Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 00:41

General

  • Target

    ac45ca3b30d7ee54bfb7f17a6e0e4654_JaffaCakes118.html

  • Size

    139KB

  • MD5

    ac45ca3b30d7ee54bfb7f17a6e0e4654

  • SHA1

    bf77cea70a99e8cfe101aae89a98903fa71ce840

  • SHA256

    bb53f14cb7f873356350991c530d9c264e46baacc8f73ca75b56a99c0fe6687d

  • SHA512

    88d0224e4474579dba113467df902c7156559d21b9adf4397f6d923ba11e41363b57abec77452a7acf72ddffd62bf4aae4c2cabf1f26c7420b151bb310bec82a

  • SSDEEP

    1536:Sf5sfbj75QvlByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SfK75uyfkMY+BES09JXAnyrZalI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac45ca3b30d7ee54bfb7f17a6e0e4654_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          be078e23db533b4ddff330f4aa5aaad7

          SHA1

          a7463ecaeff848e056cf34c9f6143a9c825765ee

          SHA256

          7ab501318df039a20b86bb12cd0e158e150ba7a70b34f16693e84bc7acee6d46

          SHA512

          e40545007d21e085db699d7c4f716cec43040a53ec444934d0be9e28adae10633fed25cad7202a798771b6906482845d9cddccb8069c350e9a3bda99f85dc3a9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d8b0052fb351f0a29b7c573161f80243

          SHA1

          42d6d27969b64c4e063cbe1531a939e005254a0a

          SHA256

          008eec26b84ea01b41ce4c825186d8d33869ddb7fd49f504dcb922d4691a8e23

          SHA512

          4b7ed2a207f8f65f0d73bc0e799715d6bb1168e97f147178b4703b7c941aa00a3888d942b40891560b1ba4aeff8d5968c9ca5df3e917aa3c9e3b885a4d1b19c9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b7ee8450707b6c1ff4612cc4ef5b5ceb

          SHA1

          d5b6c5d34b8a8db771e649a6e4e16bf37076d1dd

          SHA256

          fc535ebbb20b0db36e91b70944b6c9b9b84ff44191b1f0274d9c8a6844876272

          SHA512

          2636b76fbddb33aeffceb59f1f7739bd08f2dc660b86fbab232e71b87212dbd3563994425e8b6e96f0b94bacdc74485d0db19bcf24f2f09e40dbcfc81003719c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e284fb5661134bb0400aff0fd22bf1bf

          SHA1

          f2a4078f42b03492dad43545650d9de23e2f5bc1

          SHA256

          c396a73506c47facc476a4eaec46c186b2c80e0c570843b5e6fa4dc2b3e2cc85

          SHA512

          aa8da9a5e7fb8907f1d0ccc0f50e3b36c21c798af518a214a03769084f146b5a121ce89ff5c8b2a411a6dd4444f382b66a956b0d0b26420f87cc6f895f44e4c6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b25a1088b3fec0eee6b03b1fdd70f633

          SHA1

          586aadcf2e3da06ab75f02e5f5255a89d4a2fc61

          SHA256

          790161a7edecfd2b83bf88a3f51a47743b86b549ccf66c89672865c795c45ee4

          SHA512

          41f7a51daa6559fd6c08bfc7cae64b1f1838c156cc5e832b2d42b59c565a01800e4ae9bd6807a6cc5871ac40114b8e9da2f7869deea62a0f01221f12df961469

        • C:\Users\Admin\AppData\Local\Temp\Cab23F7.tmp

          Filesize

          67KB

          MD5

          2d3dcf90f6c99f47e7593ea250c9e749

          SHA1

          51be82be4a272669983313565b4940d4b1385237

          SHA256

          8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

          SHA512

          9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

        • C:\Users\Admin\AppData\Local\Temp\Tar2D41.tmp

          Filesize

          160KB

          MD5

          7186ad693b8ad9444401bd9bcd2217c2

          SHA1

          5c28ca10a650f6026b0df4737078fa4197f3bac1

          SHA256

          9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

          SHA512

          135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b