Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 18:32

General

  • Target

    9f27c841c6d3bdbe4355e28dae067f84_JaffaCakes118.html

  • Size

    34KB

  • MD5

    9f27c841c6d3bdbe4355e28dae067f84

  • SHA1

    b5fc428117f114d44687c35cef287c74bb24165d

  • SHA256

    23d783f0a987ddeb636f836d1f86a45c098499d4fa1a21f6e2828e3de771bf9f

  • SHA512

    54b8c846cd110943f53c8954c1c8a5a85437d90e1f4448e38c68b8fff79fd693d18b6462aa68f928717d75b9a09a6b66f35fe98a2d7ddb2a59cade57c61a14cb

  • SSDEEP

    768:MSFQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34ahi6781DdRA4vEOjq6h8aRlRV:dFQW81D4RA+vEOjz6raAhIaUC81DdRAY

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f27c841c6d3bdbe4355e28dae067f84_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads