Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 18:02

General

  • Target

    3e54fec605d6d7346fa3db0b2d886a2f_JaffaCakes118.html

  • Size

    27KB

  • MD5

    3e54fec605d6d7346fa3db0b2d886a2f

  • SHA1

    296db747c047fcb2378ffc21f1b348130ace1852

  • SHA256

    d1ec55ed8155968c3d2d93982674470c5dbdc8f8ef0b25adb2c886fd8f75a469

  • SHA512

    fbf8f7f4b9313059a1d328dc98a7ae1a8df35f5ea6c2533cebd1409d3516c44c4d64b9a76d7b2d7977553e97cb3f838ef2b4a103b38209b6e06379bcad25dfb6

  • SSDEEP

    192:uqeR774b5n1ijudnQjxn5Q/NnQieINn2+K8nQOkEntLnnQTbnZnQyCJVevo7Nt37:nCQ/w+KxygcseOhI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e54fec605d6d7346fa3db0b2d886a2f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7eef25a1454d1d567b80fbac91ddb4fc

    SHA1

    1c6dc852e354c6646145021059e136f3eec42408

    SHA256

    0d031e06cda7193ac13c54f1f4571e6712a079d7fc3e154af014d85adcf1dd24

    SHA512

    c80bc9bf7f9e50535d63120cdd9b2a5fbdbc882848c77a64bf4e5ab15750e11e1f3ffafdd6442315d1fcf80bb27c58535137a0efe092cb853411554f03f141ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    96689fd1999ac8adac7c42efa929bbdf

    SHA1

    5c9ff316594c189b770120d979e467991590ae55

    SHA256

    2f741c8adc86d185bbfb18d5c2e07cc51af217f9e708136248a43f4ca0a5e5dc

    SHA512

    43e4f17d438ee3e18984ddd38cbeaa120ad6ff3fbf2b062acd913b2af0a0cbd8b2abc52ea7041cc8b0d91b4406a25d2c1308f5c56ebda15422f36ad55bd5a802

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5b09d47b8705f6445cfe6440f542f91f

    SHA1

    7809a20608ecf4bbd96fc25b9556d85205196ebb

    SHA256

    2e42d53ea9512be0ebb357e38abbd664a918345861714c917bc2df417a053d4c

    SHA512

    5bb4b11849d70069304d995ac9a74e714e665680e1d42f7901114ae736f6aada67f93fb8b004f6b6151fcd880e5c4a5d605644b1c9f630880ebf5bd2f33348d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2b5c7e9e4f04be669d201c76a1d35215

    SHA1

    3e79a2f48f392162a27353de2e90cb709ae956d5

    SHA256

    442ae579ed386fd0c872629c2bb7772df09e73cc0d1e7802741ae99b4b4cb4b3

    SHA512

    05184236c5fbbe5a384c28a518dbdd2efce2db63026a4e595ea2c8dc2d3790aa71e8c5aaac36aa704b7f86265b0a117e3a18c96352e02b7c88cfcce05573ffaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    efd86b236f29175f9e097b952bfe4d01

    SHA1

    69888191763036c1f12d99ff5edb0de4c7d894db

    SHA256

    f720ba912706c1a90b754513d61c39a1a8b2799dd8cfde0fcd8ce6207dc0e03b

    SHA512

    a1be848b3509800176580ff4c58dfb47a32115521d89fd81d24747bdbfaea4c024fab2668fdaaf4accd40b61a635c6efd1b4b4677fac7b4537d453a9c64edbe6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1b5b46b7753bb9374ffe3b18e4be76fb

    SHA1

    5d5bda01956372f9965c55ddcc47831a221ed55f

    SHA256

    85cc84f29a2520b53267c340b35ecd66f677659d56a8a0b5f7f1e10b7eeab4c0

    SHA512

    989159a96485c474d7fb4b25e7361a26b7a298390a3abbe47614d442365705ad0ebca241fa29bbbda787e41488eaaf277cc94eb1a820a2068e5cfebe61b3d640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7b958c16a8c86f7fdfb484afdc3c8d1c

    SHA1

    e583f624ef29dc78a4fc4a1befd1a7d7877b4494

    SHA256

    37915348381b7d69de93fe361f2ed87fa6b4eae91d6794ce2465dd19fd0a17af

    SHA512

    ae40604f55bb7363a89bced5e9a9ac456713f14923d1ac470e98b8327754452998202a71aeaf98198d59e5ed3f351ad4d295aac3b54b56f19f9ebc7d1bca5ebe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b00274a842eee40ca9a0a5623d1fe5c5

    SHA1

    68b098365574f41d8879bbbb3a0ad82cb6845e48

    SHA256

    13627d3ee16edf1c8b71ccb123204ceadb31784ba451bd19a3919c03596f076f

    SHA512

    33a72555d1cc81814f2e340de2dd4c8cc65f02386c4935d5b0f8dab973bbf6f17d62572552edae4edf4f408b53ab688d1e4567a2ea39ce401c5bbc5c38386f56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    81862e3be8b9c16ac571deb1bef10ee6

    SHA1

    ab6f3596c41a6e93478c2dc15b8676a0988cc458

    SHA256

    86d89c6d3af75fd2af61acad9c61669181faea5bf89585b96a240dcf2cd42edb

    SHA512

    f03567ba7e50555770ba9dff2fad9e884c20153fe607963937142ca1e6f2cdf459a8c09cf79075503fa2be60ef5bb7ba1dd6a47d85d79a19984ca7c6e8d92525

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    829a31a2a8786694b1923700736acb95

    SHA1

    7d136ca62f56d5113f0e9ffc6206f563e791f112

    SHA256

    b0b9c5f18a6e4e13885ec36a8b4538881f056b8844f69014f38d6dc8c4f741d4

    SHA512

    eda5ff8624b3fb8b7f58a265f78c0ef69ac2c9483621e2c618c4c113866414fde03534940464970ea4d5c675a7a5b6ba966662ab561f5c0c0d3d13f8b6fcdc55

  • C:\Users\Admin\AppData\Local\Temp\CabF808.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF8B7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b