Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 09:41

General

  • Target

    a032e5a5dd28c85790adfe82a915defa_JaffaCakes118.html

  • Size

    20KB

  • MD5

    a032e5a5dd28c85790adfe82a915defa

  • SHA1

    70f9be23a2b2efd75f0e54103f382e4f55972cf4

  • SHA256

    10dc609f0aa9359eddad25d4c73d5bbd92a8c141a2d7d8575b4945c02e50de42

  • SHA512

    01ba773008e0313d967bff994dbc92c5b7fc72d0474b9dad2d7eaaa5026c624c7d69a289534a05cf99d3c4eb856f93e6f0210ecb085933d33fa345f80d222724

  • SSDEEP

    192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIx4vzUnjBhBb82qDB8:SIMd0I5nO9HBsvBAxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a032e5a5dd28c85790adfe82a915defa_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae0cf1f9fe91e391d6dd379e1e27a728

    SHA1

    59fe7975544a59122b6eda4a82a50d6c1fc2f411

    SHA256

    90850223daa704395e5b5f0bbac5ee8f6c40155177a13e15692bca49e76e8d7d

    SHA512

    d6935600984047542bbf8f26d294e96527ab336e2eedd2a99642bb631628c2151a5dda52d43426338cdc9d352b153536699e62eb1848360e01caa83a8db35a14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf185834147a4be54d0675f2bb7e9d98

    SHA1

    0c8327b2e3bda233ebe0d53501cc5a97a1aef5fd

    SHA256

    e20fd77a53cde9d2fd189ff1707c40626e3617c31e54e2e097f27e6a6345f285

    SHA512

    85bea1b0b96df2c696dd1a4651e0d884a14a6f8720597cda3724e113fa36c1c0a2b81d6b5e6ee7bf1ce02c22bd1266354ddd5bbec5cbb7f6b2846ce4b4656727

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bfd69a698cce96fc46536a5ca3d056f

    SHA1

    5a8a5f924b01a4cfc733fe12bf82604c0a29c331

    SHA256

    bba64331480b4ac6754b41d52f8ac0e3a16bd351c82fecbf2ff01bad10f86c43

    SHA512

    bc27145e83d4b29b943d0f150d8985e23ae09b7acc0d305a04f9208bb8bf42ce0f7f48db70c375896c11865b1a0c880e91eea97cdf45d322962859f2d1ba4e03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b09e2b727228351d90ccb8ca9f3c342

    SHA1

    a2b07fd0cc5cec4ab49f95d83111c0bb30f9a587

    SHA256

    958266f29fdc6db139b62ece5fbdb882615f5a392b77b5a62e6c258304978b49

    SHA512

    761eecd39ce5fb9c75e2bffade310e04a5ffd833aa60ab5d3b102927dda39bd72a6cd105141af5be69d169d9971f2b176a45decc0ee5db010dacf93eba3e3fee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7f3c08f8eb4810ec6a66d98941533d0

    SHA1

    dc25edc60d36ca97503b1b318f8138fe1adb1220

    SHA256

    f92288a228246e068d5c68fca6a511177ef1ad1f0654d50323712f8e48c6cf3c

    SHA512

    9b9e33f0f78bc3361adfd1492b1ec91772a7e37186399e4db0a73e5c6588d907f3678498698b186f9b15800c5a8e59a0c834c9465d8785fdb0e35f95836d7570

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    383aec057ee624ba3b3c0ea15b74a7ba

    SHA1

    6f04779ddc76ff8ad863224eed7ba2757f700211

    SHA256

    ee8e3230e117463971790f4adc2e3eacacabad5e6175c8dd975eaef435fc98d0

    SHA512

    206f1e7f44c01018a699d43d4dd80eb50b6bcc6f6042a053268b1b469dddc716cbb85ee6fc8d7dfc29c8a50f5456e7c6c6bca46f06949903787bd43bdb5a6d9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    037917fcea5a9c4cf323c491b976218f

    SHA1

    45bb5a8728e191db282a5745ab4152a792f9d5a1

    SHA256

    46ff36e4d00564f1dce66c4e560a364a6d949fb826249f094f683ca388a183a8

    SHA512

    4533c5573c72d0c83e689edc511082785bc5b13b832ef4db5c9d9f45c9463675d75f9c9b1fc7eaa4d00cf14254d2eebd6b8c634e83bc21903f85b9585614a879

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    823f32e4f28cde77cb79744ae26c348d

    SHA1

    17b1011bb8be6ad12fe6823464df5d80478726dd

    SHA256

    17f3822e61eb269cd69126b9e1a9974e3d9e63b6f1b6476709c1e0a6ab6777f8

    SHA512

    2e5d1381784aa9983f8dd2547c104c7b0b2c17d330ed44fb9b47b1079ed5f7219206dec046ee8ce89fe3ecac7e812f2caed0870f51dfe1c15620889fce5b01c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    feff2d589e295b688c0fc2c6f330d67f

    SHA1

    e3288c75b3c1471353576ce4172f181d695ee412

    SHA256

    2740caebe3ccb48329e8ae2ea2491fcecc9bd3e5cff5eee5dbfa507fcc40f347

    SHA512

    de494e09ecfb5a8abfc0dfaad3c8c3133efac16c29d83030fcb0dba9bd9944d36e8f40617e6b6d0d73322e0dea3c74ecfa5e31645f71a98fd2f0615151821405

  • C:\Users\Admin\AppData\Local\Temp\CabA5F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB40.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b