Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 22:04

General

  • Target

    3ae34a34c106c191e908935d77225b3e_JaffaCakes118.html

  • Size

    10KB

  • MD5

    3ae34a34c106c191e908935d77225b3e

  • SHA1

    b8472417c8506b614bc7d600a7858fc6fed2d948

  • SHA256

    cb91f72643bc73f0922d7f37ff4e8c90706ad44c254194fb3aa1533c7c4c1396

  • SHA512

    637853e30e1363d8021cee1ef15aa98ff6439c6d1f80e543cf0e858a128cccf8f49152a89aed0279c75311577880474f9926996fe40f7e1d5af6251fc024314a

  • SSDEEP

    192:2VklIsr03hC8k/w1whqJk1uBGdn0vek3A01y5uBuLbdU8d:sklIcuhK/g6uBGdn0vek3A0y5guLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ae34a34c106c191e908935d77225b3e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    dc8aa49f5557f30a6b20fa4b985901e2

    SHA1

    456e7ef0b2563d1120d35563f01e6a5380263d57

    SHA256

    7f6f12bb9f504b9efc3fa72c3a66391c41e467da0ae6cf7f6c2a582b3e3baac1

    SHA512

    bb8c1bf3fa46d1a80cebf3ad2404e6beee294651ad24076040ffa5de4f5da9bd7a92d58b29b52018f87dfc9ccd7a6421d206cca4b06de311cd3a5476187eef7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    44c44d44bd775622d4a73d017f9ac39e

    SHA1

    c244c3f90d526b5249ffc20ba0e806008027eb1f

    SHA256

    7a1ba8f85192cc5e8cd53858b81b3279f82eace4fc0839fb7e38ef716e6fd4f9

    SHA512

    7b5a97118f98134a394abe62b17317d2037de45108e1b609d9d6fc8bbe1a71d43d161d18bb6d0f21c6cd538b88798d764263d68fe1967b8e456bd23180062340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8d538e0da1b98fe9e8fa2a76bb0994c4

    SHA1

    e74e7c22557dc2e7eb6e4ebfb9d790cd0f78f973

    SHA256

    082824d20f09310352b93cd5ccf3b331f3bb8cbff640c2cf7fc78b1a12b8142f

    SHA512

    5fa47e00c136f6a91788721dbaffc5dbcb1a9557e2a7d5127b328ff2363239fbb2f4866a2698395cc94e44b07b7c5502d4b65eea7a5ef267f446852718636a18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    30c8766c314c12101d898ea52945b81e

    SHA1

    97cff01e2cc67f0b3bb1f6de3bb02cf49cde4462

    SHA256

    85e10774bb39ef5b8a4bdb03ffd69d8dac0fd51000121dde6016fd5150d53c37

    SHA512

    516637dfc88026eb808a90deb5460f2c0b02bb898a966beb42cc2347c5df3a2310a9a55cd3f4d7cbdea589700ae4ba3ceaca0e94c60a01dc9a6f1519aaa0650c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9b0adb315362ee6bf3d80af250c3b6f0

    SHA1

    fa0709aa238f4c2cd175a70060d4d451fe07e8c8

    SHA256

    5f5cce3eeacbef0517af2be4d166d5b70ca8b636bede332a6fce39ff4256fb3d

    SHA512

    f019d21ea57d4bc1a3f314483168d1c6b7ebd114e1e047cecce09dba624ebee47b98aecd0f5cb74449ebd1343831a93946ee3204b5988d705a172ec8a76ab01d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    872718984cdbf2c2f42354cd70b3d96d

    SHA1

    65884df065fa4d8160013a3fcdc24289bc862b28

    SHA256

    596f7dcb08b740dd2948b39995816a69860d417e51b512dcb4fe0d36feb8d827

    SHA512

    f82bba62553e95653cb72021a7efe762cf758eb1078241e99c7b4e988fcde9fb71685e1e2eb5a9b5785da2a6457638c5c626c4b49f88f35143a2aad740124281

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    05adef541beb5829da2bd01fd049dddc

    SHA1

    c83fde36e4795109b3132822d596b5d91cd0cbb6

    SHA256

    16ff34d06768608f7a57cd0abcec1c3947d021a74a8a537b2140bbf5e1ade51f

    SHA512

    91fed77eeb460c776a7dcb57b94662b07b678dfd547e8b5bddf0a6147cc6ca9fb8117cc0cd213c5a75525bafc09545ff025ab61579af0cf0e5f76deeaae78f92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c8cf56ee1b067b44752cff3e918c0bd0

    SHA1

    34a4fcdf65b8ace22ad23ca77a046cb6b85690ae

    SHA256

    ac57384261711b333fa05e6c9135158f992b6cf5fe217d87491a6f152499ed38

    SHA512

    6105d3bd20ed1176b53f457c78bcbbb2013980bd8fe6786579d5cba3c6733491f395fd0b68cf07b4d639712b279dd4bfa6436cf8513457972b2cb60955882cf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0be5943b61b8baf6b1b61513f1f6dcc7

    SHA1

    7d3c42f471d5f14d47b8f39364fea31982f59aaa

    SHA256

    3ab85d6468bc765cab52a6dbc20424df271cff9430f4f2484c98014ef93df95b

    SHA512

    7f5913aabf35f97330d1752e0a844c3905cbb5ab265b0a7a905074eda41dc199ba828779d24eaa6b860d9a4534bc94f8a241ef1a96ab38bac4b91622a5836904

  • C:\Users\Admin\AppData\Local\Temp\Cab7B77.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7C27.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b