Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    19-06-2024 17:04

General

  • Target

    bd696f80d584a34f90b952e1e5b4c7f0_JaffaCakes118.html

  • Size

    10KB

  • MD5

    bd696f80d584a34f90b952e1e5b4c7f0

  • SHA1

    3a180fe7eb44466f14e36c572edf1d51c27a9dd7

  • SHA256

    9c9562f356d144e0431561e779675ea25ec87537712830422109c5bcdd546121

  • SHA512

    02ee8add36a82457b5c8a4efade24b608f339ea55fa931868bca4c56f04c6da3a11cea037c3cf30225182952c0a80bae6a3668a2c04fdea8849bf2910109695a

  • SSDEEP

    192:bt3Zy5eP6tTtv0MqODrskZ+adJ8L5H7kq28PRY:bt3Zy5K6tT7b0pK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd696f80d584a34f90b952e1e5b4c7f0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads