Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 13:49

General

  • Target

    aeb7c5122d03c4ddd4925377be6b01af_JaffaCakes118.html

  • Size

    28KB

  • MD5

    aeb7c5122d03c4ddd4925377be6b01af

  • SHA1

    c7df45dd24339310daa9a951379770988526586a

  • SHA256

    26638e3d4facd6c30157f43e94cffd85a959204e61ce9bb406e9843c4fef2b45

  • SHA512

    46476e16053fe0b15e0e5803e70da0cd0aba52f8d6e01d66a9c7acdf63c72a337197b84c3ea9aeacb4e599deb6f10f68f9246d0857891affe65903bfe70814de

  • SSDEEP

    192:uwzYb5nnsBwnQjxn5Q/3nQieONnInQOkEntZtnQTbnlnQ9eUam6eFM5GxBLQl7Mr:PQ/85y2MawSN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aeb7c5122d03c4ddd4925377be6b01af_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    881eece6945a75ae3e128df64d714e15

    SHA1

    542c632c0c917fc06e3ef22e6f8bc11cb2d91b31

    SHA256

    f98b1d86d7dc3a3f73f21a52a60cce3b70280905ea6a86f54734bdb6a7ccc98f

    SHA512

    4eb79d31d4574db82e9397105bb54e657d7ac2badb6017b8814d9a4cb6184bd3cc35795b11e2f4160e505d20b2967e388011085c6534dce0cec8a5643017d79d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86f3f3c808f714967aca5f83a030e4a6

    SHA1

    6554cd83fcc9daff5c8d95fe1673abb412e9e690

    SHA256

    0c65c95ee0df5154efa5b24e35a4caa0941a743416bb356247d8a28e311162ea

    SHA512

    f1189ec7727193596a123340d83b9d3528767b3bc304d0419d0ace11bb8c496191b6000f31906b1f934dbcb8c8be39ca0ecf59d463daf2416acb090f17ff596a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30af3e153783a6d717186eb207a234e0

    SHA1

    ded4dd0ba3478aebe6af14ae193d2d9c7ea02881

    SHA256

    c0edc562cbd09c11490689174411b89987f72eb742a312417179935681448535

    SHA512

    40077da484f8605dde5df7ea5488f43450def85ed5e6414cea1af23a47d7267b3e9d2a8bdf8a09d2af023d32a9cd1e704c13f52aec1f5572d7b65c7a015e9d92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53ebb70d0be3eab3e66916b38cda0b2c

    SHA1

    9cb380e94aa896cecf14bd5fe78a404585a2e575

    SHA256

    7ce4698be1f7398e79fc4f4b6e40db326c1e326911e4a5330fc5b23a25184bad

    SHA512

    77e54cbacf2c687b7883bb3c8f2e6ebd6805ca0e65f64f67d986f3ed4f7c1b7c82e68bba86a9ecd440fc2611d7e051ab8e6730cfcab2153163ff81c414b7f575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f247d3774fb38b60daf46292e600d91d

    SHA1

    abcdc122d49b98972d83225c90d8312a2d6ff924

    SHA256

    550acaa5bb4eb168c234f230883acb97819b964b63b0269b2ad40a2fba02842d

    SHA512

    0fa9289452e57458125ab40f316c1faec5c56bb17153730e876d74a64da42680a2c338a74fa8a3762064a598e4c0ca14cdb64addf5c1566f1765429c38550abf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9439fb88dd7ba33494afb5d85c482bd8

    SHA1

    d1baf4532bd878b1b950283c9d3577ad53654116

    SHA256

    a88124d76e526c1d6028a29e75074dbc3d88b47984286eac7f6afd8adc3542d4

    SHA512

    8c62b0f06da2786d76aaa4dda139c3a95f3fc1f9073bbf64df52fddb657c2a6e7f2c84b8fc544385b638b44f127ba7fb74fc984e66d5c797986a89b537d4a1e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b36cee98fd56f6ac0116c8c209785e9

    SHA1

    b8c1dac13aa6d716fe80bd21d971ca7f64ad6bab

    SHA256

    df9861e7264b0ee01e935394e561fe574c54269fbc884f259cd83ea777b3202e

    SHA512

    8000016c18f0e71642e2e08fa182534956b7e8e88585448e9c817793b9424f7f135b75ab041dd0da32373342be68379ccfa5a6f40a0ef56fd2f89279eaf0b02d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5826ddd8628763f5d24429e21b0e6c0

    SHA1

    0f95c791968d522faa6b99ab1e4bca32a37aafed

    SHA256

    ddb4af91d82d6630641a3080f7522488d1fc830d20041bbce6254275ddd4ac82

    SHA512

    830169d42b38b70e8b3db1f023f9bec0b918f49a72738796674fcb51196365531cba1eb1a303a05f9f88c5ecc62e179403bcebc9123a36d50bdc7358cd71bd09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79c23fa8e507a016dec77ec3c8448653

    SHA1

    9dc346a79c359832e513cad8731105efa5fa0f56

    SHA256

    37b63848f8d7b1b2d9486094352d4bd653dfc1f0bdc3f10059c180894c018242

    SHA512

    9c0a37772b065d3b29edc64d86f7a7d8fadaccc68693e4fa524bcc69ed1a4d07f1ddcd8475174942227d4129c78d8cc4443859ce40cb258fa1fe2eb42ab877f8

  • C:\Users\Admin\AppData\Local\Temp\Cab1D33.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab1E6D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1E92.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b