Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 06:08

General

  • Target

    ad1d1c9a99a110b6f20cafcc833754e2_JaffaCakes118.html

  • Size

    32KB

  • MD5

    ad1d1c9a99a110b6f20cafcc833754e2

  • SHA1

    c1429da9750abdef0c1bd5b8c2db97c932c69c93

  • SHA256

    0e57072909a3334f94aea5471794cbc4086784a5fa9daa85c21211325e1a581f

  • SHA512

    f74edd709633142c05a8a9450a0f6d12c18bfa17e9d4281efb3d9472e6bd265ca7fe9764d1ea00837599e8784cef8e69819d86e4fe92a53181118a8a1d00c19b

  • SSDEEP

    192:uWnyxb5n1/DAnQjxn5Q/hnQie0NnoPInQOkEnt7bnQTbnwonQslXCxATWDszKP63:YQ/2Tsmnj6yRyrsXa+/OC

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad1d1c9a99a110b6f20cafcc833754e2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads