Analysis

  • max time kernel
    134s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 06:13

General

  • Target

    666f137c36995d54c37558124834e659_JaffaCakes118.html

  • Size

    137KB

  • MD5

    666f137c36995d54c37558124834e659

  • SHA1

    329abb7a41641857305a593ea49ba2d5cdce2383

  • SHA256

    2a4e635f5d2fbb823f62b1728b1d618db91f107692d67189be6e45f73b5f22ac

  • SHA512

    028c3370f1aa8e563c2d36bf4f03780ab3dd745dc5a38aca5c791a91441e5bcc65659c3644d98864d4b5612c237bdee5a3af1c730565d6ac1ba0a03daa97aa17

  • SSDEEP

    3072:O4Ej8Pm+hQih8xXSgQph7TNKenTtTNKwnTzRvAwiaG9uW1:O4Ej8Pm+hQih8GJJJ8R

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\666f137c36995d54c37558124834e659_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

          Filesize

          854B

          MD5

          8d1040b12a663ca4ec7277cfc1ce44f0

          SHA1

          b27fd6bbde79ebdaee158211a71493e21838756b

          SHA256

          3086094d4198a5bbd12938b0d2d5f696c4dfc77e1eae820added346a59aa8727

          SHA512

          610c72970856ef7a316152253f7025ac11635078f1aea7b84641715813792374d2447b1002f1967d62b24073ee291b3e4f3da777b71216a30488a5d7b6103ac1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          115208e3bd15fbdc73879a61d51834dc

          SHA1

          af3f8daf151a5bc0f1c426a4705b2e8a1bf436ad

          SHA256

          58be2bf289ef4807a631add565915d53a328d359af26fc74dccf719d39ccaae9

          SHA512

          d2e0afa831a6c152d0935373b805daca51fa5de869bdaa1ae05b3875c842af49bffd35f7cc3785c589ec3494bc1a570fe844e52ab3810aa6fb25d41d10e15257

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

          Filesize

          170B

          MD5

          7af7790af5dd34ce8a0b15227cf56fcd

          SHA1

          c67aba7905eaf6bacafda00cd07fee23cac7e22d

          SHA256

          59e30f16a13cd102054cfba2a5511a741922372c3973c033ec8e4ce41f192183

          SHA512

          89d678cf15ce43b02ff15d572c2e935f9cf2c8dd8b4e7b17dc6cdaff462814ee273fc2a73466ad3270839d431a8a56bdb13aa86ee05d4f4f81696c4fb263b5a0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          2e73c4cfd0c308002cc128fde5a7a830

          SHA1

          cc2c51912f0d763265e8cc23f076d4594f79af04

          SHA256

          f5e28082896a255e8930e29945455426ad337a0848ffffe292123742a8800c24

          SHA512

          30ffe6cca7f99fa6911d3ef2f96ec679db5a41193d5ad49a5e50e752950f5797a2e8ad07a7ef94b5fbcb1c36f00516af4620a93b141f087e40c49bf6f2ebd6cb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a73897b9b760cb07c673a3d816db0bee

          SHA1

          020c0ad9eb2682be72f75282bbe5dea7613ec8a6

          SHA256

          ddfdffd6a3bbc96b1224bce39a3941d240089570d771ac485f45d53e7953afbf

          SHA512

          3424bafc4dae204465089baf4d6397d99e727e2bd29bc59baa8328cd2545651be5080e2b8955a73c349cbfd0ff43059d6c56a4da5270ab9a1a40e7c657903cc1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          23d817ef89e6c51764ff4677ddb8a9ca

          SHA1

          62577a20cebc3c5ec90004cfc00f5378bb0740d4

          SHA256

          d42ab2951731581d1ba10ff63c70d88b0eba711ec52237ff222cbc143d089bfe

          SHA512

          7db396ab8d2840be9e843ff5f6c65218a910e31549b565ad7acc858d37f193eec9fee64bf416ab75b77c51303404f15dac4a171300b13c109d99efc439a3d9f5

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\cb=gapi[2].js

          Filesize

          67KB

          MD5

          b4b711f3e747704ffe02b49791ce8cac

          SHA1

          ac7ce4cbd3c8ee66e3c8d9d209c1352c160c3b89

          SHA256

          f65bf40e2f0ce993b54772f703f72d53f0fa925457346fa8ec2031879ffa91d1

          SHA512

          b738deba57337a9147927f7dd35eab7c999dea6d2ff11f57fdc2e5b6f64326028a54778886548ba128a3f03ee333cc9e43de5162d8b578b85c290626577042db

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\api[1].js

          Filesize

          14KB

          MD5

          8c8e12de0de8850d227dc33e361bf955

          SHA1

          4a69cea6eb54962067518f82705f2b24da961cf0

          SHA256

          a3f42dffb95c5d909cd78a7ed436bb652bfbb2cb5c16ac6a028005e912acdac3

          SHA512

          f2dfc398a269eb84975a8c893cef4da0ce97514baeef61235f668dbd947b7ef9aeb32726a27c1187c2ff468a6b826b673df39dd0b114f7f2f6867cac8cbaa4c1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\3636781319-postmessagerelay[1].js

          Filesize

          11KB

          MD5

          228da4ee667de7d4cc8382d5b94f9fd8

          SHA1

          292b62c41fb7f7771cb686e7f5cc7ca0d9b7a1d3

          SHA256

          8e99352e0cd0d72871f3f301d165edc14fa22f2aeaecfcd95c81bcf1f63cedc2

          SHA512

          0c9002ad86c7745064afc7d218f1b6f278b45a947c29dfd120bf9ffd3906e5a6e926cfaa5a07af9f2c26dd0f9b9e8c8d81fb35a959314547d54356e28f6f5ca5

        • C:\Users\Admin\AppData\Local\Temp\Cab33AE.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar8AF3.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b