Analysis

  • max time kernel
    121s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 17:02

General

  • Target

    46ba3142b1248cef889b99f3bdb0ee39_JaffaCakes118.html

  • Size

    10KB

  • MD5

    46ba3142b1248cef889b99f3bdb0ee39

  • SHA1

    f381566abbed0b57776f817bce08fb93b001188f

  • SHA256

    d5d541a216d449019705e3c00dd4d73a07afb77de2d6a93bf140d8428a33a7ac

  • SHA512

    17fde417e3de757b70b7f84c42accc614ca236e8ec8a858ab75ab2e8444dfd41b73d1f503af2bfd9d5972857702071a2a5944576943c070d9a028b447faf4142

  • SSDEEP

    192:2VhlIsr03rpr68k/w1wvqVkZr+BrWrtnr7rMCrUrnrw01PSbauBuLbdU8d:shlIcu12/gYCBKRnfgC47E0YaguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46ba3142b1248cef889b99f3bdb0ee39_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb23da1b40f8981b6a3bd581a88d4515

    SHA1

    4114ef0286ddb6c3e819aea3519e69deb7da8215

    SHA256

    eab3e3e786b8b8ead50cfb8b6b04f78fcfdbe1bf62324f8fcb01544ba926dc58

    SHA512

    c9c21271affb01507dd77602951ca2dc818186187b76cbb37466965341fa4e9c5428a7acb07fdaa690edcd99db866cd2a1c82333c1f5deda4116a36dc2a5d10f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3640df2ccce0c1af7b6ee0f82083226d

    SHA1

    b56f9bfc6b7ed855cda4caf9ca5c71de124bfb32

    SHA256

    fac948010d039e548512620ada48bd0efcb9d8d3a228713bd9590367cb63dcb2

    SHA512

    faf2ba97636dcb753a71d6812bb2523375a0b5a88fb7e69c2ef226f4cbaa8124bafa08daa5ad3d2ad1e892a86b75122d402dae96e45e29066f3dbb80a548f942

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ae7cdef48973da164e3cafdc2f91d7a

    SHA1

    537083570493a033a2546f445698ace43d5d45f2

    SHA256

    015e63a3a5beb5c1e7b6cf819afc6eef86a236f0290ef57c442041dcc62b2fb5

    SHA512

    6822bef5e47f3f639ad5b6a82b0f7d59ae1f3dd96761d9abae7b792b0d227b637ef5ec8a87879ccd224072e060cd6d3df1e2a631e3c73498fc226abe91c1c3b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16e5c8e758b9ac4bab1c486b7075be01

    SHA1

    82091e1a9d1902c19951a02bb10a5b79a9f497e1

    SHA256

    46203a989d25a7c99ac9e47d7f34c0c6c19ff19a53a8192196fab32faf5c3e9f

    SHA512

    a19fd173990cb3cd61b79533084a20a2111cd0370ba1bffd2c73f2e901f8de46652fd19d951f24a6c19713bb735ff875f7c9357d2e57f8e825d4c4e12ec99a51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    506777ab269aad1faaeee296bbfca371

    SHA1

    a40ae260218c055fb209015321ebe921c4b41d2b

    SHA256

    3a0e84595dd388c9965a489eca52a3f82ddf9fe78ba62fe1e4a25cefbf257d1e

    SHA512

    5da771836b3f4ec87465af7169305bb03220bf62cfc8d5ed91fd07e3e622456e00cf3f1cc47496981a1a1af9a19e32f2a7efd845604cc900d964711149d6adef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbdcb5b4f3b514ae3c56602e1474c126

    SHA1

    1b0b88d65917f3a21ec38f9f68fd69f2f293a9c7

    SHA256

    b184a7da8fb2b46a705e33440b64f30eb4291345dbb8185f4e58d378a44096c8

    SHA512

    a7c14d8903c53eb2097b41124c676537eb275f53079b6e3b456635e248474bc896895b552904d131d29dd85c5b6707acf2573fe270b7e0aafe6d174d59786594

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5e63c22519b8777684b3a541e9abb43

    SHA1

    b788d3b619839839aa40c58a82b5e835abf90e42

    SHA256

    ec2176ac588379d2691710766733eaaf0b0786238be0f6fdec092912312be37c

    SHA512

    6f446f75753c1aef9771bf5f841c1c57b06d7b1037068caa1a6f09859546506e78fb4b701144120b641cfb4cf859e538f239fe0b5e244d4dbb736821f43f717c

  • C:\Users\Admin\AppData\Local\Temp\Cab1FD2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2052.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b