Analysis

  • max time kernel
    148s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 14:20

General

  • Target

    95282a960a86f750f93273af507988df_JaffaCakes118.html

  • Size

    20KB

  • MD5

    95282a960a86f750f93273af507988df

  • SHA1

    f1ce1e2f62fc5476b2c0a1086c205dc08524ed5e

  • SHA256

    685293b6539ca7015c64228df4ca6a77db2ac840da64ced1287fd7dce65ccc0e

  • SHA512

    23d58ffb51d577e81d5ef4961fdcee9e40a96c969338caf2c10dca2260c2491ff6545e32246bdfe6ca604605150caa59055b815ac0ab6ade2c7653233953e465

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIF4hzUnjBhnp82qDB8:SIMd0I5nvHxsvnCxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95282a960a86f750f93273af507988df_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    36863c679974d478b632b2e89f9257cf

    SHA1

    be1848699e94b14be72c38c8884a688014073ff5

    SHA256

    ab302591d79613f2c8df4c18a095577bc1d0d413957bd57ab88a9b1d7a4b3468

    SHA512

    ce6eb1c86fa350b18d2295b7f9ab13e0071d3f1505f366c76d237b6ce12f892d08a56de5be3e61e47d6c1123b0a01122d9a660ed9f54245a421c966cab65c204

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4ecfb479bd10f1344cebfa0a11357cc2

    SHA1

    19e834157d17533fe7a7e87d5bae16dc35fe09c8

    SHA256

    1df78d33e40dad99205dd7dca5f9c57c972f68a4b1e58956dc953010bf15ea71

    SHA512

    56c522999417caa110d2d596a571df5e863bd4a18b602d94b60e73ffff600a5fb6a2e2290b1304f820593cffbe83de0d9413523f7ae114a6d9a3a65ddc919ce8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6428d89b5d3e9b3f594376ce1dae0713

    SHA1

    29d17d45ebc5b46e3b19fb0c36d834ec136f91de

    SHA256

    e4aaae1f2448560f20109d0b0ecf6a26a3cda219a689aa81e8778200f39c4b03

    SHA512

    7791d7b75189846c49bb0281ee06f609c2d47ce4cc130be728e9f3dd579d5c981fed39e29617b8d7b9c1c3d65164e0070a8221a1a01d17f826578548339d1fba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9d2e002d6d45ebf5e766e451522f0f13

    SHA1

    291730449fb1e5e7aeebadbe4e8262aa2e73bec6

    SHA256

    0a93cecb74940b62064f4040daea63f3dbefb24183c2bcb3b3e7672b6d76269a

    SHA512

    72abada120f9cc88e7dbcfac9d3ec0294e8992a000eecdb2bf7d8e132ee02a36a59502041e7f32ae564065832a534492fa54b8f270e9aad48d14897695a589b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    11e000ebe9c5132f6b6ff122a26631ac

    SHA1

    d84c84d93735f40ddae7a47a4ad582904cc73c84

    SHA256

    8f3566f8240efbd8e21d2920d792e59788f04243624c0bcf2e280194dd44b2c5

    SHA512

    197bf6ed0c413c080ce89b120fe6b15150c762714a54b80f7943d5fadf85a36a878263a2a630abb8b0a4b84de14fa45c7bb3f7eb95273e4afb3c93917f1a2327

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7d9cd926ea90464ebba7e87fd0e59aae

    SHA1

    f8a8a31e8c12d1b584c14938deee6dde1c301679

    SHA256

    5a3b50a02cce31bebacda68b69c56fc070815e1040f19a71e69a8819c5e17c4e

    SHA512

    75e22748cfa7a888b1e2e85bef3b86279e30c62ac243e9163a9eb96e95a202931c9d00aeed1638b70da81829e328bc8cf528cc6b9d516ddb18c657b69b6d5f82

  • C:\Users\Admin\AppData\Local\Temp\CabB0A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarC88.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b