Analysis

  • max time kernel
    132s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 20:22

General

  • Target

    962312094298627e40fe043878ac77ab_JaffaCakes118.html

  • Size

    23KB

  • MD5

    962312094298627e40fe043878ac77ab

  • SHA1

    13c638d5bf8cdacced0715dd0c3d29c369bdd875

  • SHA256

    08bac1c2d938b8404d21b89b729bd757a41d371801f99469f95c7db1e832c3f9

  • SHA512

    4c900810ffaa98f3a9a4038db6d82a77e8fa135bd02bd29fb938e03e78bdcf289fb2e75a628de432e6f5c5dde6a4ca356ab44a93be22fe6c8fd9f2c0ce69ddbf

  • SSDEEP

    192:uWLwb5nKlsKnQjxn5Q/InQie7Nn7nQOkEntUOnQTbnJnQ9CnQtTwMBbqnYnQ7tnM:mQ/xD

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\962312094298627e40fe043878ac77ab_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2316

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a37c0499cbf01028dbfed000e5f076f3

          SHA1

          6fae3a0604ebd78edf96aa8c998b51ee08503c91

          SHA256

          ee4f7da161470aedad55077f0f54adaeeafeac2bad222080712f90859257a2ff

          SHA512

          4727d3add06b15cdfd5fd4b2413da13a9acd76da16c0f4ec5f241c96a1d68389c3dc2449800c7382ac92fedc4853aff5b98ea10517c7ade4ca0a6e7143a988d0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5d363bfee0b721cd95225b118c86bd10

          SHA1

          5d7af5585a6c6951dec7f798f0bd6b329d2506df

          SHA256

          f1ef1ae132c86b0ec4bdb3ceb45814609843e1285cd0b8feeae4f76fd43a951e

          SHA512

          827bd6a45743393c4e0e89a36d1d47fee507b20b2e81236be31dc810b9f10e8b1b910334ada441f494fab34c33a131aca31c409be186a4a0f08b54b3792d3347

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a4a5916c96488050c99fa8e6f9c3d7f6

          SHA1

          275ae390a71aa7f0059512029b845debe6439497

          SHA256

          2616ca6681e423f040b61dafd460907d6f6d446658a5f2d02e4e03cbce50fd10

          SHA512

          1196e95657f756375917563e2a68a5c9f9db8c5a839bb60ff23e8020f31550bc3efd7811d6b09dd53c0e1bf034f40ebce08ffb495df04faf35e2528abdae44b5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1c8a5aa8ea7b725084ec4c376b5d5dd7

          SHA1

          cece8347a397d8cf3ead1d7bb4c78e404fad6c51

          SHA256

          96bcfd659ccf65b6720007354564ce0dd789c37ced812d578ce2c2e6613f0ae8

          SHA512

          f477f1ab3e6fa9fa0a98c8a1b784885880001651fff4e9b87c8703bf18a5779c7ee0d8d5c6e7d35011564fb830108502ed8b256a6c61a8dd88ad80fc7fa7ef33

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          477454559ee003ab204fa1031f07b8c0

          SHA1

          05ed1f4c4dbef4f57fd396b476ca8fdb2beeacaf

          SHA256

          ddb9d7ad57ce9c7c3749efba058cdccc6e4c4821c905b2a72d128b39b3d2eaa6

          SHA512

          758b25ce2709ba2504dc0d71adc17afca397b48e85698f13c0a64f2b705c2a82880d33e154654944ec17242f0a27322d1f0aef93570bde4ab99fff1f8366544d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0cb9841a909350954e6137defd9dc968

          SHA1

          0106a193f5f3fd96db139f2ee34bd4349b9a9410

          SHA256

          f4a6ac00c29b8602241d192ffbb5e0a80a47f0a8575c2135b685a60a6e7c66e6

          SHA512

          aead357e52c2949a72073af9dcaa00cf30825f9d9339e837ab9d110a1b3490957e7c774d20b614d7574b9d6b5e8869fcf8456cf7c7f7f409e57083ca55d20788

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          258cf431d3356b01cec3d823f99212ce

          SHA1

          25825fb41da1041a544a4a0f2fcc4dca4a1b181f

          SHA256

          4c177f557c00e44abbd7ab0926e95b912ae62ccefb209ffb40ae26f358b70563

          SHA512

          6f50629cd061fb28ae5745b2811c6a62d4c33ceddefa254342dbb2b3a9b0bc392551921ace526b5a6c0ea00367c3d3d45c98f0cc9dfe20becfbb1fbfdf77a7d7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          341ed5eeee817b053c4c7256f815e014

          SHA1

          704b871750f7599be541b73082c19d3e12fb987a

          SHA256

          ba9cda27464692a41f70de8c0bd673ba26401d49c7a1f82f990211ef35daa693

          SHA512

          c64212cbcfbd104874cf3ef31f4c9dc3608645a225f1e9376cd4d16dbc8d90f93d0b4329a15a2af8c260295cadbafdb3fc164545daafcb4f9c582ba8dba7c88c

        • C:\Users\Admin\AppData\Local\Temp\CabA8DE.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\CabA9EA.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarAA5C.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b