Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 22:49

General

  • Target

    abd97fc3632181378a879fbb31dd8eb9_JaffaCakes118.html

  • Size

    27KB

  • MD5

    abd97fc3632181378a879fbb31dd8eb9

  • SHA1

    8439e4f6a595fd8c9a1f97261291cb6064f262c2

  • SHA256

    dc8c408ffbeb0bdb7508b00b43b8aa6c137cfcb9d620356480233994eba29e9a

  • SHA512

    2f93cbf921f19f0c040353cdb72a141e06bb3a4dd5575c573225e50dded4cc5fba0f4d0c57f2de3f7092eef5197bd4885fbf15e68fb215cecf0ff8b607b97273

  • SSDEEP

    192:uwrMb5n+unQjxn5Q/5nQieUNnZnQOkEntHjnQTbnxnQ9eqgm6ulwqQl7MB0qnYna:LQ/TnYUwNS+RC

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\abd97fc3632181378a879fbb31dd8eb9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b3ee766d216f00528659658a3125bc6

    SHA1

    6120352af1cda2f133e28e0483837f3ca33e9978

    SHA256

    4a250232ff3a5d5e5ce2230341be4ea6271a78fa4b5b015a81a83a2c7815d11e

    SHA512

    dff6869e22501475c5388945d99640616a5ca7b1d0227885000f357e13df05ca5003335083bdabad1988f323e19e3965253bc8fbe17cf1e4813cfe7794d387ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55e149b05f9603295ffd13ae7aac3426

    SHA1

    2ab19f3120b5755fb3156c0d800ffc7e7df27a8c

    SHA256

    6ea24b8c76e53e7379aa7fb377aacc0d4c081bd806fa6f96dbed6c93c0924017

    SHA512

    71468dc41452aa9bd648c8f9ca39849053182960fd9f68dbbfe10850f1ce68f7d1d0549211bf37880e9e6e3d4649902941717b3359fdd88446723608987e3cef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12158a79183d41ac321d4847a3b538b1

    SHA1

    8372c0287c1e142e623b7cd6a7ea9d758cfa9ace

    SHA256

    efbb1eb5151690b8e57ca282d65b09d270bb0146293820c72722b922fb73543f

    SHA512

    af736512c69574aedb41ff0b9e0ecb42ae162265cc2cdda5b0940e16e4d69d8fd9a77891c75f0357733766c1fa925be42b318f3c76847cba75855328e6ccaeab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    200b39d142815cfd74307c9adfd1bb09

    SHA1

    4665524e4de52899584be63f25c57ca4b70f477d

    SHA256

    361627afadae256c69693250ac7f0cd67f2913ffbf5dc930aad8f8636a5e6990

    SHA512

    fbd132c09d8aad6fe5b9cc0d39428224e95ab825dee072eeb4c695d62948f38292a2113fb7eeb38b38f039930dd459f4ce0b00d51ab4ce8e28608aabe38751d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b29aeb740f5f927dc5c043aa142b7d93

    SHA1

    5d6d2c91ba1784a41183ef44cfca50a0916c56b5

    SHA256

    1907f954acd53bbfbdc21935b0caea37388fc127e1daab8df07fa139b0bc58a5

    SHA512

    c7f8ab2723c7e53d97f3c0d26a9f266ad0987d95498debdc3449db3f2b6d488b2d7f1311a7d744528fef6b24cdf8edf8d0d7838618c1ae07a834ec9fcaf363d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8681be82cb7974f7762d099def3d2552

    SHA1

    d4065a7a6af43028a820e684cb4253fc66f8c6d4

    SHA256

    6b1d458a4572e0af16e0abc0ba96cf146431141237ddc9251dd9fa285cd4731b

    SHA512

    390be2cc614fd77c6f5c886349a4a19c629995bba88d6429a60154ff04ff05ddc0e8012d94bd669285ca6bcce9d84b20d008e440d0dab7beaff8cda686c0aae3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fd25d29470a14f7a92fa14a3db752d8

    SHA1

    c63d0c81613770c87f0705934edf27dc32771d8d

    SHA256

    bea3fd1c97c97644506a4b552d1ddda2f9536498bec7b0db51935ed25dd9301a

    SHA512

    3cee0373ef5d1894f87a6bc6fe3ff3b5cc17bc815e9fb20fd07a5dd236fb2e02b8c020e4765eb0b0a8ad5092f9e10964920616d1ea9ccf6d2a7c547f4ef111c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e448a59ec87adfc3cb7232b91e861194

    SHA1

    22b15b94795680b176e8d534b9a647d49ce18856

    SHA256

    2704dbdc8c2519e8ac51c65555d0b1e7e2529a430f247e90261254cf012be6aa

    SHA512

    b017895f7a66327e17b0e94db067dca06025035c0b8140c4e5a64c633d38dbd10a25137ce82f5112f244964c7dc1baa41bb22ca18fe0717668251a7db2b68630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3a8180980fcd8c1c7aed960486eb367

    SHA1

    d4c989cb26a4dba6947e2cf1861c2f3a78c04bcf

    SHA256

    badb3609b1413691dc23791a31a6e3405a25dea216c6453f7aed334a6bcb2524

    SHA512

    d0d21e431800787c51300d6d7e61cbca1c0422ef584485543b7f6fcec124137adfebe2c5c92ec82a91d82dda669c7d3f6021ae2ebc6252b87447f57265b886ad

  • C:\Users\Admin\AppData\Local\Temp\CabDF5.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarEE9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b