Analysis

  • max time kernel
    119s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 23:10

General

  • Target

    b098d72d5a2ac2d6854078e64fc0020f_JaffaCakes118.html

  • Size

    3KB

  • MD5

    b098d72d5a2ac2d6854078e64fc0020f

  • SHA1

    afa9cefb1372ab81db90b9af6ad2a96e09e933f8

  • SHA256

    431e5351443edf453d2cfeef530ac1bc3f8d08edb91a821fe7f8b45b0ec3113a

  • SHA512

    654f97ae4ee5d7b117f6f8df7ed161e96676073799e5e09b6c75fa831b23ea34d9c40238ef3d724933cb4993cb6d2730e733d88d6ccc95470999b123e965486e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b098d72d5a2ac2d6854078e64fc0020f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9980b62b688cfb6fe8553373ff03a132

    SHA1

    6270ed8fe15b234a0239e3bbc5f0856e6861c070

    SHA256

    a45c10918a116c8cfc97509143ea4eb0423464520e7b6a5db158a2919b877334

    SHA512

    eb34cd7abbcefa882ab3f773c1406ee71c5eaf1bf84611ac3b8b789c132ae98bed58c940f7891ba52117a0b2e6867f296b58e90e7affbc4fbd3c8d63da9a1abe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1643abab2606215b4f212e6c576269db

    SHA1

    0686dd98742ad512aa770b852fb8adb7699bc9f6

    SHA256

    67f30bb3a6e1388f7d5a39cd6ee48d3008d1a3158e88b1511f12ead4faa0a91b

    SHA512

    279dc4d4f82ac7baacb104394bc20d4f3015c95727a5aad4e589e9ca91707d257e796594a73717b15f4e6b0d74bdca1be2a2ea2c32b6f421bbe97006ec80e6f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e36208baab59d9959afdd27006b68b27

    SHA1

    d9479269d3fb253bbfc35d8c5ef0f3e0d12a9f41

    SHA256

    db324d0d16b6622353a433c45a2b2ce5d62dd1d7aad10b31b7d9bc7b91d150e3

    SHA512

    7d6e52af853ee55b163ee141280c8765a7c5f879bba70f26e07950413455e08017e68e9afc32343c0a480c56362ae026cf0a52d87b5c1ea0f57f879a62845722

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    445249655a3a738a78d6ffd6014e1ace

    SHA1

    eee164ea36676ed51e326b97dd378abea823dded

    SHA256

    214a4c0d4edbbb57c75a01e1cdd6074a0fb4a861523661d15891ad22b80e4df1

    SHA512

    a52062f08802649521e3dc759620ebc0c55ac79e06a6e51fb57bd7d4843a4bdf1fe10ec6c6af77767a13ebf21f6b29148c774fee53d643a880880020e819dc1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eba318e35bbebf8d79ff4815229d8a1a

    SHA1

    23aa039a3c4df52714d5939bdbfcc14e73ea0201

    SHA256

    b3edc7df4510dba71ce356cd53ac3106a33b55d0f793fdf31df7787016b4de48

    SHA512

    e1b0552527d350f9efc9f776fe7ff98364ac765da01605c54c9e04ba43f3083f52980eee9f529a47646282797f293f7959f6a5db7e972218c453c5e7fa0951c2

  • C:\Users\Admin\AppData\Local\Temp\CabD5D8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD61A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b