Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 23:40

General

  • Target

    a724c41b4c86195880e904941fddfaa7_JaffaCakes118.html

  • Size

    23KB

  • MD5

    a724c41b4c86195880e904941fddfaa7

  • SHA1

    6a0f298e038a5c0732a06cf667a7b9ef36d19700

  • SHA256

    0e7dd61c024e934d3cc279bc8c279bebd210bd9c8bd95dd2f0c653a0f774ba52

  • SHA512

    2bd6780c42f3592d8d4aa96bf15e87dd4dd2869087e55894950da2b3af5d9d45ff86c635a62c6706d229d3fde7dedf1f5d5555d3a63e383d474230ce28919b40

  • SSDEEP

    192:uWLgb5nXinQjxn5Q/+nQieNNnenQOkEntqUnQTbndnQECnQtJwMBtqnYnQ7tnIYx:OQ/ZT1w

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a724c41b4c86195880e904941fddfaa7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e7c5509077f57112163433ea587d5a5

    SHA1

    315c9628a3fc6f917da4b2f2ebe00049615c0e90

    SHA256

    c11e21a88d7a9007cb654760f406a2d844b8b131c4aa35ade88b04fc1f980c44

    SHA512

    2d52712d33ea682abde9299cc4cf2a5bb39a5a67fb62ff4bd4b6d0d0ffaeea141c1d5f172eafb66d30e312ae5aa6cfee5bafbdac4a385a27ac469d01121b72aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2c74c93fbc9129dadf25a4025c83bb4

    SHA1

    a68f0145c9646cf0d9299b47f35fc19f5efcb84c

    SHA256

    c5d42ff96b218b5bff1fa4c469c5b4faaae0c8528821052e6690a58c36327d4d

    SHA512

    88e4e269f2bbaf706384e70d6bda30b394b9ff367c22454486dc8b43c57dc7906bb805fedd51c3abb8ac147840a94181d4f0d55321fd365da62f482d28f21eeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55bcb95604222183de453a12bef04b7f

    SHA1

    9258e26001b6e8b45a3d6565b9ab934e0602478a

    SHA256

    adb5e2a8b73d98a089b09b05be597d0c2bc118b291335e02cd827d94e14cae23

    SHA512

    adaccc55965b66ca6efebedd070abfbfd4a3a9895cb94a1d05d5a0b7ab58b11e93925c5799901f47253f41f09ef2b433306dd188322d65092dbf8ee771bf9527

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f3291707ec2cd3c839536550d5754a0

    SHA1

    1fb3342dbcea72c906fd3ecbf92bcae8fa8ebd5d

    SHA256

    5a8d1f3265d194339a0a1dba0a5dd1f159f713d639228d318da411802adec986

    SHA512

    6f575405a3f98d1cd768a98ccdbfc435384a5d08784a18524aef230ba27626ab448d55fb50b2e13a5d3c830b3ad739ea6275f70b56c186459cc7ddc51cabfc88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    046d42f8ca4af9338ab55cb264e1c4c4

    SHA1

    f902ace4c08a51a5684a2a836b65e1a9956cf85c

    SHA256

    a56cff8cf9e48aff80fdbb2020b0072e9892dc729d9fee5a53bada1785c787ee

    SHA512

    54fbee20f27d2cf2d4753aa77d1d3dbe2a540b4362907ad0518b1b319a90447def8040f5bc0610cdc8ecf660401707c5941a110de3cbb5a605e4e66d027f669b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b709f6e7c448560c076d9e8f5332f923

    SHA1

    1630905b6b37a8510cf5e1617e499e4e74396c81

    SHA256

    3dfbd977250fda9987728a589c5120ff5e63fbafc80ade4a62cac069040cfc54

    SHA512

    0ac0ea1cc988a704c3cf2fcecd4a4dfdc03fb7d0766c7b001998c15c44383b698ac4ef5948206707ddd23dc2b4557e8101d69a88d0d768710447f0fa67249ca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    898ff7b1699de4ec575ee376ee54ec7f

    SHA1

    1d978b25953a100bd36f8e0a7d4ea5f37732265a

    SHA256

    f250de0bb1d5aacb33170ff5d3905e2c374e7f21756be46d4c5247cd32631c8a

    SHA512

    0444c0ce129a0cc283e0240f925195132e1e0fc6608adf2511b894b6e6e6e62bff9bc0aac6338e369b2dc41b9ba58d66e3a6b742f0447d2ccea96b8b9c1a667b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9340408a0e16f49b243c2cc679d3d4d2

    SHA1

    432df570b9c8b3bb2c014202d3abd5b1905d3f96

    SHA256

    de658af74c1fc84d71bd93df3506a4ad4df2945649187ea2e1adc588638c9a29

    SHA512

    cd41fd661f6f0d2026457951c12908f450af2217989ff76fea87c7094b3a2545dcb8470f9fcaec5b91163022a1185df1d582c5b5780cd6f07936f13828b052a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    843d45fe09368723c26136b0b0f19303

    SHA1

    15302419afcf7b6f520ec58499abc410e8605486

    SHA256

    789297102d03f314f8c12971e1f27874d19f8476ab1fa24bc1ac502fe07b90ba

    SHA512

    57ccb82cb5091218753fb5584e1f8aab40aba7f2a728110eed865b3360f54b652aca65195fcfdb0015749ef2768b060c809de7c0cee8bb5a908a3280c2eac5ba

  • C:\Users\Admin\AppData\Local\Temp\CabA4F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB31.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b