Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 04:49

General

  • Target

    9d062ba01be30b51214c4939b91abe7c_JaffaCakes118.html

  • Size

    19KB

  • MD5

    9d062ba01be30b51214c4939b91abe7c

  • SHA1

    ec5667fc7a2c2331b72257498319115f452059b8

  • SHA256

    60bffa245b9552c0380089b9851209a71df70e80a20ef604eda47c97e63c5993

  • SHA512

    6d8f8600c333be136b9c6ef1608537f8cd701605fa744ff26f1ee9518c327accfd7738eabf8b992b967eb53fa9033b3d06ca7a3414b7d52df4d888272a9dd9b5

  • SSDEEP

    192:uwryb5nLYd/nQjxn5Q/7nQieyNn3nQOkEntdhnQTbnVnQmSgHMBSqnYnQ5nNnlnK:IQ/6qZLS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9d062ba01be30b51214c4939b91abe7c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c7955638dbe3cd094bb7c0d93e8f01a

    SHA1

    59b35d1fc81c39b911ccd346b20d2a1d52ec7f93

    SHA256

    71087dddec9a0fc7c9ac867c333477d0e0ca74ca6c26b771e6d41749dc2aa568

    SHA512

    40eb6a7b9ebeffdf50d6ae8b489803573735b6bda09095e252bc53729ef305371224c4ae8beec7a3de778f1ac60e610ab7453adad057212d7ead1e850dd256e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74f03742fa008dfa84d6224f1a7b1389

    SHA1

    8971e03067a20c39832682ba3fbe64308e9a2ef3

    SHA256

    b859731c6355c35eb8b7965f14aa569fd018c18566ed1a6471dc31b00ae290b5

    SHA512

    6206250e03c13c8d9e917afda07a71dbdfb2adca73a9e97cf7d584447ecd69752d2694cfbc1fd02204869b0cbbcbeeeda92729b2bf7f608bd3792e16b2a3d8a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e232bb4a3a7e12d4ddc4e95b97e43257

    SHA1

    574f4ac3d0a9f1fb84b99b5e08a336f9714040e9

    SHA256

    be330e1bb207856d2e9037d61e8fb99a108487a169e98e552e74669efd78d2c2

    SHA512

    7fe48425614c9e536d19ffa3db2ca6d5a229bd56d8a428c9ea842d4be7fc18e94c460c2250c5409b6d393dd10795c13c3634aec97198c1e3ad1a76cb16e22920

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5a5bbe78ca31a809ee8dd601afc1c6c

    SHA1

    5c3589c690742deb887ed0b673fe7db3ffcc23d3

    SHA256

    fd9b26657a81f1dcb0303d1c090f1ab9b56f19fe084a0effc8b161c6421fb09f

    SHA512

    67149409f45a1209a4201ca65f0c8f5e267eccc64b65c8dd6e5f8b7f3a73e6142f84b12b4f204c566ebe05c127c55a5a17551637161c7d0ebd171a10a8fe884f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47ecad8e91daea5199bf194461813af8

    SHA1

    07c5aeadfb07db9082e5610c2c230252444c7254

    SHA256

    49c0ab42158768fe79f284575122672e43711509b52bf84225ea0a4dc95b0825

    SHA512

    0d5dc15da6ece87395cb2b34249570a455ba61a6dfc97655628ff5980343a2805947f853a0a671d6852f3e6c0d91e4b4895ab1e1034ac443da31ea7561959f31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    357d49901271390d4c8cf04f4bc96c98

    SHA1

    10893ca816dd9d45d084938ab48cf33c065cecef

    SHA256

    352f7b321abcd405a05a0fdedf64eb9ba8574dd4dc812079f256d437b67253d7

    SHA512

    2487fff42a1c74d22a035915382ce653ee157aa48076a417388d5db7b395aec9cb5dd81d5c1114d5f58500e65fe3eaeac50fe77b54c30cf82e8db918a4d7ff92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbe42d0cafe616e4d444b3523649151e

    SHA1

    6e1655a1a25bce2dd4f5ed328fea714955b2e5a1

    SHA256

    8af3ae09558fb5aa92dc25fdbf2d7517295fa71d9ddf0e4a625155e97d8ef936

    SHA512

    790899a33b5af7d797095aab2a0a7871479a24dc0a7539cbe1f5d4a2b10a3ccb4b9271d001c7f811cb3bceb5563032f1cecee9b4bd8c34102ad387c85da4815b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    515e133db1cbc2e1a0225e1dec4a7e24

    SHA1

    66ae81e3e352fe02ad0540916e7e3e35dca94461

    SHA256

    0c91259291d14f1187b35096f9717d89fd2149b31f4c3ab41c3390e7d3476aa9

    SHA512

    0c02d6ac92427d46f6b98f876f96562972d88a35a6ca4be73e2e367328ec2bc703c256041609ef30c32d643c7e41735f38e1f1ad5d641381bbc8ffb094f42586

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b66db4513787d4eaefd5cef3fd20dcef

    SHA1

    cb49837f301507a00023ddf4daf4c6f652bf8707

    SHA256

    1ad24a558614f78822cb4a47856f5cc80a3618c2748e3ae20d60756d09b76c72

    SHA512

    1ac960ef425fa09781a5c6439ad682577501e88721b40a41e75ec8ffc3f2b91dca5aa2e9c12ef563ff12abba480aefa1c219c764718060c2c526a0f4a6775009

  • C:\Users\Admin\AppData\Local\Temp\Cab984.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarAA4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b