Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 02:32

General

  • Target

    b158852a5c7fe67905596271d4d7863a_JaffaCakes118.html

  • Size

    18KB

  • MD5

    b158852a5c7fe67905596271d4d7863a

  • SHA1

    a8e9b808b80bfe553dd97bb30b485da383b6d78d

  • SHA256

    245c5f992bede36df819b60e35dd86538f9e19653405386de0790d7429338489

  • SHA512

    c6e4304ebdcbdb4b81d4b6704a0c066d8fa5225aad043069c7e615e42c80b56096f6123704adaeba5966f9eb64bb2c5fa8487f6a6c2aa691364e7b9b6adc019b

  • SSDEEP

    384:JIXasg6ucujpzLmqj32UNZ6/jIBu8NONm0dhgohNPjlK3uHYykKb8D5:6Dudjp3zj32UNZijIaJHK3uHYykKb8D5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b158852a5c7fe67905596271d4d7863a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads