Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 07:19

General

  • Target

    9d674a210b6c28c832caaabc5ef6b382_JaffaCakes118.html

  • Size

    32KB

  • MD5

    9d674a210b6c28c832caaabc5ef6b382

  • SHA1

    4445284b6492983c7cc88205643b5f6d7f966807

  • SHA256

    357a8c379fbfbc1812237098ca445f6c7d30b647ed0c48cbb2d0f88c3da75c16

  • SHA512

    668f05ca993aa5db1f87091621e77eb20e130cfd4120f3791933da89f91a2233668a32e747e1e6b05192b2745c0858b748f820ad92bf7e8a67e2079a44243c78

  • SSDEEP

    768:ECM40mA3TUE02bCNCfCfCfCfCECECmCmCabLuQb:ECM40mAIE0eMee66NNll1PuQb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9d674a210b6c28c832caaabc5ef6b382_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads