Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 10:01

General

  • Target

    0da617471bbcce9e6f84a2d01ed404d1_JaffaCakes118.html

  • Size

    32KB

  • MD5

    0da617471bbcce9e6f84a2d01ed404d1

  • SHA1

    531a14f2d36ec077830d0bb99e159fdaf95e482d

  • SHA256

    0fe6e95dcee1ea052e77e2e29481d3ad6c9addf3df029d1ee9c3b750e67a91f8

  • SHA512

    b04c4532692b657466f9c209cd9c6633d74db0e261ce561a13627f67becfad45207e98e7100c0fcc625ddb9b5c7426180abb0ca31b14f990f616cd69d382b565

  • SSDEEP

    768:KqWJHe28BB4pM2maYurLKYCgJaRW5PUQIhGndUQXa+OZ4AL04mo2k3eK:KqWJHe28BB4pM2maYurLKYCgJaRW5PU/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0da617471bbcce9e6f84a2d01ed404d1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15c2778a6eafcdf97011c43bcc3d5e4b

    SHA1

    8bc760933790de6cd57ae1abad91087d41af84ab

    SHA256

    d791798c7e0afa2ffa26d534a3ac927c85f7652de4d2c6333f47635ab972fc6a

    SHA512

    27911f5171267c332b83724ca550a9979ed119b110e27dcee532e06791b22764e8ed5e2541584725404def782ed1c16a53b6052aec5f627ba70566ecbf7cde35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c2b4c5f78b119f208e621f220849d0e

    SHA1

    1f16bcf15c0cd09d8d9817702de977b670c8c332

    SHA256

    cac626f5e536850f7268d586ebf9183234a493136b13759291f408aa23310d07

    SHA512

    e3a7865e4aed4b1cb90c2f9c566b39e9fbd95b3cba6a0a7fe3d6540092260d3bb2b01d1c0bc725af9fa9d990406d18e639f78812c7c7a4172d65ae17c7787a15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f284eddc9467e2bcddc8d4b626c200cf

    SHA1

    18b8bcd79ceb1706f3d94ca0583ef0a8b2b6e24a

    SHA256

    430fec912ed549ef169b1a07b0ecbf90d9a4f4737717c77012b3fa2ea08ea63c

    SHA512

    7cbef7006032ca5d99c8451dbbd27ff257cb22b8e2d8e4bf03f5c48becbdb4f27f6ba51e12f8529b597f1439386a2309945cd4faed25793caf7cac5a1b1ce676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bee3798f999eb21434c5ca4344eea650

    SHA1

    8cb8ed3d64a9fbc1c746f155528ab5e491d77167

    SHA256

    fd7d8d26fa59b4410abd550853b6cdd3d7c4a6d5083fc6ce6f9a6b0e8bc0bbe3

    SHA512

    f93f2514ab140e96ea4e747a5f79644eb744339a280ff0e35cce1c33a302bd12c6d2aeef8dc445a9cc073e271ed2f6e5d9e1b18ae1ea2cf8024b1115a96669b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8aee85548fde9924a4c8962705843a09

    SHA1

    397a7f7a89e2e15bc23a657de5354c504a69f0fd

    SHA256

    d36eb5b67f406e976ffc009ee5f2c571380c41e8ea53620530fcfde756de3e69

    SHA512

    93b51e5152150fffce5c2c8e1db63b31c496531e10380a637d263859e036522631b232c94a7fbfb494803d32184d3bd82c40280e768093b6820f521db5469538

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b959c837b37b37a7a286b86ccc09f40d

    SHA1

    675b73a7386b959bdc7453239644900fc1f0b32c

    SHA256

    f36619646e082c0b8ecf88dd4b90b015f5a6e383374b681bd4d127efd6af05d8

    SHA512

    cf5fa162764860d90194749429f94680864ad38c901c3fbcb327f2b58e9a2296381be9119050c315a9787d39f4bb0b7425c21a22da5d7c84f08eaa2e78fd3818

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67e81c606fda93801ea30e4c760b52ef

    SHA1

    6d2abb4db3714cb7992c2b587c19440c9469e81a

    SHA256

    c7005dc2dfedde9d21cad29ae1f4eba30dc54b2e90d7f62fc0170eb8aee88768

    SHA512

    9e9f9b6fa0986d0bba5917bdd2faac6ec64ccbeb43d07df820c00fa1b1637f057ba75016f04ff0a38e7499fb2fd7602e8065c97ae6226412e09015a6acbf6f9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0db4687e9a7083b4cb45fc91eb39fcfd

    SHA1

    763f91136658bb03d4e8191c35fb99e34088bd97

    SHA256

    75cc0ec54fe4b752b79d1dfb6b3b0d002ccad1786151d1a32006dc661217817a

    SHA512

    4ccb377329dd8e3bd0d758d98642945d0dbe21278b94d42892143a9abaf5e46fdb8a05d8247a2ed7f8c9a817835e04d6662fef83f49235b532fa6d7a6a3261f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3bd6199a46ab278c94c9d40eeae6572

    SHA1

    c9f3f6201697c65b38257655732da3cbee6a5065

    SHA256

    e3365509c6c683a00234ebdeb045ecaf161b99549c93415f52db962aadeddc4f

    SHA512

    f716617cde8ee1e9b13ae3b388829f0df007f4791df572f9b1e59a6a51e17fb334c9c47f3ac9e300bc5b3e803ea2b3914b7b95cae2f94c3531f2238b908810cf

  • C:\Users\Admin\AppData\Local\Temp\CabF20.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarF94.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b