Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 02:19

General

  • Target

    a383e482890d46d3467092d31ad778f9_JaffaCakes118.html

  • Size

    143KB

  • MD5

    a383e482890d46d3467092d31ad778f9

  • SHA1

    4788161f2d36647ecd772a7c16249ae3ecaa3511

  • SHA256

    9a46ec91289a4f7a9be0a6be0b547f493d27a08fe5dd71d75cd6f1c752d38f0e

  • SHA512

    42da2d101df1955e91c8f8ac9b02e8bcfc4feb196c956a35737bd2715b28861bc5de888efaaa08675c7e8d6e88773eaea90e9b195c9878061a454e6b3205485f

  • SSDEEP

    3072:SvdL3Jvxx7dyfkMY+BES09JXAnyrZalI+YQ:SvdTJvxx7osMYod+X3oI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a383e482890d46d3467092d31ad778f9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebc43668120a07a31b98abfcb20f4675

    SHA1

    ebacb2f6ac24cfec837733d427c8ce5970ca62dd

    SHA256

    2d9a1d5dbcc9f68fcdf23fe21b7012d4dc1bee3fdb7161e04f67e51bc18d055f

    SHA512

    30834ac0ebd302b2d5eb4147cc53b21b561ce3b8cf9addf876b4cbf74b2928f67cc3b973c8b367e0d94ddc9e3c6dac87cd5ee5da6e5fa56c3435819a436950d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a0210ca104130184532a2b1d79ae7ca

    SHA1

    bde8a17c0e25a352caf033345fc2fa0f2a47ddab

    SHA256

    e96a4f5da95c67bf5681ebb39606b5b6766f7a876717cf73cd88537b34eef688

    SHA512

    de6b09641672d63dec567e89cc6621d21860b5525617358293ea90d248db5e88cfc2bbf777f9d0ccd74bac46014afb6725532673af3c54ec00fca4c8ede03a28

  • C:\Users\Admin\AppData\Local\Temp\Cab1C78.tmp

    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • C:\Users\Admin\AppData\Local\Temp\Tar20A4.tmp

    Filesize

    160KB

    MD5

    7186ad693b8ad9444401bd9bcd2217c2

    SHA1

    5c28ca10a650f6026b0df4737078fa4197f3bac1

    SHA256

    9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

    SHA512

    135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b