Analysis

  • max time kernel
    68s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 12:38

General

  • Target

    3d68508d2391540adb9dc83e7f5976d8_JaffaCakes118.html

  • Size

    103KB

  • MD5

    3d68508d2391540adb9dc83e7f5976d8

  • SHA1

    a898aaa5da945d66c5fc5ca123d43d82dd999b38

  • SHA256

    c6efcaa34ff340e80836ff7499a85f3895ffc394c8b3b1837a0921fa83cd8529

  • SHA512

    d5e0789e58e4cb895a0cadb692888961cbf386a06906de302045ef84eb429bb0533285378bbeb6f11d428f8c651f5f35785491bcadd3dc90ed512366020762df

  • SSDEEP

    1536:Eldr9i9fn7etzJbHiL8mFAG2Hpry0FfeSkTd:EHrgR7097iAmFAG2HJFR9kh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d68508d2391540adb9dc83e7f5976d8_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06e1e9fed3bc42130aa41c6d44f09ef0

    SHA1

    366a6114bfa184aa22cd02a37e1641e1ce74dd00

    SHA256

    ab500cccb0c4edf0989f91f05cdf103e16cee23f630cb764c67d5881c79c4194

    SHA512

    7caaa55dd44e21890b71ae8a03bae004aff52e05ee764863e7bceb1bd0ad7e15ac6e4a9f19ef98b60c02adb556b376ecd435b24691760b12fdb2f1ddec87b1ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4aa4e7bbc02b128dd00811db9e09e0b

    SHA1

    9de8d67ee9294b1b2c4ceef001d95ce83b9f0704

    SHA256

    c49159041a7dacda23188867752c40f8ed57798e276ec507079203cde1ffb4a3

    SHA512

    a16601853fec7ba4683dc2afdff5565ea1ca13121ca56d8522d964549885e33026bef4178786ba5be47b423b85eec26400ef6fc244c1addc226fef63b18f3bda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ffd65c311dde51b74ed7be1f50ced67

    SHA1

    c7d2296421d68d4a4824e929439a1dbe8d53c880

    SHA256

    d41e940dff61a539bcbe0c32e2fb9fa758b55b0cacd8d50d5dcae756b77d454d

    SHA512

    8c35d370eee8b3b245211e21b18293b5270f998e8be718c7f1839131d5e447a594749e522f9b4597d0bb060968d734e26d26d7ad379fe05f684d44cb22ec4192

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    515491e7acb9afa79d7ac5724d9ec7a3

    SHA1

    3b0a66d814df5c0c6845685280c14c0fc310ec30

    SHA256

    f2af358266c77eb39ad0ef70044df15670ddcf4d1577684034c4c2e18742f03b

    SHA512

    f80bf2ebb05745d2ae02983734ba7e743da871c99a93fa02640b32e1b4a396481e22e4d9ac5be974af140c00c6ff4f2c9b81a75745ac9eac574b879a6b64480f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71ef94549354fc5032588782c57f0916

    SHA1

    890680281ecc6dd3d45947ae8033000c7c970750

    SHA256

    9abca92e22c08cb5fdaf71016c3dd00b2a94a533bbe3cd7e95d5632688520305

    SHA512

    d1247d121e51594ba1b26d4b49cd98f3fce26a9c58eb9f1e6b982ec6eeac485374add818a4390cb01690bcbc9fb1c152b0c4afb71627cb8b742cdc8f1fcad2e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2af77e7e46981cc2f5e2c45f395ca6b3

    SHA1

    3e738c6beb67883b8d35893edf6e2623d00dd96d

    SHA256

    45093b3ffe1bace5681ba3a901ce2eb0deca5e55e5eea80e54e76a85ca835e18

    SHA512

    8233e6bfc2d42d5ae3c6aaff2446503ba11f21d8d0441ff6598287f4ec16a1d76d2e56395653af34318ad2e80b073bcd996629627323e5ed5b78c87475d9bfc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36f7ace085241be3008007bc71c27d43

    SHA1

    158a66adde463930296e1ce41c50e4070ff82979

    SHA256

    632af90bbea38b90a74671dee4049c49b30195e773f8e313569a750c2129eca0

    SHA512

    d6cffde20323fb044a65799f0acb0405fb2784493d07262c8fc57bfba9cf639619c88e67ba29cc655c8964b9b16004bdc908cc42b8c67d86cdb552f8634e3977

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d999ba66514ff9cdf9ecb9094484841

    SHA1

    044dc50ea4aab54803765cb67ee20b984e222464

    SHA256

    72b93543fb4a0d52497c523e9caec6e3f81a7aa16e4bbc70566f800ba4585330

    SHA512

    2b404fd5117f3e5e9ea91db3fb2ed6cd6cb9e4c7c466ce0b678575730fa7fe9a018015712a1ae81e75c4a1c8230475f3bd8d36ba279324eaee8e2b9ae45ce574

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b504de786ef7f9e9229c2a70051f1af

    SHA1

    93a2519df3923fb29e1159b00eb4deaad5609b85

    SHA256

    e339df1e82c4f0d00135a2fd9cc46ef637822e46542bff2497fecd927c9b708d

    SHA512

    9ed9d625383c58f7e1201a5398adfcb7c896464a608abaf83d17c5883219d4a04b8337f8b124dae68d2e15b567e2d8fc603f55ccc312de353462dcd5ab8c4065

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58d5be7b8255adb79b72858dfa146603

    SHA1

    874ec0f1d3b5fd46bd4aea1bcb39f4bed843d29e

    SHA256

    069b791874b190f8cdd659271b142c7e883c7d057a1257e09ac44b5e30451e7a

    SHA512

    6323963b9261b6ee9e2c8a7ea78927d6897cc7530f9e5d730ac206cba0c361dc1bfe06f34999cfb33a3b3632a38663509d77b817d32e2a1eacdc7cdab41f1b77

  • C:\Users\Admin\AppData\Local\Temp\CabDF98.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDFA8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b