Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 06:20

General

  • Target

    b21a8e16cb143ae8bdc7b84f3c22c921_JaffaCakes118.html

  • Size

    143KB

  • MD5

    b21a8e16cb143ae8bdc7b84f3c22c921

  • SHA1

    caf4c8b903bcf596c5a3f6502accfa54a8668e21

  • SHA256

    0d209a491c6e3028f34b40a36891642d00d7ad878eed0a840b499b8d758badfb

  • SHA512

    37c61a3515c60bd7207a2d7c8b4f7850ca9e72381d965381a12ce5c1f966f21fa30ca41b79225b14e848ff8747499d3221b4b37ae9733fd356734b2a778226a4

  • SSDEEP

    1536:uaFZ+vkLuTrml44pE/1HSmDICAD0XtGUpt8gzt8DptG1Qd/:sTrml44pFmDnFtjptbzt0ptO+/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b21a8e16cb143ae8bdc7b84f3c22c921_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads