Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 17:24

General

  • Target

    aae5938ab1dd76f7c22243df470a0732_JaffaCakes118.html

  • Size

    113KB

  • MD5

    aae5938ab1dd76f7c22243df470a0732

  • SHA1

    4c63552fbb3d499e5d065227c7f992f28e6fe160

  • SHA256

    8feea042a2b86b3d1dfbaf0e8308a16c4e21685dd25610de56aabfa2c0d3938e

  • SHA512

    7c52e51e2ebc73be57ae584cdfe84f0007e44a3ece8b4b2f5aceb3216ebed8f3808bf5f61a0a98fcfd5a491b0c3b5c51e8ce65e100ebc4b502a2d7fe9cb18af9

  • SSDEEP

    3072:w8QAi82EFTmgAzLuCT3W1QlAqhn3cjVpF:J2EkLuCK1P

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aae5938ab1dd76f7c22243df470a0732_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads