Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 08:26

General

  • Target

    077263dc13296333ca09f52562a110fc_JaffaCakes118.html

  • Size

    9KB

  • MD5

    077263dc13296333ca09f52562a110fc

  • SHA1

    f98e361fef1a9e7b4477b465c94a19b17920a952

  • SHA256

    5a9c9327699159cb2d10147e13f68ae7934a4fcb99d6129a1f5746f0a748389a

  • SHA512

    2280cbb9a0506f5f2935806b8ecf90165ca8b98be14bf93368d3f5d2553fbfcbe19c84bad9ae44ed455622b22e34d30787385a8d1719981240f7dc0ca9d0d4c2

  • SSDEEP

    192:49rmu2XAbUKc7FgkuY2T7Zkb1qsL/7ALvp6pzpgOp2SpNxpzp+apTpzpTprpjpjM:tXKc7OkuYiEo7gBxxpRhxphxR5xhR5hK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\077263dc13296333ca09f52562a110fc_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads