aa351f7463fc58f0642fcda1bda10c3e103e77d8bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eab18b5869701b2e4d635b4bd27d3a9

    SHA1

    bb7a9ae8202b653e109c42ada1fb143329e4800b

    SHA256

    aafbf72f17ed39857cd1db8725d1f03683d79cae4df24737f72f330651aa25ce

    SHA512

    bd95d3cda212b2f5a3637729176ab5abba749696887e7980c8b4b514959b2d74e730eefe0eddd4ce72dd79d59f36b08c508342f00f3a8604b2cb3d34ca7c9ec7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf158a3d9818b427a9770e6de5aa5eaf

    SHA1

    73c929c293ea014fc2fea0edfac953f25c9743d3

    SHA256

    2e70c6846aa9db5ae991ccf80ac98061b660f664a09a5f5fbcd583fe4eafc56c

    SHA512

    bff6bc72dff3931293557d754803288da5c06e6ffbfa9aa42901dcf6b168fe1dafa8cc7c4a167eed432266440578720f14f51869d5037ba860363de41eb7356c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bad1f1aec410f2f385e6b859a84c4bc

    SHA1

    caa03f4c7cfd8d1e7ece6ed2fd331cfd1a2819fd

    SHA256

    6f8773765871bd76bc3525628b24c8adc1edf9c19283438a441724d04334045c

    SHA512

    303223f2782193849e0861af6af6fcad9174dd0606c5aba43997d19e0222c16d892a302041929b9aa6f023ce666beabf71eca4f6ca00a8331083ddb0b08501b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e93a81468b8dc4dc179c0652d583e22

    SHA1

    42c0dab4dd199cc8c472b4471654cf946ec7e6dc

    SHA256

    061a388e56565c72f45e66c57fde32f2c8f4aaf1c10ab9f7b9716c88570d2400

    SHA512

    191af94cd4136670dd9fd72bba05e8be3ec544e8a9f5c1f50f0057cfae8a4154b58c267a0291648663d2e1f50b129480d92609309b76fa30440508286adb03e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4614169221277d7c915f0ebb0c09d4e7

    SHA1

    dcdfbc4a3bcc915a9e0a9b443c6db6e6041dbaf7

    SHA256

    9fa6d72170195bb55f879536e136a9c6d21fd7f09cfd7b68fd9404d251ed70d5

    SHA512

    4723ba1fd06af36e7549c9e44ef308de30c8db6e58c96fb301e568bf5ae5fb30944c76c582c94490a111da9c6facdd12492a6b3152da9f267baef71b7f11fb00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45106cbcda16b3b7c257039fa0045011

    SHA1

    2fe963de157e80f59e68d79eea772bca71dff26e

    SHA256

    b6d791f47bd8527e42d847a6d62bad3664b2a35662ee7f9e962fa61bdd747feb

    SHA512

    b29ebed39d13c1733a076a011cfd03d85ff4132d7bc621d688dbc6e2cd80216837116597b8b42e368d7bd6561f2ffb8e5863aa8ee3cdae20c4b33448d27f8c86

  • C:\Users\Admin\AppData\Local\Temp\Cab2195.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar22A7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b