Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 22:04

General

  • Target

    a29c55d1895c8f2289b40133ff80426a_JaffaCakes118.html

  • Size

    70KB

  • MD5

    a29c55d1895c8f2289b40133ff80426a

  • SHA1

    5cb189eff7275f73f69e9057dbe9f45601c96726

  • SHA256

    7258c9504baf8ea94696d4178b56a94cc4153850d6b8cde5db0b32461e172b35

  • SHA512

    2692902add0503164667a2ec63f564b4088aa40c59d32f4d3c966a9a4af022e976e24fb8596f0685087daf9200b059fbcc02e8757e86332ba4f0167b038d8c23

  • SSDEEP

    768:JiNgcMiR3sI2PDDnX0g6sj6DxtqT+o+6oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JtUzjTzNen0tbrga94hcuNnQC

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a29c55d1895c8f2289b40133ff80426a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6bb6ffe7ca4261fcbf4eee145b010fa

    SHA1

    a890eeda5269a07e34b5c513e02888e0a6e5b3f3

    SHA256

    f57e10d8f4f3de16b072a87a820f21f72ef0b4c1132d216d05339b6d50e3cc0f

    SHA512

    9741d924f9adf4e2ccb26d3e41353c7504efb51cff1b75761f5a79923816290db7b16ee41a431b0a16951a3f95b387a636548a5a57622402ae462a07482be911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef0bc145db6175d1a45605ba4a35bbe1

    SHA1

    95f436e7977eaf441b8efa2c4be943f2e8cc2d4d

    SHA256

    84cfea7879f49f19ba02d5d5cb590c9301b4a3e4b5336260ed4b309fdf2d9704

    SHA512

    a5c05818e4d526fac472755124c8662f7589041d1f089d0c4d05038fb3febc7a7201b0784af3afb21f5ad74aac888e96ef92bf196d65be2b32adcf223711b24d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    259122cf40991a6517f7b40a08def964

    SHA1

    b57bf371c1b7668b80ff16ad44735369e3fa8240

    SHA256

    364bcda6b7366373bc3f2cb720e55c3ecf544cec47054705b78d7a949b6b9980

    SHA512

    8e9b5950b29b641c438b68eec033a2cadf345744deb03d962e8eeb2b52fb73dfb8c582b09877741529619d69a279c0ede1f41e8ef87750d7902f2ef805c0f4a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    652a788b15f1eb6981ae5ef1ba108d68

    SHA1

    889d0dfb15427eb9963b1eae166ec41d10f83f35

    SHA256

    021fab6a2e6773dcc6731ff7c5e484ddd805ba345c68d762b5bf53dd3f2f224a

    SHA512

    4b8c5920a41592ffe7c07f2884889691400abaa1d48f859426f766cf95be15523ffb9220fac72aa6f5de71de3da9ddf743c659f2949d291568ef36588714d134

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26a05b579878baf68c0359bbdde46e4b

    SHA1

    2c8f24a9e477b3a9dbcf1c0c00d83edc668393e6

    SHA256

    45a32ddb2cb35308558bde915d17b0f4f804aaecc23d8866e9413fa6f690074d

    SHA512

    d7fabc638666e8388ff637787b8269157b651abed90678b794d2a25d60573359d95571ec6cf35931a8945eb814161c21114118e7dad478a9db02f384e3f55453

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d18ccb2bc288640a61693ddaf6ba89c

    SHA1

    df77e0041afe3595f87ffd09db57641804660b21

    SHA256

    1e0d6f2e4d1c1fc68d8c43677c1a69c8c5dad67658b7737ec8fdd9a45918b1f1

    SHA512

    a14ddc42ce426f57b11d2dbe09402b839c255d6bc1e0e89e722ff707f3a57164c5367089eda2f2b4fe126d5ccc77f7231625118fdcb4885b4930db9e2af74524

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7ea0b8e658616b3f217dd90d56e7a73

    SHA1

    3ac2aacb6e5d6222832b53cdd8c4fe999dabf15d

    SHA256

    8c80d78be817e687f9add25204666d582ed791a0897b9d595b483ca588b7c5c8

    SHA512

    b5ea8b0903c3a331a8a4d5e6f7b77030679707c83a3df1eadc0749fcbbd5365f3be3b29b68e3c88b132277bef318be3b8632a11b6dfdd718233007528e00355a

  • C:\Users\Admin\AppData\Local\Temp\Cab4FD8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar50B7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b