Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 10:30

General

  • Target

    9ddf60c45e3aedf4e31e16bbe8b91d52_JaffaCakes118.html

  • Size

    27KB

  • MD5

    9ddf60c45e3aedf4e31e16bbe8b91d52

  • SHA1

    7f61f6626b2a0174c4a8622219527c5038448a24

  • SHA256

    402cbba529ac230cd0d9e6b57db3b6b94206b7b5619b9503a5d604112c9f73fa

  • SHA512

    7d7d207d04ad71e066f3a1d3486970edbd5e7211aacf3fd7f049e5e373250d86432af09ead72c86f9be68855702c01b3c6518a90eb6a45f5d66465d265201ce7

  • SSDEEP

    768:jK6lrXHQru4XrrUknQwcXV1oaQZgq0RBnNBBeHgy29/6Xn1:dlrXHQru4XrrUknQwcXV1oa9VxBy29/8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9ddf60c45e3aedf4e31e16bbe8b91d52_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads