Analysis

  • max time kernel
    137s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 10:43

General

  • Target

    38c995f90ff798770ea3ff518352d69c_JaffaCakes118.html

  • Size

    44KB

  • MD5

    38c995f90ff798770ea3ff518352d69c

  • SHA1

    9e96e2367cd2254ff5323d39a2aede36caf82368

  • SHA256

    45620c4b14e5e5220e2f33713e6adaec29db8b4709c538b1265312262950af44

  • SHA512

    d3d9c458d5740d99f2beb27bfddc35621cc47dff2dbe4392117a2bc0da1e75fe57ec6408f6bfe1558100c766e9558cac27edc578c2aecb596e82a5604233d6f7

  • SSDEEP

    768:6GWE2AiHMP0Csi9hJ1lJo8lBJLv8+MaBEQdlZqe4Taz1MYEXR11LTMgw8xLZ:vWE3ioz1MYEXR11LTsq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38c995f90ff798770ea3ff518352d69c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d0c1aa7d29e94598b59f51a7b47e63b

    SHA1

    35ef6340840b29ee6ccc8c563d6600fa993ab7f5

    SHA256

    6882be28ba6e9b88164849d9c4affce91dbdb971a975f22aaadc5ffe64d686cd

    SHA512

    22e35238c2e62ae4a53c782562b579782b517315f8fa4a9742b591e17576d086a61446e31cd35fdbc334396080f1bd4fee5225263382866d322e5759468f8918

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d9614feba0acfc560ce0c20c5b6bb72

    SHA1

    977284b0a1e2647e832827df632003a11aceeab0

    SHA256

    14c5b1e412280ee03ce74b64c2068c7a5a881a91e1875f092a817385501b1138

    SHA512

    83d36e74a0947beb4bce54eaef9b02c4c051293e7b3497aabfc17467ce454cd494dc9b0d60455b579d321cd70b914e41e965c3157b474a2537c5bcbc1df99a24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e743ad03bef87b6628f2481c117eaef

    SHA1

    6210ae69d433ca7a1c76f9e819caeb6b4c353522

    SHA256

    3d091d047a1150f69d59e0d2bb2c0aa37fbeb8d3f4c770814351e0872b65f8ec

    SHA512

    b0a4ffdd73b482badfbc45a189d3f6f90cebd17950979d79f2bba47fae8fa034603262116a37e990dd0f6ed594fbb034f5409f45f9ee4279a42f4194ec97b05c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2956ce72f1c62db33cb3656fd4f21864

    SHA1

    180e736748eca9ed397eacf8881cac791002bd19

    SHA256

    6f2b1c1a2778a074a1bd5e5b39257c04a1902c07e85f0f14e047c3a35de26497

    SHA512

    99150c81f528898fadbd5e2e51cecca84d7d73d0e28476dc30eb110fc4bb3d6ca794c9692bc316fc01f8d6b02009fd1bb7c890606c1edfbbdd42fdbbc8205112

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e66b89e4aeb52e286f9ffa8267bc72f9

    SHA1

    319c01ed1f1addd8c146d6082f1a1f060688cd8a

    SHA256

    0406388ed7c084ac03ea00511d1108ab7ddd62df7bd27fbe74745ab57d32fe7a

    SHA512

    a6a2f0524796b119ecc96e1dedf7276b47aca2192fae67c3fecc48494b37f6581beb91624a05ea8ee7edb1392ae1b57b4eab83525e3a6075472908aa7fe86d3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b164520e0638e8a2b8540854ad3dca59

    SHA1

    cb85a57f894ab55c3fc868010bb3102282e63336

    SHA256

    ebde232c48270318d0bbdd8508982e52528de3b758cc4a2fead015024ba81f61

    SHA512

    577b969961bf3fe39147656a3204559bebb41faa3492370b7cb4218c061ac754247d9f87d864cb20458cd46ce0c804a1b8b13837fe21f0f7b17cea90607f3867

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71258551e58fa6ab2929cb8ca1cb726f

    SHA1

    4945f40a6f0498cd5e463942d71184df24908e14

    SHA256

    f9d0ca821f75a3bbef745e59eb36bd6b70e7e947a9a5e019217fe4051ef3213c

    SHA512

    bb427ca028df2bc1f2986778266ef2cb1740cbfffe4878995aabfd982d121a5d2321684886a1c207253a6c5a39fb3f99c24e927e74d4978a8d4fec376b1cc6d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebeccad269c3e33eb59c68ce241ca710

    SHA1

    74d2d371095adf293a48f556111c197d6527daec

    SHA256

    11589f4a6d75956371cda7ec3f1e07fef89291e474946aaf5758c9d4ad97686e

    SHA512

    dc73353ddd1e6cdf7b29f7c6c6a7f2248172c455ba0d0e606c89ec0af5121ba4247ce8acf7d469daa864976705a7c9557d11171aafe7f2d15bc3a60364bffe7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e745678e14ba502bc16aafc2177d9f27

    SHA1

    1565e48738d0f4fd47c917ac11ca93ab2b685084

    SHA256

    dc6e52cc60ac7911e5ac2e713372f405eeaaf6021378ed42b4337503e1c12c16

    SHA512

    953455fe76b62b70749f553f6ca48dfdb3404662fea89c8f20ded74382476119d2f982d00d54741924b0f2390267af020eab96c7fbd8000800dc981674e263af

  • C:\Users\Admin\AppData\Local\Temp\CabD4AF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD55E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b