Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 03:46

General

  • Target

    b19656f42545c93860c776719f0cdafd_JaffaCakes118.html

  • Size

    23KB

  • MD5

    b19656f42545c93860c776719f0cdafd

  • SHA1

    b4cde1e6be7bb25c8cf6406e96fae9c0c616d14a

  • SHA256

    b200ce273a015fdb7519609762163a589a2d9c91bf584e4d7484e70cf6b6d852

  • SHA512

    0fa60ebd8f3ed8d43a2b003ee4f3f822355bd001b6a6f5fd9bf4e04a910fbccec9462de7acef9a261d0318d124b8b2779ffcc15efedfb9fa72dd01c6063d754b

  • SSDEEP

    192:uwrhb5nU6nQjxn5Q/TnQieiNn1ZnQOkEntFBnQTbndnQKdjwvMBCqnYnQ7tn+Yud:QQ/LmfQP

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b19656f42545c93860c776719f0cdafd_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4af0eaba7aed431045cbb2469fc2f6f

    SHA1

    90d64fc34e541a96ef0b926fdd331e5682546a08

    SHA256

    31bebcf85fcacb0e997c3cb0b65bd5e939bcdfb48905b49f9b2e4f76e2abacbf

    SHA512

    ed1bccc214f20fb9d69b417823539d876e6f10a3787d800333cd769d119c257343e194745359430b8097935934cc27d650f4c0c27f24f80b7c7186cbe0c9246f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c312dc3b05350b8491b0ff516eb1b3c4

    SHA1

    21acfaaaa068a3669d630e024fa4b41ae570d8fc

    SHA256

    8bbe983a86b5e56fca1becac69188278a89a75a5d3d975c2bd00747b9c487df7

    SHA512

    2ab55f6850528e9ebf98c672ce16c2818c573ad3083d9c96a8461193884aafb1a68c923e0585fa14b07997a17f7dbf18a7e21d2617d36fe23b1d4f4cbc7640ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9df2f700d5d997caabb3bfe5479bb49e

    SHA1

    80bf1ec7f8e9622a6f8f7eb99da586bf200c18be

    SHA256

    c0022dbbdca15e8f69d2007d018c7236fa714a4124909c9e0d0a5933ce0f8ed0

    SHA512

    17b31356a404f1cb30e7b02d95ecc35aaf4004e35177860f77303ec70630fbdfe906bcb28e910b12cf1f6f5d140bb344207ea3aa69d735ed0262f55b62ec59ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9091fc9737b96ef04358bd4dde0295b6

    SHA1

    97ca15e6f5626224e0196a559ac71e9e86807bb4

    SHA256

    7e4ec8b1d761ab60f7b1d4866d9af06134854ffb9c108c5fb67cb3418f0c6cc9

    SHA512

    d214615d605fa111148a4768bfa2c9b85c50e3730222406ad2d825d8cee77b534dcae739a7930e6d8d7db88074168fcd6c4e5df0a5466f41ed5a59dfe0cc8b28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32734c1b39dc8ee74f9e5076f66fcb93

    SHA1

    42477c04123a40e18d1667b07e6c5bba624b4cea

    SHA256

    da3cfcccd39c040a0ad7e4ff2eb41ea8763e13e0aa8c4b38ee1b274f25cc6b1e

    SHA512

    1b69623444b923cc58116213add07304c93f148b90fd5848ed73201cc77ee9a01e94fbf0efa378fdfc49d0cd17aecd9f885ad3c8fdeaaffbc0bae6d35f8bf88d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27da8b02698c642adbb485c4afef7993

    SHA1

    32328bc3ac4abd8d80d46677c50d1b0f3acef36d

    SHA256

    3af714cf9a18437c5929c9a371137904f0fc746163f52bd98dcc90300123e746

    SHA512

    a941db3c6ead716fd38c6255150ebd83e39c0052015b483878140caf1ee1392516767034c7fb8cfd11cb9f2cfe835b1ecb6974e7be097296709515f233c18f7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef7cd3c21071a4d3e5f3cd12aff738e3

    SHA1

    de7bb5aca470fa9448c71596e4cd5a0af91944da

    SHA256

    1cbcd351a34d83f12d71e57e5a9d108a620815ac010b62a2f3ddcc7e2c6d3ed5

    SHA512

    e657e82152754800aae4942f74fbab6c6522dccb4bf6da11574aa158bcf1d3f99703ec52e8ba70ee1dfe09ef0bc488bcc62154d80b89cfd6b9644543ff7b633f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c291be61a511225c4a10540bb6e4a43

    SHA1

    15b8a0ea50ba47ee9f3c7fe20e2109dc43375db3

    SHA256

    2da16b9e79e0a874247ee658458fe72e958399d5161d17ac87534ae1c573ff2e

    SHA512

    ad2445265c4345e98036814d811ac8345abaa6fb7443522f0b85517aabeb177406726a7b9cceb5cafd10ff9f5dc45888b5978c416b1df7529cedad7a72e7bb43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5eda363731adbdb92032304e60876f8

    SHA1

    88840d161673c76ead2e54d2148f75679669af47

    SHA256

    81f769b68ee1583f047404addcb811286fa80411567fbc1e2085a4c1aeec3312

    SHA512

    b7289b982d4e9edf496cc0e06fd3609688e3ec4e88bc566403f2c6740b7b08b6a5b97829531379cf20a466f3907ea6c26edd54d60b19aa2204b7d85f625085d1

  • C:\Users\Admin\AppData\Local\Temp\Cab24EE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar259F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b