Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-06-2024 06:53

General

  • Target

    b74926d2a7d779643d5e230a44929024_JaffaCakes118.html

  • Size

    23KB

  • MD5

    b74926d2a7d779643d5e230a44929024

  • SHA1

    8e9c6ddb65f3455b1af96a8aa74133366c455c16

  • SHA256

    d761a35f14d7d6ba584edd0035cb1c6afbc15adff04aed192547f8ca63daba49

  • SHA512

    31ed41ee38a874a600e5eddad7e446834137f7cac7575e35cea85865e67c0fafd4c151b472c5e3784b0dca389e538091e8325529b6ef5939f83a885964b513c5

  • SSDEEP

    192:uWiyWLkk4TTgb5n1nu6+2TlSr5SzXonQjxn5Q/zsnQie3zNnMoUnQOkEnthuQTnU:kQ/qN0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b74926d2a7d779643d5e230a44929024_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8e25b2612edb97f493d7ef1e679b9d6

    SHA1

    3ba7887b0d5c51af6acc2e0d7a82d141cac5b2a9

    SHA256

    c2a6ee9b8536751b6dd2281dcb83ab388f23185b03ac5d8e2acaccac5047c359

    SHA512

    930e397d8a65367cf880955a9183cb8e13c9c238e2fc6996860a90a4a18b10391933d9db34b05334dac717872520407feb4a81d31c73d3b961a4f063c7ec9716

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c8b5d953f7bd1f1a72517bb27bcaa76

    SHA1

    7fe0491caac16c73c43b86e6a2b8374864c9a9fe

    SHA256

    a165a958faaaf5a57ace006f8f84980fa8c0b3d87c283defc0d1e7a87f899fee

    SHA512

    ef0d82443aac899611a88aa006b415610dc22292f2a3dc70ef7dcac9d2ada66230fb0b11976277a0ee8cf42d362e2ccc29a5d9a6fffcb35463afb01c9dcaaade

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0e6bd872e72d28c940fc9872dece5b9

    SHA1

    c5f178cbca4f2abdd4ae76f7ee333403b76e79c2

    SHA256

    87e4ee3367dc67df353d918e98bdbd62d35425147145699a8dc0e1c195da4973

    SHA512

    c195e25958d54ff25e0f9925c04137ae2903b2633056222d4f7ad8cb7098a8b45eb6227e0bc06b40c3d9391dd2692f65603e393ef89ee2f06bb9fa696427ce37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1da4b34c11ec205782f9147a3bfc021f

    SHA1

    eb56544e0dc6fceac6bafd0225de263ccad09795

    SHA256

    d8a6886ea41cbcbf4566aa05468dbefcc89f2f5361b1f75fec4bbfcaec83053d

    SHA512

    cb4504df664a227fa52863e3d46a3bfa48b611bf37935c105cf8dc46d0a3094ce361e66f709947204392ba3a084ef912b20fb8ac228d2ba2c9053b6d5ae2017f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5a6028ae2036b09a7a65d5c07f0bc52

    SHA1

    230d7f0ebd159daa873d225818d4f8deedcfc02a

    SHA256

    95d6b3fe2626979fc2a3e0f9add999ac27e71cd148b790ecdfc07a09cf5c25af

    SHA512

    512bfa077642059233a6691bdb7cbdc11129fa05ab58f0c37afdb9d284bb5c545f05e464cd89c5768bb406576895815d7c015448f1fa807d21cf6a0e0db372f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f84f5aa921e9be19f4b3401c1ab57b4

    SHA1

    8ab7f8a2c9c7a5a92fb9bbf1ee4c15af09e38250

    SHA256

    e8261d04c8a201f71c6f9dad29b5dc4f75c7837c871006741948a0e6a59eafc7

    SHA512

    b619df0e647689c9bb8fe78b47947587dd182e4bfddafcfb10cd3c2f420981da0480fb52723354dc36cc81e5513a33eb633f2a712b8bf0ba493853f18e70f0b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db0478de813066c1dca460daa32a3588

    SHA1

    6b8f96e021d6242ac655dd0ddde0266bdb41b560

    SHA256

    fe88753693a722429dd217868bd27274578edf8ae6bc4972a589b983c911e1a5

    SHA512

    0a606f84e120f07fdc5125761db0558cab5ea8a65238a231937cbc6482848fb364be1c3a5961b7c22af6d36f3ed9764b968aa63e89229eeb808af2e578a87804

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1fdb7619fcd7efb752c70e7752c9199

    SHA1

    b6f73bda7c419c766ebc2185dc7951e04dfc89ad

    SHA256

    53db663791cf7a3f767ba980b5baaa85f785b078917aa8dbf91a474bf9c5ebf5

    SHA512

    46eab1e1aa658c88faaf8a68de29ad51a2300df736a00c45641d1d26df9b5faca478472ba98cb31da3f88f5b04fd4c840f0576064cc66874726f05b2bffe7a04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c429bf54e999e1a3b42d1c699862c6a

    SHA1

    2a48891c5d82fcdcb0ed6ddc1429ba4d02e2c8bc

    SHA256

    f1380ad1d71beaa688ab243c87fee39c12415b994cddf650d63394f04ffbdbe3

    SHA512

    bd1a9c6949ac3e880f50f8ec6896aa80060a72aa109d98b79defd93af7a37bb9b2f0aaf0897118a9db7cc5020fb8f9eddcec731ee2a1b6e30b86e3c471487fb4

  • C:\Users\Admin\AppData\Local\Temp\Cab1622.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1703.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b