Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 00:17

General

  • Target

    ac30d58600a9762bcff764a61a13b32e_JaffaCakes118.html

  • Size

    23KB

  • MD5

    ac30d58600a9762bcff764a61a13b32e

  • SHA1

    43dc49a6836fff30b48b74455bcab4dfff4f3854

  • SHA256

    8916c2773589457cd85d67f74993065d37e791f68671702fa2b32f87aa5b7c22

  • SHA512

    bbc46d0d67f6142bbf037512a03d7e9b37303507fa0d7039d816de313d68a16675a8e77d787c460d6e704126b061bbb8845cf81f9b174c282af7cd5ebf004f44

  • SSDEEP

    192:uWf0b5nc6nQjxn5Q/HnQieuNninQOkEnt5BnQTbnNnQYCnQtcwMBOqnYnQ7tnuY8:xQ/EMZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac30d58600a9762bcff764a61a13b32e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6089845cf8ab6119c6891da244a4937

    SHA1

    57c794d6edfbe8264365f8ef6b7e9c4975eac759

    SHA256

    b6d0a35b8f27710935f64b808f02e01370d14c4b9ea56b3797c7cfc7e52a3587

    SHA512

    100394fa37b5f9997f4d9e3d4dd6c0ca0eec67c7095dd20c7f8a696400109bf05f8afabfb7491fefae47aeb0b751ad0d14d9398c8ca75ee500bfe59d831523a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bf15621fcfd98c9a6360132bc9ca23c

    SHA1

    743b731460e2511acd9276b8ccd135f6a86559b9

    SHA256

    d31bf777383a48e184556fc21160133d8dc57da66cd40dfacad23a1d539ae0a1

    SHA512

    680e08a3206831c318c90117708d968c1986d1d2458d34461cce5ccd3f3415c399b465606e2bbde1692accf3cf6d47e60aa19857b8466ef3f50f7a8c85c7d290

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4715bbfb5216c52e1d8ef5c1cc3e4529

    SHA1

    93ce645729a1c5d4c688ecef0b6db23f6ae7e942

    SHA256

    f89906cc42977e53f43099a5fccb8de3c38a54495271c213f2849a8454a9ae7f

    SHA512

    41640c0545b5238da93e6af1a0ee54b57cd693ffd664ac316da2f447a5e40b1327c8d03f11414f3e169a20e5c05d335dbc3050568acdae1f602caaffab759fe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1092b2d349c72f0382a6b5322741ced

    SHA1

    59094c5e07ff90041af03479b3fae68870473193

    SHA256

    75a1cb162bfc0cdc3d2bf278c22f687f3359f509992f4a48d69eb6c615ad8db3

    SHA512

    3f0efe5d873ce709f8a6806ee05f731e37cd303cac994818c1516c51dce6d5b09d557f94b5fbc38cc4f8202d1bad239fa58e5c4f16d4842d2d4f68338ab501e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07abcb64520f8ac6eff5308a5b35eccb

    SHA1

    b6689fa5af2e85079fbd1b799716ce47912b849e

    SHA256

    d303b1ac17dada385ce98614e61021978517920ade403d1593a87fa6b05b2d71

    SHA512

    4760131694b07bbe14ba15aec5f5d140a0f78b4168fb151b2d82b5a04936bd3dcf63ae63be10b83adefa40df4aafd65ef059cb18a99cd99309eb35e311b5416d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e699838ac64a89ae08d806ae8e7f94d

    SHA1

    95634236002d1a492f81d2733889f6f36a06b463

    SHA256

    6b9a8b05da326ac9d643d7c0419b263bc28a6f85a4b8932399d925a6c7d9a981

    SHA512

    bf085bccaeadf37a1c7252eebf1c6a6361c99230a9fc10d5fe78e22c3a7c653c6545db1baf5eb4dd8fc1b2eaaf19a6d7aa0efdc1434b04bf69feec083db9b828

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71d82ab641d164fdb07087ed24381480

    SHA1

    e505d8daced8ef4d23254dcd36b821e8f052d7e8

    SHA256

    50904fc3b0ec172c0707973f8b7d3c08b2c5dbccba188fefd7d0444dc559875e

    SHA512

    56737031faae2112e80d020ab4fa10ed2e82feecb801c5f8a555605932bfc9b98b37001b1b77ec2cf514195f2438f26dd950f4fb147e84057b756982a9fa5ffd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98165847dd562f421ab788f1ac6d7221

    SHA1

    267431c735456e99a12167bca039fea11898fbb2

    SHA256

    ad70ef0064eb8d7605abb709aabfe26dc8921875608b2c9b59ceaf237ef74247

    SHA512

    af88e9701e3ab0cefa9d19ee80c5a1a46c5b787a9a8506b5771a4234d8138534ee970d29846deb3bc9c19da0167beecf8982f169aa0df16e4e305667f81fbec0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b02f661511c47168011e68bfe97f323d

    SHA1

    b2898748c75e90153e5e7428bb8bbd9305f1ad04

    SHA256

    7734efc5854436aa1cace59b38fb2fe4bcdd774d071718acc801dab6b41f25b3

    SHA512

    43bfa9f53dd0404f46f98955d25e5ba838301c7432646d32892b4b2d85ba1025585d3e39a192feffdac41c7979ce7e0b8e5c21aacc17036b8053abb129cff537

  • C:\Users\Admin\AppData\Local\Temp\CabD89.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarE7B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b