Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 02:38

General

  • Target

    97053ba091f1ed71bd24bc18f4015f03_JaffaCakes118.html

  • Size

    43KB

  • MD5

    97053ba091f1ed71bd24bc18f4015f03

  • SHA1

    46851f45840396f5c0ef222eca5024a7d4216d2f

  • SHA256

    484c788d88cf5b66a1a22953c135323707d1624498a94dec1e3a3cd5c6aacec4

  • SHA512

    337774f17dfe451c54f4617e175593532334ac5ee430909087b1927576344b5bd492a1bd9b484b527ba1d602b6661e765a8b0d0bb7373b13de52289308ebcc60

  • SSDEEP

    768:1I+vbG2+0MGi+vZGIikHhGRGXiOgOeGBGlGslstjFOs/wOenC:K+vt+0U+v5ikH/iOgOvFnYOR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97053ba091f1ed71bd24bc18f4015f03_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a2c954ca5e3251204667a52d40e8ceed

    SHA1

    0e402108095fbad38e12271e2c44423fe0e08c50

    SHA256

    f9a77799f76382dc261ff3a292c66f2591a65354d7b20f581dc0b7f50260cd02

    SHA512

    4c6ac3bfbf8536f8ba99c5c86cafe91cef130d6fdbc57f5104380da9f510b8bbb2c75b028208be35e41efbb4c7afa65d3bb2a3f3b091e2cf8e3267aa9dec5007

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1435761865ae631e950b7b04028a52e6

    SHA1

    6dc41fd2048a42a33cfd65c246dc78abd4c1ea69

    SHA256

    c3ee48b7a4a823ccc5ad76a1e037108eaa8e0aa3f5cfb4400558816562f5e52d

    SHA512

    f074525101594872825a10df16f899fe9ddbb295e5771aeebf0e910bd78e363f051218880d24da3db3765655f0d4b9374c8bd24aa24aec7b119b873fdd0fb1a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    393c73332cdcbca3e07d3474906fda82

    SHA1

    80358f2869c3b9eb86b42189b31d8bdeb87a3c5d

    SHA256

    dbf952268c04c446a0ef3b27c238bb2ee26e5bb7aa7716ed7be7b18d12ddede9

    SHA512

    adba4fa94a79e91f0eec28ceb7dea02bbc0954da79013411b35a8fb5e57eb8013450a6c3e2f403931c1e37ae544d6fe2bc1d3cb935dc60f4906a565b4240220c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    411ee124781b4dce083164e76f7ce858

    SHA1

    05966b5c2526c10b86fa1dba9c1a010edf44258d

    SHA256

    45804906ac72e6e7ebff670d7bc7bc3d68c7ab84ec2d11ab99ac0a59dc3fac04

    SHA512

    04e50426672cc0dab2e66a9a0cec3f9d6980c9613606b3544de95056fddd109c9b148301390db14321454aac392f05fb9cad64e178db9d5d4268cc90a3f4cfce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    77f6404bf509e56b390a3fc6cba27f90

    SHA1

    cd03b4d8d675b30ac576ac2eb2425d6521943b0c

    SHA256

    9e6e19dd7350028a468a0e6ea315f64ed883f6c3b4b15fa273e2c50c1ec8b25b

    SHA512

    390d9f48ffd387c871241264587229062eebb88ae435569a31bd08ce669fa1a0f85662180df98d8dc3a6afc388c5bb37e4dde91f83014dfc1d51344c99e0e88d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f68a6f1cc8855a135c1416cd0e47f250

    SHA1

    ab7206069404917bbddd5c3bd56c3cb096562bf0

    SHA256

    bece4b0a2dedac680a5f6e2271ece11cc26e8baa81b11c79a32218271dbc947c

    SHA512

    83b5cff0797ad8fcd29d827ee188f361fbfee3bd43c200ff6e37fd546fa95ecb7b865eab7edbf53f7dd65950801efe43cbdb9bad8e3a152ab0ee907b7b9772ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a8152a01f160fdf9468a170564f91504

    SHA1

    e78e443e374fb9ed6ffa022beba2c26196a82d03

    SHA256

    338bade89edc335d0b84d82b47ac2d7ea88674fa76d23b034cd6822d5e6e7697

    SHA512

    00eaa3fcd028ed0b43d2905303875a464b53d58e4069492e1774763934cc52ee8229f7352d4ed2d3a37dc3cc64c612eb159a061b705073d0e891396caa886961

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0c10deaa70c1c7395a13ab9b1c94a99a

    SHA1

    5e057ca5c82b76a090585c1f2aacc9d8708a0f84

    SHA256

    24e448b21d8b9327a29aeb946fdba96d5286e4fcd09da2c0ce2d3b047c9d279b

    SHA512

    ba4fbe7a603e68d7870b76ed80d50406ad81d4e9466129bfb9787ff8f3acc954fd941b2e0b85736ed2de668c5b915758c2e7e65603bee846d46a81b93116050d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a6c4e0169241d3f0e08f5d8d45603e5c

    SHA1

    1be8788b1c8e6eae59fc9ded02a6001f0e93900a

    SHA256

    ac15198828b9351a9c3a90544d24a1615738e27fb0e412a7fb8c10b8645d1fc7

    SHA512

    d8efd48c84a36a9f380192b79f3d8739051b4fc9c76b396dfd6d13950982eaf5c0d7584f92ea5e043783c7ae1fa18a4b6d85c448e9965c49f5ad22ec59bae7f8

  • C:\Users\Admin\AppData\Local\Temp\Cab15F2.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar18A8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b