Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 09:20

General

  • Target

    b2c272dc5880331a2f03377fc9a077eb_JaffaCakes118.html

  • Size

    18KB

  • MD5

    b2c272dc5880331a2f03377fc9a077eb

  • SHA1

    b4e7553261c133f13313c08c7b0c88269864e0b0

  • SHA256

    39edb6cb351bb7a4b6e02f4dfd1b68eee662ce158834284c93ea7b907a19614a

  • SHA512

    f2b2d186a505a38337dbef01152be5974c74101cd3620ba28665db203602a0432120a3b66b93924b091c59fed6f2696e96d4937b129e2f7b691ae23c6e0062b3

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIa4YzUnjBhM282qDB8:SIMd0I5nvHnsvM1xDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2c272dc5880331a2f03377fc9a077eb_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    934c1e4aa0ca8848a4463333853d05e5

    SHA1

    bc10f9012fc0da8d35a038788e7089af1ddae00a

    SHA256

    b5f34bd354a2137e1e5a0f5be8c45d5d4b116e077a35586b38e67542558a29a3

    SHA512

    c2115718a24a04eeb89fcbdcc8043ebbf3f4b38bb8e65ab06b14fa3dfad030cc4ce034910c2e63c1462eb060236d9a5f0b420bde72c055f58709bcb5314e4fb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eec7bbbfacfa60d0e7b21fb2e83811f4

    SHA1

    8df2a2eb1eaa07883a2dbdc4f3bc7bcfbccab1bb

    SHA256

    676cd628c68f45f5cd3601c44d9965269606cac8b5b4a325bd17176355f03a81

    SHA512

    cdb2541deb79ddae1aa0f572fe0f203fd72d533d3a4e7b795507452b6239a5c5c60a1bfc12aff05a3e1b25b8160618530b5c827fdf048a8ad17f35f5cc186e6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b07d1b3de2c27953a50dff30107cab71

    SHA1

    d90784e4fbf0bce5691eb66ef55ae0d89e6f3e4d

    SHA256

    a10332dc8f678724c8c765a8e4d506055eec2a09b56e47ad34369c123d237537

    SHA512

    aa5e5ab47b9cb8678531dfb3dc96f52e24aa64e75a65ba89de9c90f898178717aae6f1d9701a6b3c374217d30167a8553d3bb30483e0327e278477329ce62366

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41a43da5e4b577df7bc5cdd071fa7157

    SHA1

    7b1b63e84d611605b34fda3c618e7da687364d9e

    SHA256

    756890259e88db2b5cb0869cfb092f7a3145b50682069c6b34f39ed14db65ea4

    SHA512

    570af2d8624960e7dfe869969f84a4b72e2bc924f051d97341e409db975f1385838858a525efd23373a3f63f9b89df5e950f1cedcbaceed0019365658d0f0d34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c185718f8be20e77069a5ae6f3f862b1

    SHA1

    fa87b9d3d7011722f4bfe1b4a5d8d36b5b3bbe61

    SHA256

    659d68c5d9afa6725589757dbfa314551a7c1ed52785fa0e15be9664fa6fda09

    SHA512

    479f4185262515f4897e2cb7cdddcef40f035d65af21f7b2b28076f738a68c4e46953327aec411a3b273559dba833680f091aaf58ec2f6b9bb27f0c2c84aad6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccea67e6c5682bb273d96ac6d358df7d

    SHA1

    37e0e849906c5ec33c85f76886b1eba8455b0dd2

    SHA256

    0b7907e36a4131859f489569c228d0582475a0ea894eba1369243899fde4d953

    SHA512

    3573ea6c5397d4e6198a6a5ed8fdad6db06ef20dc367bc19b9e10a5b37aac59d2fa7ee55100d7c038f1541193ff9b0790cead3e17f197e716e948316110d6839

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd415c25be574f722a151974628d62da

    SHA1

    b44e633002d8589b73b88562dc715a3d12317b5e

    SHA256

    ffd41a96713617c7c622793086eedb60266519c82531fdaa52844eb82166887b

    SHA512

    1eaf2004e54fbd8a55694a94cc842c018bbcfc682e4505d3415b88159ab804ed8891f229f57f977bc227e676fef6048f4587c6ea8d027490911dbae44652eb25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffbd4aeecd52a390c89b5ee6166a5177

    SHA1

    3eab1db11d5fae687a79ec974bbc90a3971be1cc

    SHA256

    9af1c77e444dc19918daac965037957186e6a99d7b6b5c1c6d21f75f104a673d

    SHA512

    ceb3663e7226d715c4f6af404cd3ad790f1a731a98a552c6e55aaf4a8a4a09bfc957b53082ef7886578e5e39f3a09b13eee63bacae5d0b9b1d271a103587bf18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a67c328215e13ef98c40b36e84687fb

    SHA1

    031967ee8a6817ca20897f090ce224801cd4afbd

    SHA256

    d86f0138f8cf57d724ac3b97a08d38bdc553f5962f138f8c2040d35df22d45ef

    SHA512

    6b00ff72e11463eada28634c794f4fffc7927470c3d8600e704d8f181ae622b0a5e8dd0502a0ce015fbf124778cd0b884a0715d5570178c70a16f6320441e853

  • C:\Users\Admin\AppData\Local\Temp\Cab1392.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab146F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1483.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b