Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 08:37

General

  • Target

    943047a643d0b27a6f181471de2d35d0_JaffaCakes118.html

  • Size

    16KB

  • MD5

    943047a643d0b27a6f181471de2d35d0

  • SHA1

    afa6d6e177243170ed964369f3795fcfb4973b7a

  • SHA256

    c56295b785ecb8085d69352564dc21887971dcf56e4a6022f74a3524d7756867

  • SHA512

    10417dd8efcccbaf84d460ce5b05594d6f520aa648bb988cab885b0602e72c68d765c3a0ffd163b025fb0ef870352703499eba8e39deb16aaf5be44896e4e9bd

  • SSDEEP

    384:X28H4dG3/i123OJ+HSBUSq9HI0/e2BMKDJ+lP0Du3BCa3bS9ja:Z4dP639o022CVb353eQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\943047a643d0b27a6f181471de2d35d0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf1f8cc2d709de0fba654b02accc7872

    SHA1

    a4087cb3a33311a73728ab18e96ac765ac9fa0db

    SHA256

    8e72f736d9f6974864828748cb5ada005d1aa05c184407dc2dce89f5f9eab70c

    SHA512

    e1742fe087d61f5ce14015ae7f7e1b80eea67acdf75bdc0d9ab44c802d875696f031d40325fce7530a7ff418cdaeefbf64d86b90e3726606c4af95e74796dc4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dce09feb9c583d25efc49e1315a0f320

    SHA1

    339d09fc53b12c3334e11ccbfa77850df9bed11e

    SHA256

    226ac202df37b1da818a85054c0fc487bfb4e6c64c1dcef07ac14c2790fc2ba3

    SHA512

    f44bda07970ba2bffaed30c14b04b90b3877530d82d56caa1c4e2a3fe5f7b5c9650a0881a463e9744846409ecdb3dcfec0fd150721d53dd6afb0d7ced6f03343

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9db227b23e3eb5d0d83f5c086ea73509

    SHA1

    4c2122440ef4e4e3442529dc0314841d8cf2f461

    SHA256

    80a82f05bbe26b8e28313d5df17a22c7d6324abc40fa5d0b2cfe05ec8847406c

    SHA512

    023976af896054e0af29e3216c888e1927fd94578220a2845b19bfa97789a6d92753cc1ea3d52455468f85f82615dac89231646a6b37b8f8622f699754a86e32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69d4fb6fa4cdf922e937c1ea2acde019

    SHA1

    e3f45654ebb101d4477feac8f497e018c2114b31

    SHA256

    790f0e6b2dca792c76f90256c5d5a3c74a81bef8f29bb6e887f77f46bff14a04

    SHA512

    371836a889619f517043ce72ba75e46b39e952040b53c9de3a846e4e102c9d3ef8a36f549d0b1420c08b5c0b55e10edb57c40514f2c4434e696440d9291d6408

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7608b991409d1ec69a4e1f0d7c9fbf14

    SHA1

    fc96df1038de885e17b6eab5a96dba81b882c2e9

    SHA256

    b0f6a05ae283c650fcff4cae0ea6ca32bff0aea6a3021afcc0db49aad5e18cf5

    SHA512

    1bdc0c040fcace1d14928eb0cafcc7c623f70d5e5fe71cdf46d41729aa662dc4eab8ae008d0c3b8953f1cd5e27ece5a8ecc21678faa6b605d7fdd8861cc65171

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa8ca6acea78b7f9b7c4f55826ba4df5

    SHA1

    4c1a375a2712975677a87b20db857784ac9614da

    SHA256

    9f17adbe7cffc7283084e18d45c378cfdfa1adb02f367637d7be63dec5c5239a

    SHA512

    d2180b5b0657ba41b0db8cc635d1cd0c01c5baacb85b767531dc51885c2df8020614157ceb49b5d6deece23500687ef82249d14fda20581c2454c3b6af83ea5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae03324a8110537f1c378a451b573591

    SHA1

    1939026103640af623784bd97d24687ce9fcaeed

    SHA256

    b6310c277651b54956e176657a20042144c43a84725c11d44a69b3905a574b58

    SHA512

    573c0416a57821ba27b236fae5a230f1a64a0a3a383c904bdaffe66c8733430248a581824d9eaf23954fadbca1036d314d7cfebe70ed4beaa742ba050133001a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    835f9513d33f4ad7e4967376ec4f26cd

    SHA1

    64513c5df189ef26cf99ba745e9139e15d76ba8f

    SHA256

    a59e6ba6544229ac90d4f3437fe463832b336fab45a77c276fc6e286b1442e15

    SHA512

    8cc122e98c155890ec58dd6e07842467938a1d692c37d761bee8c126a10cbd294fa4ffb78740fbbc794877cbc450410be9cc8c16845a87ab2fef05cfd0c0d6b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33257aac587e92cdc18e31420c694e88

    SHA1

    80c23adb71078eb87872c81556aeab04b494c05b

    SHA256

    9a2edba81507c16ff39781d81542da6939fee9b24718e0fbd5a635bfb2070d18

    SHA512

    42648668e845f065f5979eb932bce644d067f36396e5c548233d5bbfb9a1f49c9c54d71eea99c1c73add044ee2c8349f6c8a5804324932a8c4a37d9293e375c5

  • C:\Users\Admin\AppData\Local\Temp\Cab1A27.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Cab1AB7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1ABB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b