Analysis

  • max time kernel
    119s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 05:18

General

  • Target

    3370adaf28d6b7908b1d2b1ef10eebd2_JaffaCakes118.html

  • Size

    12KB

  • MD5

    3370adaf28d6b7908b1d2b1ef10eebd2

  • SHA1

    fc4627eb43000831a40ec90d69c1a5dcb55d353d

  • SHA256

    d4230ee099a04118a94ddb1adf122d7d0f518d3c56da5f99f90311096985d21e

  • SHA512

    aede9fdb3e52af1b434bedd2320c4e6dcc170d671d3a843e5c717cdc32d53a1da1fa8a968347e12c55f97b09fb744b820a400e72eafa5a6ec6edcf91b186c9a7

  • SSDEEP

    192:2VzlIsr0KXyJAlVCUN59e8k/w1wvqyXBYZon0xfMX011AuBuLbdU8d:szlIcrV3j9O/gcXBYZon0xfMX01AguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3370adaf28d6b7908b1d2b1ef10eebd2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab1507c844db9f230707ac7d7671fc0e

    SHA1

    a8e55261a15a27436eb55a0017312985d78e58a0

    SHA256

    359c736f7351ccf4fdb6fcfb4eb296766527793f9e2882d74a708982ea3ca7d4

    SHA512

    760851789c7bafb7ad7dc2f9a4f79178513b960dea352e57c0c758c910de492c216a2a0d8d8d317c57a73c39b30ad34a520462e54b0959c174308b11c03a55f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e6f3df777382ace122a6fe825ae144b

    SHA1

    be25c4b068ec43becf5833a6955a78e4187f107e

    SHA256

    2029d5747a0bd64fb907c0ff3bd6e3da29712cabeb624f91589ff7e1429afce7

    SHA512

    1d0aee92419a36b01e057914511b9d34c7c21a045fb69a5380846d12f36687a1f5b5f974c2980ffbcc7e74f42de399458b5640ef15da2c81999352b10d52349d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3434ae49684ceb3d7445bed8b05e92aa

    SHA1

    e4ddb4de13575d7bf87041be1fac7b3a0047fd97

    SHA256

    41e56b59b120ba31690520d886b523d50b37d93257667765341bf307eeff5fd0

    SHA512

    fd250ee0f5a6c4dc449e98fdbb791a8d82ad16d189664b20d43a021de3797304f2f6b0fcac1ea2b9abae8038dce8e00f41bbe5d4ef1bd74337c21c398bc0eed9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2488e0cc7927641ccbaa0276ae6dc474

    SHA1

    ec050a96a27c03d7016387e1092dd765feb40f7d

    SHA256

    e8cfef8f22ae199557478ed0251cb25bb5567e0de35a0eeedaf0066aa5c502ab

    SHA512

    e6d1e47ac9b87db439daafa35da5680df012988cc49fe2bb31ff16be1afcbf98d657a584c99f76b17528a51d62324c4a38d7cbe89efda69b00e1da5d4de618a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d668ab2cad01e28db9242d9ecba7de76

    SHA1

    e4cb9bdfc9d76d629f8b3bc2f4c92e8f62e0c48f

    SHA256

    9ccc3d0bf32790ed1a9bfc956fa64ab4ea688845755db254817ee56e0759e7b0

    SHA512

    11fd782341c80b9d4513965cdc14feb13f5a27a3d8fe54d36ce86054c44cf72da117b95015a3a90c460c1dd6da6d666444db19e70dbf479a036b31dd98db009c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    063f7f07cc5cae929ac42ebf7abe9cc3

    SHA1

    f7038c88116803ebc8b23a0e2513833e9a50fe57

    SHA256

    34ef38874a7de4536039975516b3b3391035d34ec32caa0c290bdb36efef9f13

    SHA512

    78c61ce148051d6a28cfe69c0bb502eaa4722f47c416c8e2baf321425f387fdbc6960a2d56a25d3a71db5c05201aaf35a446f3195da638701d546478b72900f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    984c92d067e149ca00ffe0090ac427c2

    SHA1

    bfbb79dd52caab73246357e44fa2cffc138339ee

    SHA256

    d95804b6afbfb1ee59cf846bd57add3580dc935ea5dbac6ab369430f6b15c7a2

    SHA512

    90141f5625365e0e8f78603f6362a5c04cf6d46c533934672c5f6f910a1e91d2f5688b739072a380a3376069004216e2b2a23484f45b86a73af9bfaf1f84c0cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8748e7cbb8f9d43fe99116adc3febc9c

    SHA1

    4bb65a58778f4a2fcddb0cf7bf6a4af3eaac03e0

    SHA256

    5626e975bfb3aee1605289df14ee2e456d83bd5f32cab23bc9aa1590fcfae56e

    SHA512

    6bce31912e90f14b4d6d3a4894c2bc66d28872da79ed6ab8cb3969c5c1538836a79e701088b93eac8bf670f5506cdd777565e6bd0c972de46844b9e2d9dd027b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff604bbdbfc7ba1064740b814bd18444

    SHA1

    5fe3655586c84d9dbe995058a8c7fe44ed392571

    SHA256

    eb3528cee281cabce93e5d9fa0289a8ce0980c233471b95ccc90a296c3ab5b76

    SHA512

    9d8cf44cfa8ba1c0798056fb27531ffb500cee29027830cd196a34b3ee941c5c52998c1fff6e17291ac996606b3439b085fd5ab81fd969d0a380a51a42b1b288

  • C:\Users\Admin\AppData\Local\Temp\Cab712C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar719C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b