Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 04:21

General

  • Target

    b1b3101e7f9d6b6eb1623ec0e9bf2572_JaffaCakes118.html

  • Size

    162KB

  • MD5

    b1b3101e7f9d6b6eb1623ec0e9bf2572

  • SHA1

    65f74fb200f3ee8ced88787b666bc9c782ba660b

  • SHA256

    123489e295aa0b3cbaf751c79351ed7b4d608ab6b379a2e1e121044162ff388b

  • SHA512

    4bccbd77ac23e57f19650afd2dcbbc731b02ff027b23704d007b48bda0fa183adab259a175ca85b1b587fe09a25d81ec550d8b3784a3c09eb1c09573bb3a58ec

  • SSDEEP

    3072:ioVBPR4n4bem8k+8ggGLB9Hrs1LCzoE9hIyfkMY+BES09JXAnyrZalI+YQ:iAFDemk9hFsMYod+X3oI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1b3101e7f9d6b6eb1623ec0e9bf2572_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads