Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 11:08

General

  • Target

    97f5c12a3cdabd6d2ec45836793d0a1e_JaffaCakes118.html

  • Size

    26KB

  • MD5

    97f5c12a3cdabd6d2ec45836793d0a1e

  • SHA1

    ab3726a45bd293da79eabae9851e75149f5deb48

  • SHA256

    9236009fb8aadb6773850c8d07ab41312b47bd5113ff30a409de75cafef10966

  • SHA512

    793dc2b49c0c1ad11d5e91513c99ec702e0307d66fb2d7639150de40c80dbc0e276abf365c93b799f4d9a256d2c520d61d7cd3b6385c70b24600e043899619f5

  • SSDEEP

    192:uqLfnrb5nZunQjxn5Q/4nQie7Nn+nQOkEntYunQTbnZnQPCJVevo7NtCFo+NzQ4O:nfQ/mygcdNl/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97f5c12a3cdabd6d2ec45836793d0a1e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74403aac80116062e2925c98f9e477ac

    SHA1

    f8d49cc4ae07737fee7e25b7ec175e402eee6b5e

    SHA256

    f73596ffecbec878e5cacaebdd2e4720704e2566f8eb43ba1f97ec335d6b94bf

    SHA512

    4c4dad21f2693cb2a316573a183d39aa404683631455b557c8036c0008dc7d09ab0bd7163f6e8c56c45a9e6c91513190fc56a74d14b36078bd646add7d607725

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f18bfb1cde655a49421fb5bd6e71d12

    SHA1

    5237baee10d9a27a269cf2e725a01c11c6c17e92

    SHA256

    7675e9a2059edce78d230420e58cbecf0fc492b3fe1e786ba88a34c7252befe2

    SHA512

    4c446278357c0b1ccccfade73f719102e9982d0b66ae484d20dc78da87b6086a3ec68dc9b3339b420a56df659844b8bf989965fd576e04251933cd85d70b5861

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    761fbaf376e9a94eca954424d7bcc56e

    SHA1

    60801240327ab608c2290619f47b3bdf7620ef6b

    SHA256

    c431bb485bf267cc040ad48e4cfa1d7fdc5edfd5cbdf68e02cdc1720b3b1649f

    SHA512

    287fe7d79cee1eee7b4967511307e94bf4be8c96f14a6f09bc7fb1cbb988d0a2f52b9f48961b53d6317ab78bc436a5ba06c76cd48c099253bb0a8243c0daa8fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08f677b375731e917bef41f051769f4b

    SHA1

    de607477f837f58a6cb04388bba16771b6bc7880

    SHA256

    d429a0dbfcab6a65c187cfbbf88efdfabe7b5a2713bc86f379ff327ce40dc5bf

    SHA512

    d2743c8f43f09db4aeed9e7497c2a3a642312de3452a5110736597997d626d86011cc393d6be13f02532deac334041e338bc001d46ec5c1d42f9a585340b5997

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6907b324f7d2a717ca07195c8404d9db

    SHA1

    071d41840166a37c5727b1b2bd80c99b1c8c79d3

    SHA256

    cfa0749acee374c005a5c45c6d76e31e4500589056576c4f59c872ddd91fc10d

    SHA512

    42dda064fdaed9e492755b067c297bf63b48b7af42466724e918c621f4644ccff7e193087c24d922df34d67f73ee87a285fb194c97b4e0966a7f711a11a6b7b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc2e1273b1cee1ab312195faa24d9919

    SHA1

    fcf754d79f2e9e632582f360152084a247ec0667

    SHA256

    081b1f1adb8edf7b2d0fc29ea193b69fa4c2a04ae84d8c3bdcbc6878ad43d0da

    SHA512

    71e8c9b4a6e8ea3ffe6ecddcd44da3e469b5b00ae8496d8bbb70be69c05a4600337df02d74f980b4589c61ac21437f942302c41a94c3b3e7716d30504e0aead6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a29f34dceeef36173e26f816bbfa1d6

    SHA1

    ca4f51efffdbc3bbbfb8b375718eaa085b5ba02e

    SHA256

    708811ba64ceb74a343da9b0934c1e9b3f87553bd459d5970dd8a9f33b01d34a

    SHA512

    f8db9e0c6157ca6e3dadb57d9d08210264f82baf238ed8d9f8ea1ef53685e43cedadcd910d9187977454b8a3a12dc9dfc943b8ad5379a2216edc4931ddea046a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a09f9af3d18febb4f94d2786851695c

    SHA1

    a54b6d871dd54d305053fc0a6c177a0e959bb0bf

    SHA256

    1ea5c3c35f32aaf267d42c7d783b4d6efc504fe8afd8d43ed29d651dda2ec548

    SHA512

    0d7d17e499cdc4aadc2fe35417bf41522e7f1f71dfe4ae9903627597621f495412a0a1172e8508df65505581dbbd89e289139881c246841df8dbb1918f8030e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61eed1ea649cc8ddb26649d39dcb0eee

    SHA1

    3beea5396fde6679ace730eacb0202076d6b6ae4

    SHA256

    7c2795b154f1b47a4abed8f6f244b2007fee7fd5d8cd72dab168d33c93988c4a

    SHA512

    6b38cbb6edc5b4229820fb8c994fb3c821752352be01be88e6e6bcbae223ba389077df6b33acec242b0d6a3822d2f2bc11d9d51feeeaa21910c6342fc93662b8

  • C:\Users\Admin\AppData\Local\Temp\CabB423.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB5A2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b