Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 15:32

General

  • Target

    a645766369aa0cc77a86a7153e7ac88b_JaffaCakes118.html

  • Size

    128KB

  • MD5

    a645766369aa0cc77a86a7153e7ac88b

  • SHA1

    a850c1f64354ea48f507be57894cff5de2e590b0

  • SHA256

    04b8edd10d56d6664af91390cca6ef395e7c375807c3130cfdc0f54d502c0971

  • SHA512

    0982034832b2c30a6807a02e1a1268af3c909399d35d73ae119c81cc579ad721e0f0773dafc2ac7cb5385bade03641e6d31f270f6ffd0d952b8e97f3b452fafd

  • SSDEEP

    1536:SOgQgImE5eGtoJcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SOgQgRcyfkMY+BES09JXAnyrZalI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a645766369aa0cc77a86a7153e7ac88b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    af61c0e3188834ef7080d0ca2523b0f3

    SHA1

    284b1ca6ec0c113f76fde005138a7b52a914ad98

    SHA256

    a60f188c4a6e5114bd603e2a73db4e17d2339142416a6834266ac9d32d630f8c

    SHA512

    8cddb1691ee05ae9bdd53eb3fbe894e79d78ab3ec941ba48daec8bfeb0f32ad94298027ca999c95e07246f4bcdc55fdf95fc3887556abc42489bd3adcf8383c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2a2d7da6cf731a4d77787e57353bd17f

    SHA1

    4f66578f29ac1fd50e2845cc93baac34a1261cbf

    SHA256

    9206a915fe1276fffdc16e3694f06e16e20bef190c1757625db5c25432f877f9

    SHA512

    aa6a0caf2c593aaa762387804107a784e3bb712ec72cc194144d51980bedb2b78a8443bcb90364bd40e1e5d48e9fd74141135058a627873d256d2ccfb82b5533

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    046e61a3e3a3f3a2672b1eb77f7985fc

    SHA1

    4a7b19f2191488aaf45d9afeefcfa1e4ff6136d0

    SHA256

    7d17183e9f221edd8d5885aa872f31f96075cd5cdd287e12ac913417fb75add2

    SHA512

    0bfb31f51b503561a8cf7c2663c5c6156c37cb501783e476abaf9f73229a41b699d7e94b34a1482cc1fc0550273555c7e3b97329eb4f20894a292bdb6ef9d02a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    410b0c858515131547bb3b60ac7b67bd

    SHA1

    8e5a910f1ef4cb5353f4e3c79284ab59c6ebb47b

    SHA256

    ca4ef70ecdc93780e21bb41567167b00d91c9ce724f8ea600af36c53ec1858ed

    SHA512

    dd1b3c317d549c5dc94906099977211f126abf46ad6ed2f003bcbb293fbfdac6eff69ced5bf5b664fa1e2934a73e5ed0f4070148a7efd5f97baba889b3fa7f93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6b1fe53fda0475b82369b2b4eb715d25

    SHA1

    f946337bd720a3be5c80625809990cdc839cf879

    SHA256

    0cb5d6895f7e4b62050524924ba74d5fcc2d8c65795e12e044af1cd0302f5e0e

    SHA512

    709f169f98358b40ad7dac18b93045b288fb4969a1ca551771e74f9f34ebc9e103f5270506a773bbc1d2763898dd2d291c20de745e77d479c31176be518deaf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    400452fe9702420e691ae7c0292a739c

    SHA1

    0723794e132c193f9c1a1c9c577eb5da7ccade5f

    SHA256

    8a6eae212e9397c929eef8994274e27274d366ebda3dad41421c4f94c6284d74

    SHA512

    3cdbca27a19f075c70baedc30927a6d34badabae7936089cb30729e26cb66bbeddee11777964a28743aa249bd05f9e24e125e5d65dd130e67c5c2179b73af4d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2ef078944a199db4eef7995eac255471

    SHA1

    e487ec884cd37d8e29c9301f8a4956941e149479

    SHA256

    6a1b2be1ceae7f39529459c53b803f0e7812d7c6387b420c994a8b59978f32ca

    SHA512

    4fdf274c36e1f0e35a526faff350d8617d0eeeb3ae6d8ac1b10d27eed40e3a8cffc85db92b36faed96ae28a4692efc3495fe5d0ccf3251cd54ed761a0f50f45d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    95bf9d0e78265dcac82c9b620b5a2e72

    SHA1

    5bced593e8754d0351434bd63f00f20637eccfb9

    SHA256

    60dd951cc59cfa46b1522778dfc9eeb14031d5301904a5b3de45453f9785cdeb

    SHA512

    d45802d3c9e4e8f10c64ce5a8cf7822c6fdf7a560d6f5bf5f3f369683177c129fd89be292ae70f189c1215577b6e3200b044624831c4293c0148362044961963

  • C:\Users\Admin\AppData\Local\Temp\CabA8E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB5F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b