Analysis Overview
SHA256
fec03a340698e2192a763ab321a388af97e4b3687fe1b37d32bc3f7658062055
Threat Level: No (potentially) malicious behavior was detected
The file 846ea3e852528df175dc6b185e48d0e7_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of SendNotifyMessage
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-30 14:14
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-30 14:14
Reported
2024-05-30 14:17
Platform
win7-20240220-en
Max time kernel
133s
Max time network
127s
Command Line
Signatures
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d22cce9bb2da01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F693AFF1-1E8E-11EF-85B9-4A8427BA3DB8} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423240351" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a77bc11c96bc624caa13c5b723162be200000000020000000000106600000001000020000000b86aefabfa7e18cd5b26ff3574469ea17f4309cde2b222b947f2598322aa3ca0000000000e80000000020000200000000f6815955b8ffabcfd3be76464df8956aea0b2f34dda1f806e9e1268962c5d46200000007d7ba49dace2decb03c7c8844da523ea684431e08cff17208a4cced2c6c7957a400000001c3077b4991dba3dfd1056cd74d73645cfc8cc1cd84c832064537c44921eac91cc1841b2d93f4704adc0fbe77c7257e6f68f0685a825987b20befd214d54833b | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2368 wrote to memory of 1408 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2368 wrote to memory of 1408 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2368 wrote to memory of 1408 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2368 wrote to memory of 1408 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
Processes
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\846ea3e852528df175dc6b185e48d0e7_JaffaCakes118.html
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | kresowagdansk.pl | udp |
| GB | 216.58.204.74:80 | fonts.googleapis.com | tcp |
| GB | 216.58.204.74:80 | fonts.googleapis.com | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 8.8.8.8:53 | johnftaylor.com | udp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\Cab39D7.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\Tar3AC9.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5182b0e085048d28f3c27318608aa2b1 |
| SHA1 | 6d26fe28fc83b03ecc83cfa177b887bb8ce16373 |
| SHA256 | 4cd107d6b1925453abb04033a45fd4bfb108644f8b7fa7c89811e250aa202801 |
| SHA512 | 96db3525b8085d57d6a893fa8e4825a3faf5d6d9a2292364294b73be480bd102761e0981925f8bb5b55dcd54137d91c6994289c8e0652b871a0a18d014028f13 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 28d99f173b5d09cd34c62d8b8c0e3d52 |
| SHA1 | a6a2919583b1b308bf9cbf14452f45bfc6316a8e |
| SHA256 | d4f5bbafe6262e2a7cd25660a7d77a446ad223b94d2a23c269052eb5c93e8819 |
| SHA512 | 5db365776fa5e758e6f8fc3c5c9fb2e29902a5d3af0c09d19c64d482c39c259ad194d18ebb7271963669ebfce9e41484fa9ac57577dee9314479ff2d3c910be3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a08f9cdcc700d9350dc536073e477041 |
| SHA1 | 1b700c2fa1b9053b99c43d9fbb4f6696b9de88fe |
| SHA256 | 5e4ec72aad3b142e669de40e4c2245a4fd006f8908f450c6118673e93304e374 |
| SHA512 | 859fd60d42463ce3a99189e733152e31d18369b6c2f33e9e61385c07db6c044fee43adcc9d5071ea49d20c6d95e89198a4f5a3bc09ac8c0d4b632b329a182684 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 22b296d0db01c1c5772246eb0f8510ef |
| SHA1 | abba17f67bc655ead551a7c61ab2f8162ab9d8e7 |
| SHA256 | b8a03cabaa818cffff4f81f00b43d01607fefd4ea08b5e2ea505dfeb5bf132bf |
| SHA512 | 075a1aa563a01cd2e0d7b76b7a545103796a3bb71d3fadc665f29cf62ef0d373178fd94b3181c2b20d99265caeadf745e1618200632e24f04d869aedae6526e9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | e777bef9374cfc02e2583260f49ab36b |
| SHA1 | 0e38c39a256d4f6bced71f11cb825c963a88a9af |
| SHA256 | 1e4767ca73dded1086c8afa65957e2b1abd9252d5fb8c040434d8371453bbfd3 |
| SHA512 | 0b6588f4694ea46a502603261b93014f2bb133da4d423c7aa8eab18ce1ca4d917c7085d5a44876d8f912111513e4cd3bc4ad9e5d13c59654ded82f0b29c3e923 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 89ab37d1aad9988a3d8883ebf59b7111 |
| SHA1 | 0f744a6a2c7a3bb61c4eee089456edb52a015796 |
| SHA256 | 5c47d0bed3fe25f86e810999ca7b7933e77239538b9d0db96c9d5f3755111f62 |
| SHA512 | a7680ea03446b72e6e4057b96496bb9fbe6cc9ab86f92bdc215a0a28b1b8b1c6afda4dc11653c8589f73ab4f3e2075ac192d90d03e8380d2589e76e6582812f9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 28b59a3dde3d464edf4906737ce6d8ab |
| SHA1 | 5e0090e45f256303d7958a86c4caf8a8953cdbce |
| SHA256 | 23ec9e158dc3ba08f34cf47fdd854c0f99832b5f463b88983cd54ad8178a3dcd |
| SHA512 | c945a770715bf8ea3142bf9275624ea40cec21bc97b09cc6406a0fd7d029570c3d1a999dae479eefbd8bf2e8ee5d0d86c47da28df269a11b38fb236601590287 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 38c8d7ea6d9adb0130af55826c036a17 |
| SHA1 | 673114018875e640de49c44e84a3b79cfbc27db6 |
| SHA256 | e15b3fe5ee9a8d3ad39bff43af907308956d764f9142aaa427ac182e21060337 |
| SHA512 | 8707da55906007441237ec3345421a92afd37540646848181ec0051e4f384d43886075376e80fc2f377a21cba74b072688d518dc0c5c973856bf1d6f2da2279d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a27331fd063e01b647c725382cfe9478 |
| SHA1 | e02728b3c06f085dca614846ccb1144f12d68896 |
| SHA256 | fa6c8588c577f1b6aa9c50ced96fa72daa14cf6c3ff6943d7af9f945f37da142 |
| SHA512 | 2b4e9faa3b27447f58d8a12b3c1fc00270af608a704e32a5334ba25e4720b0cb1fba250e18739700dd26a74cb20bddf2cbf85e351cd9a11237db8dcd60230129 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 0e12ebc868a8ccf6c0e649846db87d8a |
| SHA1 | bc52064d7c483e54dd6b249d60a2a8b24e3dc2d7 |
| SHA256 | c7727059dd8476155e0fae49db0e0ce6c9849e7e77cc30217984a2af17996b03 |
| SHA512 | f58ef7123407047c5dd414b5ae2ee0874813eb8805eb5a4f728c970d9def5918fc37d11397e1913fe64087697dc60b75b8cf748a11774ff132a6d9555c9b3688 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 2d8cc9d7f27b845fc5498af8311a9d65 |
| SHA1 | 16b5c0648e52dcee6811c687cf7f08941517290a |
| SHA256 | 99a8f7e87a7b3673f2c16421ba422aee9f1214cf8c057b6abe6390b324e40f4d |
| SHA512 | 238e7039ead3bec0d91f83a14801cec9c2db796fa9c3b49cb20ae91970573e1a1141449ee0505fcd12bfd9693bea0a10e93701cf3c1e59f652007bdd7dec5c90 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 2c578c6e1f59b6d426b297b974d8db2a |
| SHA1 | db6456aad3b1cd4cd1180da1d4e4e0103855842b |
| SHA256 | aae8ba55995cfd47ed980d2cf55e56ab51bb69fca2ec91dbdf290424e3929324 |
| SHA512 | 421c3f5dd5e9eef0e147c5b15d02b19b9f716ea9121e3a12a001cf4687cb22c44feec3ddd34f302be6d6818d1e6c0581bc9325e803678e1297524fb5d3539192 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 1b879814db6b4b3c5f971e1c9f0ee4e1 |
| SHA1 | e3924ff03bb8adc05a9ab54cdfc732de023e156b |
| SHA256 | 88726fd6a6a0bd35212b7a797d47c13d868a76a68ae40bd8ab95e8fbae5802ea |
| SHA512 | fb58a3a0575db00b9d6aff7a62fdd4cd5c757fa796b6e513253636ef283dcfa6ca5ce4d426af5774d71cd445541e84fe0d4a9a05dac035f95af94b4d8b3dd979 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3c82dd76374d7c95ccf3010371fdb4b8 |
| SHA1 | 79a11dc1e7b7c84010a3b768bf312227acb232cb |
| SHA256 | d2821a10d00850c8ca16070508de93a15cede22b577d3ef444b1d179eb16e953 |
| SHA512 | 97f8deb301f55838919c96dda951441a5cd0fbc74deb3207672c15ea004931b09b65eeaa3548c769ed222c00e9dd9251994d0742318fcdfc7c564a387fb0d2e2 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 0d73c0e5cad8640174b77639c8f01cb8 |
| SHA1 | 01b768f1dadefb1773901049466b4170921dc43b |
| SHA256 | 95612f3e2d2f15aa07623a41dd505cc95f6e7db969d092ee626a42144b3050df |
| SHA512 | 2c877cdb880316ad50b0e3ec4b050734f1c6c4c59fa1d8f25437e14ed019d041f4e0638adbb275cdfd5931ab8b771e003090eb9367e6fa025c9f0b639d92952f |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | cf0f89fde6372f907af0ec3bf53b3604 |
| SHA1 | 4745f093ce00ff4692d6490ac6f0fcf42d5836f5 |
| SHA256 | 07de9c104a575aebab38b91bca02d0cccfad472a58d095ab39777a35cd82aa3c |
| SHA512 | be88eeae13dec3031b6e3cc2a587a79518a3991e8dadf05b620e98e57ffcd5b45534026695295ed69647a33b50a7d872cbae4f6fefcd8b69c595071b675c169e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 40ce35ee5e87389484563d3e09c66dfe |
| SHA1 | f76196aa33743903169c4b13f1a576ba56022b45 |
| SHA256 | 330a29059b2004ec2a20ad3797a4987eb062fc4aa925c6ecb2881594dacebb28 |
| SHA512 | b84e0beffb50e3659b69e92f2c281f727deaf0d54be282eff861c5f2c4a0637607fb472ba95c1aa0ab6aff2c210aedc14c527b3e39d105cff55a274858c7f786 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5d57d58cb861c6877f95000b6abd9276 |
| SHA1 | 446c18553addbece7d167a22f53caecf4ccdb489 |
| SHA256 | e07af1ba0959ac6c0382f1098bb68a571369e65e1ecf7af0f5fd52a7e371a12e |
| SHA512 | 8f4d58956d179a12b768b5a68e8c27166f5adbc9acdc17ae8935dd14875550b80079612e2511bfdbd19aba94fd5ca1deda612892c2cbcf5788135783467e95d3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f4ad281bb902abc13bb3fa305f9b6673 |
| SHA1 | 78187a276847d4a80a07be84afdbc310104bed6d |
| SHA256 | cc25466fc105b0428cf83c04c92f4b2959c50f0ac1ed84f2d3c6e4f7880bc0ef |
| SHA512 | f328f246f56e76396470b873a1140329a7dfbb77b134399c3b89c9026117d742163640bc9fa1edf3018144f316180960c52cf7669b5a2243a165fd4a9139a63b |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-30 14:14
Reported
2024-05-30 14:17
Platform
win10v2004-20240426-en
Max time kernel
146s
Max time network
139s
Command Line
Signatures
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\846ea3e852528df175dc6b185e48d0e7_JaffaCakes118.html
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa597346f8,0x7ffa59734708,0x7ffa59734718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17573921461948678348,361512034887940369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | kresowagdansk.pl | udp |
| GB | 216.58.204.74:80 | fonts.googleapis.com | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| GB | 216.58.201.99:80 | fonts.gstatic.com | tcp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 87.213.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.204.58.216.in-addr.arpa | udp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 8.8.8.8:53 | 99.201.58.216.in-addr.arpa | udp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 172.67.213.87:80 | kresowagdansk.pl | tcp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.58.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 215.143.182.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | ecdc2754d7d2ae862272153aa9b9ca6e |
| SHA1 | c19bed1c6e1c998b9fa93298639ad7961339147d |
| SHA256 | a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7 |
| SHA512 | cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2 |
\??\pipe\LOCAL\crashpad_4820_CQDXRPQRAJYRSUOI
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 2daa93382bba07cbc40af372d30ec576 |
| SHA1 | c5e709dc3e2e4df2ff841fbde3e30170e7428a94 |
| SHA256 | 1826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30 |
| SHA512 | 65635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 7c194d100c4d3b89701237311a542d03 |
| SHA1 | 820785acbda1763b5d92462e0c6f7651ff1927c3 |
| SHA256 | cc87bb7f4a3e932784b1f93f0d851960e002234b80b8679d0bfb22ce44139d46 |
| SHA512 | ac6bc142158708a763134744441a5bdbbad651858ef3bb0297a238310ff9cd7c15997b09982a6de5718a3d7b1661369adf5be12287def83137c6ea103c38ce2b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | b3ee45fab7acf4ca5406bfc0d7287320 |
| SHA1 | 52938fe809934749d29ca4bd24f95652d6325f6a |
| SHA256 | 4d97515cd5102a2e1f0a3b51ed628434b52777a56f4df544b294f38815451fb7 |
| SHA512 | e2d3d9fe456f857d372dbcc3d2ac73a489adf51c3b926ee102035b3abb37a1308f6af64995e58884edafb6e9c8a3d73598f70926e25867844f249c05a7cee980 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 78c3804295dfa6f10f73c5b6d2a001a5 |
| SHA1 | 89a3d880236e6d3244cb6cf77ee23b18972a0e40 |
| SHA256 | 0fa7e85efb33d69ea73f68c23548a4b82d27449bf2ba17b1e210eb8fe0c95b99 |
| SHA512 | 3b0477d297296bb09609f114d4ecf870dc32564301a9d4dff3b854b9e81bb58880d7a15a8423b726542c47c46f08c413d04aaf07b975337d532449d21d8f5cdc |