Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 21:59

General

  • Target

    a6c5d7629e4650cfa539215ad990ad57_JaffaCakes118.html

  • Size

    19KB

  • MD5

    a6c5d7629e4650cfa539215ad990ad57

  • SHA1

    1fd56f47df476e062bbdf9cd2cc1f681888f7914

  • SHA256

    1a6ed792d482c1a4cd4aa1b4da7f2aef7d79f3cb75dd5c656502afb746bd3966

  • SHA512

    09c7483fa553055c88d48fbe855703b046ea12fd2c6fed49e0846df3382a932f84e46aec2772624a3b39e27f2f69e9e1a3ef9f0a60ab8a855111c7add7caeff9

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAI44AzUnjBhgq82qDB8:SIMd0I5nvH9svgpxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6c5d7629e4650cfa539215ad990ad57_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4609e06a88ae07850f01057dd2839a5

    SHA1

    e7ca02749770fa37ea2d0d365f6471b3141d5a63

    SHA256

    b1a9d00eb58b5215d02745ae40ccb0d54bab7421757b0ba793edc0b0c1f208e9

    SHA512

    cbc2f2a333e989c449c4141b8c104d13704a9b028c61aeca76d36cd4d00dc00f853ed474a8f299470700f636e496c623bf88a88ec18c408c4cd71a359f8d65d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53aa656407d75b0c36927b9d9ff18f80

    SHA1

    7855ff3cf7557f4c88a15c677890db07fe718085

    SHA256

    dbc411ec025fe358dd0c45221da6f55f606a908e89a6f0f28bd37b4e97654573

    SHA512

    1f901f8584a8ef41d6dac9a5cc53985af72d8c081d742961b860c0954ed1b66400520dbadba62466d012fd1c85c258610c68826ec1864aef9aeb3748b89952f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82c4938c23167193affad9b2dc1a414c

    SHA1

    97b67c164d34fcd166f0a176c5fce5bfd3f3e709

    SHA256

    a30f46f9323ef84c620af19571cdc53a81bda6ebd5c7b5b24168c90017296107

    SHA512

    0d84486025d1201114f3071454a585e2ae3e534334a83c5e2a8a3d9e748467c1c53b8488fcf1ac24aa0a895d13dc33a22655cd4d6bb4742e169c21463a002cc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d48f9b0eff5f17537c515fe4aadc8a2

    SHA1

    b1f3b34df625b3db2f75a8ec7d868d3d9ba0217a

    SHA256

    de540d63c03641dfb4993e921cd5b133caa01b852d7a5fd1a92f3aee6a1cde94

    SHA512

    cc323b0e0f2a1036ed3f9e793f4d2f97e12570fc7bf9d8f6c3f4223a4258fe2397e289d718c3ec4a6dafe3d44fa0ec18d0e40863ebb36106ec989d817804fc0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    408e8fa5a8d0c7d8c50c62259ccfc3a9

    SHA1

    44af0cce1a87e3d0f8b469ee2e0db84c83e76685

    SHA256

    ac1444c01cb28cfb28577f71cb22fb85ef9a4261849ec12e413f33d33d730e16

    SHA512

    97a361c8c8e969cb1d8a5f6fea199f8a8ca2087bb352a7688debe9d1fee7de2f6e5ced7ccefc225478f1db39cd4303a88bc712a247e9e4bb63e9350565ac0880

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f832bd3a477c77b277195eefa17a9278

    SHA1

    547d1f4074af663352280243740ba23db8ce0590

    SHA256

    e5d2daee18d9d15deb2b6e9d49f5c107642d8dd3b03966d2259cd790a9f169a7

    SHA512

    4af6558559aba542917a4b8690c578efc82113e420c542ef4645f26e20dcc56a87f3ff7978dee4d4c1d917354dacc091ba5246ecbfd90e1ae191c27540390e4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dab277af849d1a66eb2f006a0ee28d24

    SHA1

    29d0267963225c602093cea9cb1c9c8112a9d6cc

    SHA256

    50c2fc6a1e29f38cd54e7f05c399b8bcba9b4b2c07307da5278debbe7762ff8c

    SHA512

    5a06ec0a078ddded59f7dc5ad73eec3b0bc2021362ea551607ce13bdb7d0f90c49664185ceefb1c0932bb1d81c752dec83aba3d986068621c3c6c895b7dc31b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9915b38bea1ef3b346ae15b22ed241f

    SHA1

    a56d9b1ee06ef2daa78427b09eeb85233aa33ca0

    SHA256

    5d0b894e597282221ad0e770b1dbffc1b086e27f59243df3dcab55bf24b03358

    SHA512

    1dbf5147e3e0555d2dfbd70bd5079d4b9d3590e2bb723cc25b63038e44aba69d03f0eb9e1a8bcc876f42c4a5e9be2a34653b10eb4e8f191bf61d1e98e9034df4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    def501edc0660bff1db3732965d84299

    SHA1

    87524bc2044477174f314fbc4ba97e48175f892a

    SHA256

    5b4beda17339527cd4023070aabd414d6b2163d4ed2c153b94db457d96d2b1de

    SHA512

    38db9d110e14bce0370172a0a893641f72219a7a345cffb33b9f57760eb1f991d70fba1ea8c410d1d777c2bbd2fd175468750830e3202513b7c517be50bd8bbf

  • C:\Users\Admin\AppData\Local\Temp\Cab1566.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1686.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b