Analysis

  • max time kernel
    138s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 21:33

General

  • Target

    a6aaef54cc3e3e9531ad6097deab7586_JaffaCakes118.html

  • Size

    77KB

  • MD5

    a6aaef54cc3e3e9531ad6097deab7586

  • SHA1

    159f62c43e25708417b913854fef2ae848529d64

  • SHA256

    c2163bc74c97fc790e90d716845b0346914ad8dbef70dcea809d41fdd2fd70fb

  • SHA512

    3e81960c7272bc5927305dc00c01110610a666d1c3810754f4f9a83d4184a7eeb5298c6203be8c96133dc7efa9f846e9e9761efe67a2047c4708b44ed4a27e92

  • SSDEEP

    1536:i+ycJIxiEjRhr39tSutKJr39t2P/OIOII:o1Z39AutKJr39sS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6aaef54cc3e3e9531ad6097deab7586_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads