Analysis

  • max time kernel
    117s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 20:13

General

  • Target

    b4fde6b0fdbdfd598008881269ca598c_JaffaCakes118.html

  • Size

    788B

  • MD5

    b4fde6b0fdbdfd598008881269ca598c

  • SHA1

    e9c322478cd7f187dab956b436046c6a59b036d0

  • SHA256

    02c2ef650d489e35e6d3dd84db725f118f87e26b8d260537f788b40d067ca496

  • SHA512

    f683a7a44743af7abc7c9391998c3418a8eb081ca36a0d460127ea65e7d86f1dcf8b61a05bbf27e669d2d47160594eece3e96075653a351d938011a127a38c8e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4fde6b0fdbdfd598008881269ca598c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d60016a80e6597e5b5ae05399c4fc5a6

    SHA1

    2766e7c93627db64315f4faed7f280e22c12647f

    SHA256

    d4133d9f5c68f09433fd719d9dfb3d8bbda2f2ccb66b855f5cc7017c584768c8

    SHA512

    788093bab1d848e7ddbd3194519a1aeb242def06b6c1876ff834ed0aea251294aa1b314d01bf32abff1a81d7f44bdfb364844910a86f3ec1d07c8f44a9176785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c793b4cd8bb9c4c0b2f3a15db4ce8289

    SHA1

    d515eb3f844b1a2837b6f243f674d6deeac6b153

    SHA256

    e378d6c9b56646146f83c0a97ff047d0644c910efda816be56d70bd3936b5bc6

    SHA512

    ae8f9da9681ba2c4cb6949c80356758bad3451bae2b642a0b8f135fd81b4ec17b7c0fb920b6ccf8fd6438433a89bf4cb817cc1c95ccdd9dc53bba7eda5b4e3ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    accab64e49074d75eb39e37570b87954

    SHA1

    b15ea3af3896b19b61bb11ef718074c4d209ffcb

    SHA256

    1252cf661486625b99a3cbec1e2fce7c12117fa581dd2763117899e027110f5f

    SHA512

    ca86c6a6e485fb4ad6e78cc9d203d1248b0c2ab4bbda7c59cd374f2973c34f6ddbdc087f9b32cf9d5fa91a84f752064ed2054388f42d693001f051e35d046d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d31a16e5468de68f57eed91e591598b

    SHA1

    9cec425de81624b8e8dfeb48c1303a386f639df2

    SHA256

    a4e87dc8597597ca1f35421726bc627fbe6c359487ca94a0e07ee698db87030c

    SHA512

    09f36f6a8e58af2ceba2609b360c9bf94dc10e844f25c89fdeab28342e13c6da37a33035dbfbc17f787ddd72d4e48d148520bf40beda1848227ac4caa1ee1aa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    797d394dd4681bd4b9907d6b2142152e

    SHA1

    2d49fc633b897c99aca3b0d8668a23000cac0cb0

    SHA256

    ef0c0fead5f1086ec87ae1bd80ebe6c8a3477b35ddc2f0035471013f198706a0

    SHA512

    e0556ec85b568120f2caba672f6e8cd42ad3014e2fcc5b7c81d0923c61e47231ab2410e7abdfd41d6768f65cbcf561132d93862a55c7613a764f8325d68ace5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ba4ac4d2a4d4b20d9282f22b57c3f67

    SHA1

    4a331473e063a1dc12457c13735a28cc7b65b5c4

    SHA256

    f977b4e9d601e8f1e1b71973fbcb49f0e12041b1333cf3a214e8c05ea3bc4f14

    SHA512

    11127bb66e8920bd1d11b2643540dbdae35efb59c3c6eedd0f287e52719c7c128fec6eb7a315ac49200517b21112d7900f0840f59d7cc23142329b723686beab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a04cc226d1d8136c21c371b3e465950

    SHA1

    eeb1b58c70598b407514ef6eafb1a4e22def5835

    SHA256

    8d10c83bf322b101662b0ebd3984848351d34751f3d4f482f643623f230e5815

    SHA512

    084eba73e826c51e4ce3c92f2cff66e7efff54d60c123aa08e1a4616a33fc10ce80cd0181bf151861663471b3b3bbd92c892dc8df72488162644f61587585f02

  • C:\Users\Admin\AppData\Local\Temp\Cab8161.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8231.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b