Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 11:24

General

  • Target

    302ccb9f4432b15066edc8692d0a56c9_JaffaCakes118.html

  • Size

    97KB

  • MD5

    302ccb9f4432b15066edc8692d0a56c9

  • SHA1

    0c5be1905e440edfa90d2cf4c816bf0511e36e32

  • SHA256

    7a2dbbf57482786aaf9b70b055c1b8e6a780635f2fd73a9188dcb55ae334cc06

  • SHA512

    884e84011ab2d396f07e09fdf02bb95845952106948a9c30ded8dd2733d21b103cc4e84c77f48c1bb02524717758391380b86ca8d838f7c44e66a1007185209e

  • SSDEEP

    3072:yau26QppfEoIis+pvgQCzDuke8rL+kR4wdK:yRQzfEdiLV

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\302ccb9f4432b15066edc8692d0a56c9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          14cb6b8614b3faba1000b02ea6c1b078

          SHA1

          e131616e53b394c90e189f26f06c194bc26e75bb

          SHA256

          b2f7eba1ee90e3dc1d9c161f58bf8f04fda60f036986f1de6319135201262aef

          SHA512

          14c7f0fc9dc52e6743aa6b5f59f5164648169d5d29be84fc9247c656649fb732d5c7c74b2b3a14e14ffa3f6298afd9682a7212076941969875c3d22169f803df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f21d36b596ac9956c0a0c67135fd25d5

          SHA1

          e36e2a64a2ce37ebf088a2fc2619f97052324751

          SHA256

          da67f31a93e6fa4d5c4a4138eb4b201af99afb83f4d1607725c21a6fe18be1f7

          SHA512

          fb627047b94c77a5a22bc2fdc8ca4323e29bb52bdf067aa79e069fb8a1488c50b0f7f71989517d262779caf14332c90bd3f342147cf9356f56605f7aba0f7d62

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          68fd40fd9219a2d0b834b993afd01475

          SHA1

          8ef283e7b80043ad10cfc04fccbc52bf9833dd18

          SHA256

          2dd577e41035b8e56c1a1d102ac71590124eb38cf2a568900e087bb4227b9ef3

          SHA512

          9cf18bb08312b574231b791931cb5c3385123a3299a907770461bf4df0e19000e92bb1dded79c0749ca4d64613e5ce89a1dc2230142a3e4369033dc539fe4587

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6ab2dde82df3647a19934cd56065adf4

          SHA1

          1393f7e706ab4b039841d3b2873f0644f9cf183f

          SHA256

          ca02020d9df411e24af71a53c57a79b6f9b1ab7e1d4fb1b81c566f90570558fa

          SHA512

          b66e07400a0a8058f041984ba8fd408a0cf063bb5dc2cd2a4db733f1f7990cb08607f51c437c4d876c62a5c86df5100638b3772873a7d63835dc3f01f6605f99

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ee1c22b2db9a5b355ef6321413fb5c48

          SHA1

          b140b8709636b37ef34d9984ab9d500acd044643

          SHA256

          cc7d1d7525c1947f288519da3b45f8ff7834805a0a1bc345ceada8e6cb3d1fad

          SHA512

          242d4381e17606f444ba7ba6f6621964d4a75f63e5fcbbc93cc58889240b8184bd783fa143041ed2ab2cd77237d8185d7508c968c38708ec8fa798a81e6f9700

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\recaptcha__en[1].js

          Filesize

          533KB

          MD5

          93e3f7248853ea26232278a54613f93c

          SHA1

          16100c397972a415bfcfce1a470acad68c173375

          SHA256

          0ec782544506a0aea967ea044659c633e1ee735b79e5172cb263797cc5cefe3a

          SHA512

          26aca30de753823a247916a9418aa8bce24059d80ec35af6e1a08a6e931dcf3119e326ec7239a1f8f83439979f39460b1f74c1a6d448e2f0702e91f5ad081df9

        • C:\Users\Admin\AppData\Local\Temp\Cab5B00.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar5AFF.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b