Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 20:51

General

  • Target

    9f7a57714614c2a811b26cd45aa27cb9_JaffaCakes118.html

  • Size

    23KB

  • MD5

    9f7a57714614c2a811b26cd45aa27cb9

  • SHA1

    128b321413f8a3dc2478cd09414142e58e595a21

  • SHA256

    82ce4563773d7375bc07ec850d6087bdecfea68a92496b055ced00fbb74aad76

  • SHA512

    47a06517726fddbd7f703cfff53320662eab9ddd8f3950187e6dbc5cce7b0e6c4df373af24c20651fb6c76cbf873060cebaab04835b5345369236727e8cec358

  • SSDEEP

    192:uWrMb5nzm/nQjxn5Q/SnQieJNn2z8nQOkEntK0nQTbntnQ5CnQtVwMBpqnYnQ7tH:JMQ/Qz4vY

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f7a57714614c2a811b26cd45aa27cb9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0289ff84c946b7b08dfb779cb0cf944e

    SHA1

    61ddd4fc67950fce84d3a8f60d2d9dd2d352ac00

    SHA256

    219d2dfd20ac2368a05c74550ebe1ddd8faf853edd171895f95a81f63fcadc87

    SHA512

    dbb4c2641d7b0a2a2fa75540b5b03acc0ae7041bc9c6fb948b89deaa8dbd79f282bc9b2d82a1a5145666f9bdd22a10c30022fd1aac6e488e45342bde441d244b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71ade202f72fe9688801e1cf0a8e3be1

    SHA1

    97374abbace8d6e4e2acf6dc7500d92daaac6329

    SHA256

    4367bc4f4a7b840344cffec95197c0bbebb6cf8a6b02e1ca0a955363f74fd478

    SHA512

    2754c72b2f491fb134cd52e70353887884b5a78a622000868d9afa506b9d42b031a13c95b827a7c063a3a6caf2854e93d65e754042bf44ed767ae4224ae2240b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb356b0cadbabd3fd786d1205a1d4893

    SHA1

    583c0326c31378ca3f16dbc40f3e8270f7ed6d8b

    SHA256

    eec0006ea33b109e013a86658422a7ba112d70062fde8e5242363b7738ffa54a

    SHA512

    0d683d6aca227a3ab5fcdc6fd6048843b95a77abe5b48a933118b147e63ef871d7be1db560ccb9130d18b849ef25e815cca5f7df731ea2024d42949c10b72d7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59b0aad4281062538b209511a5846b5d

    SHA1

    a0205e494e51bfb714b2c584bc4b5144cbc7c168

    SHA256

    2870dd4d63ab6112adbefd2eac7029661fbc68f2806ad1d1b8bccb508a4e237d

    SHA512

    3ff1f686969257afba0c9d5963a670b1f3bb6a5303001a83809694e2345c5da84677a5549ea3fcfc0390a47a500fd7973afc076c14b5fc83687e7d5d2bce3d64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d73235394bf5ed959daf7eafd538b564

    SHA1

    1123c73a5df22b860e0d08cdc7313ebdbec141f1

    SHA256

    b9b20fddbdbcc284a30fa46f7c3922c51599efbaded5da4579ef213446b418aa

    SHA512

    ada33c267a6094ee282b00e27604ad6d8caa1adac846d61553884f5ce06098b46108910e6390e70e5eddabdd7c53aacc5a6c3e67e51ab10d74b2bbdb892f16cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbf4f063752c2c7cac5874bd6b0170c6

    SHA1

    b9bc170192412309f33f78bbb5caed22bb4988d8

    SHA256

    78db9502d702d583035daf27d10f715a71bc5a991b0edcb4f4ce8a8a18e484e0

    SHA512

    adacb566e33bb26acfc797a1c9cf5606caaa8716356781197d4672a8b9f722cee7a20f75dfeda0e4a71ce73581dbe75cd35c03b5b2be9193ab8df1c370f47c23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93b66d8c26679ac4b471e34ff5d462b8

    SHA1

    2791c197a2189fcffc80ccd4b7cafe32e2ac4945

    SHA256

    671afb9f46b14ca260c140445ac6a7cde4046c46e1d526fce3712b84ae59a4de

    SHA512

    879c3f6fea8fdf02d1f4058cc4975125566c879995cab96d711cfd1aa11ffd55c6f4451698fdddb34930eb678bef1857856081d3d2b9631515c77fedffe137e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d6df281b08af7edd0a63b0bc0c4f417

    SHA1

    b30e67609e8debcf316d5cdf360e27deb6994f22

    SHA256

    ed6bf3d847becac85e0e23041647ea9017cbace85af06bbfac8fed5008d559c2

    SHA512

    1e806b27b7b97690eed0e7bf7321b43d5e90a39c0179436697d41ec8462282b00dbed6969b3a4f95337f28f5b5660e603bcb2a6d037cc7390eccd96257e2b981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b943f77e4eba988424807fe16d36f57

    SHA1

    e8a68efd9ad29d3be2dfe428cecdd484f42ab7fd

    SHA256

    3cc440fb475436e79e970372e5e3d0326ac7a27d9c12078ac115e2b96c298a75

    SHA512

    0fa0a9d018e81a91e479b09db8ac39a132d0b037f7ffb2528e80466c45b70b23f997ec2cc84dd3a78399543be8718252310cbc989579c60664fe4e79c12add44

  • C:\Users\Admin\AppData\Local\Temp\CabE93.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CabF8F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFA3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b