Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28/04/2024, 11:25

General

  • Target

    05150e0f038c0c037dde7db68401862f_JaffaCakes118.html

  • Size

    9KB

  • MD5

    05150e0f038c0c037dde7db68401862f

  • SHA1

    154221c15a6b2452d2168d0333148b4a900b6a7d

  • SHA256

    f29c024983902b1e693e0316d670fa9d6775f2bc68011a2031c74c6ad4bbe05e

  • SHA512

    c5823b01ac49fdb9c7adff03889415550d7bd82408e9d014a2a73263002207602a6dfeec6359026abf0a8795938b332767b2b96fe9bcdb41d61a2657410776a3

  • SSDEEP

    192:aHst3Oefcfdma1CWcFL397NdcAGRoOQiP8G:3fclma1CJFL397TcAmoOnh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05150e0f038c0c037dde7db68401862f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads