Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 12:22

General

  • Target

    a5828b16a751bdff57849d558db80ac5_JaffaCakes118.html

  • Size

    34KB

  • MD5

    a5828b16a751bdff57849d558db80ac5

  • SHA1

    74f8a09106486fd4b26c0941053486be712bcad3

  • SHA256

    923536658b2ef49b4565d5812fb7accf2e7d7ab16fc4e9befd0aa45457f6e8b0

  • SHA512

    b8f0bdeed7417b842a17c7673408e9e28e24c7a1495e3f82e0d8b9d7bbda593e936d763bb69415247f7182f38c72a3497a952324562f0f5b520d68c90ce234e5

  • SSDEEP

    192:uwDfD6wZ1/aq8b5n8mrv7LaRTqsXa+0nQjxn5Q/+onQie63NnwNunQOkEntgydnk:BQ/a14S54w+jker9t7AJ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5828b16a751bdff57849d558db80ac5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a1ce029bbc045dcdb4ef67ec1f9e1dd

    SHA1

    1c5802f99568ad8f3f32997ef8465881f1497dfb

    SHA256

    9e0b91e63503644a467d0e4c71d5b3192780e690bfb1d89138b63f753bc8a329

    SHA512

    f90b5ed816e662d5c574f3772ad43683a3727ce801e79679220405b3fe3f5f08acc936f7450004a75f1ebbeaaff6eedb4e57e3c022ccbc958873a1181978007e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73304923050f47e9a70d2dae975755be

    SHA1

    d992e1bd81c7299a7c64d7caf25dccb49e386bab

    SHA256

    36771614858b871938d688495592d86f489692a916cd5bf25e348bc35b7ae647

    SHA512

    425d54de3d5b126becc98add671be6ccc234a281f5377fdbf9e961ef25f7ad41a51a7aaf21511caf1b8dd60deec4ca7a10223bdfb2eb981db529a19dfeabacca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9438a5de162beb954e2631559339c494

    SHA1

    24956835c8c7bafc770f67c02427f145b8c2dd0b

    SHA256

    22cf6a00fe5b1e73e9f7f9aaddfaa59696778b084bdf6ae1a083c6e46c32c4e8

    SHA512

    532b97790771c90b9639075bc30968c06239d1e421c009a813642d76700d895dc96ad946a7c6fca401cb3aab3f335919085efcd60cf608f29e68bde458d011df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05518e7cf6aa6161b31b589c40626d40

    SHA1

    b4ec2ee0d277319802fae1e32414584e46b35062

    SHA256

    8f0d74bd48ee4917af13c9b5f0f248e6bc2e63e7534a25c7894f1a8cfea1b7a4

    SHA512

    7b1adfb72eec278aa3ad4ef707f7b11e1d9a1a67f010cb4ceeb2a1602f6b370f2817879890aa8c00f491aca6308d3c86af5df7bce1e57e20162c5f90e700dc08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    810964a72805ca990afdffa978560815

    SHA1

    afa8d359917a6492b7d56709b818719009232e17

    SHA256

    821b5d6dc92599a1874cdf84df3a0c4accbb3e8f297da9dd94e2e31b24c5928e

    SHA512

    f9c00fc400dd70637898f2afac2d10aa3d596424590dfc704b837c7ea7f4aae35c178819d59a29980a319b2d0939d563cf6df8bebe8f16f03bcfac89fd799c01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7bfda0e719bde93927254e8d44490c2e

    SHA1

    ea0fdc14daa315a091254f36b38e19ceb502b506

    SHA256

    27947d90f67c2e47e8d2a7650e25feffab30a72e60ce1d9c083f3669dbb91442

    SHA512

    2bee0f34ddf4ea64fb31c3a806f779d474be499310d437711ee26f188179381a11b853b3b5c785f08cd3cac7113702bbe4d01d1a2c5ccf4e34adc6d569baff72

  • C:\Users\Admin\AppData\Local\Temp\Cab7004.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7026.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b