Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 11:24

General

  • Target

    302ccb9f4432b15066edc8692d0a56c9_JaffaCakes118.html

  • Size

    97KB

  • MD5

    302ccb9f4432b15066edc8692d0a56c9

  • SHA1

    0c5be1905e440edfa90d2cf4c816bf0511e36e32

  • SHA256

    7a2dbbf57482786aaf9b70b055c1b8e6a780635f2fd73a9188dcb55ae334cc06

  • SHA512

    884e84011ab2d396f07e09fdf02bb95845952106948a9c30ded8dd2733d21b103cc4e84c77f48c1bb02524717758391380b86ca8d838f7c44e66a1007185209e

  • SSDEEP

    3072:yau26QppfEoIis+pvgQCzDuke8rL+kR4wdK:yRQzfEdiLV

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\302ccb9f4432b15066edc8692d0a56c9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14cb6b8614b3faba1000b02ea6c1b078

    SHA1

    e131616e53b394c90e189f26f06c194bc26e75bb

    SHA256

    b2f7eba1ee90e3dc1d9c161f58bf8f04fda60f036986f1de6319135201262aef

    SHA512

    14c7f0fc9dc52e6743aa6b5f59f5164648169d5d29be84fc9247c656649fb732d5c7c74b2b3a14e14ffa3f6298afd9682a7212076941969875c3d22169f803df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f21d36b596ac9956c0a0c67135fd25d5

    SHA1

    e36e2a64a2ce37ebf088a2fc2619f97052324751

    SHA256

    da67f31a93e6fa4d5c4a4138eb4b201af99afb83f4d1607725c21a6fe18be1f7

    SHA512

    fb627047b94c77a5a22bc2fdc8ca4323e29bb52bdf067aa79e069fb8a1488c50b0f7f71989517d262779caf14332c90bd3f342147cf9356f56605f7aba0f7d62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68fd40fd9219a2d0b834b993afd01475

    SHA1

    8ef283e7b80043ad10cfc04fccbc52bf9833dd18

    SHA256

    2dd577e41035b8e56c1a1d102ac71590124eb38cf2a568900e087bb4227b9ef3

    SHA512

    9cf18bb08312b574231b791931cb5c3385123a3299a907770461bf4df0e19000e92bb1dded79c0749ca4d64613e5ce89a1dc2230142a3e4369033dc539fe4587

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ab2dde82df3647a19934cd56065adf4

    SHA1

    1393f7e706ab4b039841d3b2873f0644f9cf183f

    SHA256

    ca02020d9df411e24af71a53c57a79b6f9b1ab7e1d4fb1b81c566f90570558fa

    SHA512

    b66e07400a0a8058f041984ba8fd408a0cf063bb5dc2cd2a4db733f1f7990cb08607f51c437c4d876c62a5c86df5100638b3772873a7d63835dc3f01f6605f99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee1c22b2db9a5b355ef6321413fb5c48

    SHA1

    b140b8709636b37ef34d9984ab9d500acd044643

    SHA256

    cc7d1d7525c1947f288519da3b45f8ff7834805a0a1bc345ceada8e6cb3d1fad

    SHA512

    242d4381e17606f444ba7ba6f6621964d4a75f63e5fcbbc93cc58889240b8184bd783fa143041ed2ab2cd77237d8185d7508c968c38708ec8fa798a81e6f9700

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\recaptcha__en[1].js

    Filesize

    533KB

    MD5

    93e3f7248853ea26232278a54613f93c

    SHA1

    16100c397972a415bfcfce1a470acad68c173375

    SHA256

    0ec782544506a0aea967ea044659c633e1ee735b79e5172cb263797cc5cefe3a

    SHA512

    26aca30de753823a247916a9418aa8bce24059d80ec35af6e1a08a6e931dcf3119e326ec7239a1f8f83439979f39460b1f74c1a6d448e2f0702e91f5ad081df9

  • C:\Users\Admin\AppData\Local\Temp\Cab5B00.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5AFF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b