Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 07:11

General

  • Target

    93f7d83d187803667399dbfe1861db41_JaffaCakes118.html

  • Size

    23KB

  • MD5

    93f7d83d187803667399dbfe1861db41

  • SHA1

    d0d57df4dbb563e1c131fa2172cde4cb6bdbea11

  • SHA256

    18e9f4c13154d8d8a05261134cae7d191807cd9ca588daa1e7b8e7fd16a1a117

  • SHA512

    5ee1956fae773ea91935cf615122384ab210d56b3f7fe4d5f8cfbc339ab1256c4753cfd594b09a202f06d10fdb45e3946d154209cbdd76b9da085b9b9690b223

  • SSDEEP

    192:uwXfTGMt59+eYb5n8S73rzONnG4fuCgnQjxn5Q/HnQieqrNnjyinQOkEnthp7nQ/:fQ/jGFEiX

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\93f7d83d187803667399dbfe1861db41_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9312a317246dd10c05c52eaf5f7991c

    SHA1

    c7bf3af477bacbf03fd0feab347c790a1b55041c

    SHA256

    a78c27dcd79f0a24d689bb05329e2eb8867f7a000bf263bf539bfb0bf031bd64

    SHA512

    2a97db2d9d8fdd533d1ef56e3d41e21c54b137a2b4629784d484a9b9ca6084ceabd35f3945e429d6cf359409f0fe0ec41061dc212204b065e12d372bca60346e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69be33985487a7ab9ac28c0941ef23b6

    SHA1

    38c4d3a22d7cfeaa0c55e37fe24cc6fd863ad438

    SHA256

    1c579c5a1e5e54ff5adcdf7ee4f1a1a717b8e3f2881735b8f417e2e8b303d2fe

    SHA512

    4d7fb6d8b76d39e36bae3a4fb744d60a70f58dafda02ce02333ec06cabc145ab06a05b28c02b47ff29934600cdf472e4c07f47ee6ff35ebc57c085baf0867485

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7b49b92f99a372ef7365aadf5f8d4a4

    SHA1

    a10f40cfc2eb0f0e93e6d0ae6c1e520af37a66fc

    SHA256

    37527f262b5b0f3d7a4db838c4374f32bea313ba461a8fb1e8af024962c6d6a2

    SHA512

    0b252c48e9bd119f6b815759164c7cf1dfafc44cc92f914d911e856a74a8db5fa0d6b4a5ae61a17f091ed60b4a978a09ed60428a1036bb0dfad33944f5e5d014

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c30542c4376aa70329f765b98251cf3

    SHA1

    3ad04fc3a6a71368e7efbe31d7c7154092fc8605

    SHA256

    92c18104d0bf4184d93052622a87469007e3bfcc2dd0b24531c3bfd8dae7ce00

    SHA512

    2d264e4d396f5b747b7f2b66f1838345ee5a13d56634f38e582ec5e792ea13a9d2df092818fd611ec9e670cbba6ae9cd5efb0798b9b6298e1aee702a7c8197c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe068d618a3311908f077a44ee10b43f

    SHA1

    413322bd31e836a29a30da90f02c73f13db3692f

    SHA256

    d2673d996f38612baa8be419525a2bb17b417fa54c751620f153a2bf1f3c0f65

    SHA512

    d0fd5cf56cd775925fd6f88f42b2b2a3813939f38b2cf1849e413bc5b5296d8f6a41e837d266d3c3eacab944551319e74dcdb98b5d3642ac41d25cf90c33b44e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbb7cba6eb4b9e6328b6bddd85ac01aa

    SHA1

    dcdc7adb73b0195391811a055f6197c4a431f8a3

    SHA256

    bb084823378232b39bae121739a219eca0fbc80df394c1482a0df49dc37f0026

    SHA512

    913b645817d759e1b3686219e8317e0b8bedfb32edfa005e543147087c0ce2c34e77457aa5b4c8bc996e7a8e474dcb12aa0949bd85067ce5b47de7c21d762bcb

  • C:\Users\Admin\AppData\Local\Temp\Cab8B9F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8C9F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b