Analysis Overview
SHA256
dcc3ba86826eff8ad6ac7b33c36305b63efa0d3b66e6f0a1925830a150e8631b
Threat Level: No (potentially) malicious behavior was detected
The file 9107c84816544a9898d2c1611e30f868_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
Suspicious use of FindShellTrayWindow
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-03 07:57
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-03 07:57
Reported
2024-06-03 08:00
Platform
win7-20240215-en
Max time kernel
148s
Max time network
149s
Command Line
Signatures
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423563341" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB9AC9A1-217E-11EF-8FD2-F6A6C85E5F4F} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fe69d08bb5da01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000083f4d11676f81b458fb4d703bbb22ad00000000002000000000010660000000100002000000099a684d39be2168a346d1eae1d1c9aef3c8c9bcc60b12ecdc1d629640e6b0743000000000e80000000020000200000007247099dc029241f5d86be41d536961b46a7d7155ab6133f28a23b3ee688305a20000000c78be9e817302076b015e8ffeac6a5d843da08098e9d316e5218c8705f743114400000003b5c4129336564e12f358e9218faec0a70aba77bc678a0c942aed16b8dce2d5264bb0413930795d403ccd84c9721f8fa89774397046be3d7b117f7b0d74324dc | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2916 wrote to memory of 2112 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2916 wrote to memory of 2112 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2916 wrote to memory of 2112 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2916 wrote to memory of 2112 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
Processes
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9107c84816544a9898d2c1611e30f868_JaffaCakes118.html
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | yllix.com | udp |
| SK | 185.66.200.224:80 | yllix.com | tcp |
| SK | 185.66.200.224:80 | yllix.com | tcp |
| SK | 185.66.200.224:443 | yllix.com | tcp |
| SK | 185.66.200.224:443 | yllix.com | tcp |
| SK | 185.66.200.224:443 | yllix.com | tcp |
| SK | 185.66.200.224:443 | yllix.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\Cab2F5C.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\Tar303E.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9e9bd141511f7c7af2173b581358f7e5 |
| SHA1 | 23350e1c45489bad8159ec1bfd202a76ce58e9a3 |
| SHA256 | f3527bae25af791c2e86f4d42e76fedf5aa2eb6543824552dbc18cedc4efe48d |
| SHA512 | 043bdf182cdaf2a201e3d8232b5fc71f7afda4d6a3ea15b13454d3cf70b6ecdb94159f8b7d695a220d0bdc40797ff1d76f28857b9583f8fe71e3ffcd8d4c684c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3e0f261f9534949607fc34605f23e836 |
| SHA1 | 93ca9d33f21f5454f6b62ed6a4b7b15b7fd4544c |
| SHA256 | 1d4320863e1ca0e6eccc880d338b4bdeb047374d224a4c65ac9018d3adfb9552 |
| SHA512 | 7fd8d8a8e6a663b502092fbcedd5392f559a3a06a22d68eb2d06359ee70b83fab1302b35d1f0d0a21988b7779ce4e39343afd52f87b534aff9b126ec83b2099c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 07cf6add833dcb316d7bbc7e833adb58 |
| SHA1 | 1bbcefd3a82760ceb29d4cf699d70790baed35e8 |
| SHA256 | 76df594bb4fba0f87d9a893a5de4960e7ce08f8d60da8e0dc8a9a12c7e9ea89b |
| SHA512 | 579bc37efb0e3f419985ca275dc4222b88eef616844fadc84869daeaf53e1f3b0d11e241048c1841f1296cc76b17dae4eeb3291c23564b06d8760e6b70a5d10e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 4b1fb991e2c82b6d8c1d145f8977ab35 |
| SHA1 | ca20e3b7d1a3c01d1585d5bc806b9172d1b852e8 |
| SHA256 | acbdb3e7b5798cbdb29e8b392b4ea1c5ab0eb7bbc60ed7d07b227e902c9e756a |
| SHA512 | ddf3b6679f129d0b9d329ae135b5c3183b36780406c33b01c0688d5f88a42bcac15fd9544179681141b6b09981dfa6ed951cfc1293d07c76e8a91c229c5d9d16 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | e16aac08962153cd995368dd7268b6bc |
| SHA1 | 874eb6faec3d5aa6ec73cd33b0a28f8b221e79f3 |
| SHA256 | b054f6cca330b171d7d0a2016dc92ae3f4a4d9abfcc2a93500e59849588e453e |
| SHA512 | 206930418e080268568792f14ffcbf4c81a9ca6b4d7f8b2bb1a54c2cfe8ff89cfac70a809dffcd74e57330f8b6525f67fb4b0ed01c89c633a039eee625bab323 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | d244fa42b43c53cf6c56713f3663b308 |
| SHA1 | a3001569edae8dfef4a49e23d764b4f199af7839 |
| SHA256 | ee21343e142ee4129533c60a8ad6c64b71e2990be4682bee3c336922b4bcc25b |
| SHA512 | 032aec935214de9aab982abee76e0f616abbb974b79de5f768273d4fe6f2c9553f5fd80e08f4a6f7695de93eae375d81ed7d78d11849b199012e2c4b1fbcfb2f |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 98386ad84c8efb3bb0e6c6e23162919d |
| SHA1 | 57c9a9923155cd424dc6f26d138c81de3f716483 |
| SHA256 | 27a0c7a194e0649b2e8455d851a31915d37b515e5a1843b8b818e20f384468ea |
| SHA512 | 86e73ba3c82f1f5095257595a0d42128893ddcb17399c877460001fcdb114e9c3142a085932c225fea51ae852965cf739c483480471e13e6c41dca944be57043 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 7cf30d9f0ac1f534f1a766e0fcc6e1b5 |
| SHA1 | eb37d61de6eb3bcd7f63b54711cae5ee83c5ddef |
| SHA256 | 5cf2457e7f4e6d5df0d78984a0d0143e59299f241712fca78f6e9e04dae0efc9 |
| SHA512 | 9e69e7b00445463b6f056ea605615069e2ace036883df0d025e2bf8aa14b9c8f05ca7915650562ba543c3e49e76430cf118b44edcb323465f3c73899afa34292 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 6b76c212d8de62e9bf2c1791e563330b |
| SHA1 | 572a585ded473ce122fc582db762171907acaacd |
| SHA256 | 4482257de98613c8c73f0219a866fe9881fdd80d80ebf44de277f4f2b3049f71 |
| SHA512 | 073f7b20fefb4c2cf64eff913a131a99ebc5c6408717c1cf3679fbc05281655e903605fa37bfe1120ad0505e95b10e4586ff5692c50a8ff22e131f9265db62e4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 70ec11320eb678bdda6acd665c68e774 |
| SHA1 | da156ea5c5140115630bb3a931e93fa99b8f8059 |
| SHA256 | 599a371298867b47e292202c6b15d2d2307da600d6847ad435f473de3a2df047 |
| SHA512 | 683ed0f83492b5dff51fc6b50591023a67f996e0d8ac7953041da17b29e540d47fcaa2fd0d35de3b2a14b3f48698cbd6aa6c748e7962601dccbb176b4bdc1d00 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 69e1eb1ef2a8eb1c005cb1c0f8a12733 |
| SHA1 | a5ab9bf61afb6cce94efe0b67218ef5cb7cd5166 |
| SHA256 | 8183f673dd97026824e2b27b9bab1b22736d7170f3cd5918e9316c8e0edf31f4 |
| SHA512 | 4e0e70f8889f71bc3939e7f531397ebe58452d5f0942ab4f2d3579895e860cc9422b1478496b061c536c213fa4da14a95b3eab8ee8378b381e3d8287bf22046f |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | e769e9864cf7e8176a8153dd8f4dff24 |
| SHA1 | 22db9d971b5008f689bf7d13f72f2dfe4508c2f5 |
| SHA256 | c080ea2713a68f8941c938d965c34b0a0139d2e92dd518992e2d39762e8b29d5 |
| SHA512 | fe80de15a1f577708d6b1901ac1d4e03d9601265fbd127f701bed3e9321d88212fd3c899b348a4d34e6e3f7b86e54bc29cf45516a52a9ac799124fadd766f600 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9410b7ed2917a6039f4c19e95585515f |
| SHA1 | e7ba25cdb9bfbb79141c333665862f78f7cf3d91 |
| SHA256 | d972c4ebe96b0f1ed5468dd5881a8da3f870623a3c2ac6304eeefd1f9e617148 |
| SHA512 | 6bb0c2a0ca1c36533edb34707093a819f2dd85022539cca56d6d274004016a9a129d14d85577715f74678f1f9659cac07be7b787547e8b8c7123354de00fb27b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 121dfb14d81185605953600f848361dd |
| SHA1 | da87a9aab5457622e93496414aa52172ef73ea93 |
| SHA256 | 1707d3c714478d864529e0c638ee06804239f4902df20fe9d98b6de8cad26d0b |
| SHA512 | abf59f8cc3d792ecc3897b5edaa224be512f7ea20829709d6749b81890a303d836c6dad0bb67510a04465ffc831505459a2d8b65c7c62492482944544db23e19 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 1339e988bd918445f3f8430064e9d56c |
| SHA1 | 3d1476edc982006356da618bff73cc0deca471ba |
| SHA256 | 7d3221e487895c007e4ee96d6b500f97a0c5e2b29d64936fb3aea354b642d221 |
| SHA512 | 94e27efd5c70b3a6e8c95fd8f24b01721ef3a0c22492d4aa99afa2188e9baac8ff5e954bb91a998a8be278d23cfe9c8761fe1650c2a1f935a49257917fcd2501 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 6105d8d59d57e8fd3313834c5530accf |
| SHA1 | cb02f01312641a42ae2c3ed4c90c882ac1e63c2b |
| SHA256 | 863235d2a52452371e3cf9ce2b1043b4f50187656a283d720bd01ef0a38f4c11 |
| SHA512 | 1fcac37fdb12fbb18db179f0f3f8375f844f67eaa34a9f464dc343e95191ec509799c7f9bce95e9fca448dbeef4eef23a7a9d72fd1172b0765bc80103dbe8ac9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 06084a2f9ffe23cac2010a2fd9d2851e |
| SHA1 | 72633de80ad0269defc95f7b751a779f954d65cb |
| SHA256 | 451618f6ad1bbea39f267fe8557c9d80a8cdbbc603ac861b415efa90bce27fcb |
| SHA512 | 1da401fef5ee55c54eef3b1ebc4942141e02de460fe674cf42254b38201fcc6144c193d48d71d037e630a5d129ebb4e6986c7d97c148b3f31783cdcfc3bc2de3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c6697b3a495cfa4af0bb207386cc15cd |
| SHA1 | 58cec6597ab4449463265218f14d6d917ac42f8c |
| SHA256 | 1f092826c73822334cf58209118c5dcfdce2e64104f4cdf54bc3a3594871c04b |
| SHA512 | ae955226d3ae777fc5dd20f3c7e46bea2e2eea836f1d94e93a8843d8019f5996b897fbeffa800d1514a62becf30dd06c23f1a38ef2165d03aeea496589f6f0cf |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | d4993a94d7510dac825d5cf5368e4050 |
| SHA1 | 326ba474b643d8a82c626f2d89ca0b97c014a03d |
| SHA256 | 11d54187f4e3d33ae484b563b5983f865873e23d7c2fd7b329d34446dd398cf9 |
| SHA512 | 748875fdbfbd69cea442061c883b18453d1aa396ee3236e0f7b39360860614c9c66a56c3f95cadc67c5ba656d9226f87286d4b225ab0953215a9b343023a4f34 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b5f3b94674b4e03f5b9cc0811dee707e |
| SHA1 | 6377edd58fa55df6916f275c32ffcc9a7e328b16 |
| SHA256 | d40b6c87e200bf9b925e22079d83340cbb379a084581ad01c13ad46941a346d7 |
| SHA512 | 20a03153933801650f50744db152fe58aceb39d3d01d3149adb3b6491708b8b7645f983b8082ad85821c5132a97fb04390b1b24097fa85c6ffd603b7a779097a |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-03 07:57
Reported
2024-06-03 08:00
Platform
win10v2004-20240508-en
Max time kernel
145s
Max time network
128s
Command Line
Signatures
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9107c84816544a9898d2c1611e30f868_JaffaCakes118.html
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bed246f8,0x7ff8bed24708,0x7ff8bed24718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10850046983384275645,654354721446824542,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | yllix.com | udp |
| US | 8.8.8.8:53 | ylx-i.advertica-cdn2.com | udp |
| SK | 185.66.200.224:80 | yllix.com | tcp |
| SK | 185.66.200.127:445 | ylx-i.advertica-cdn2.com | tcp |
| SK | 185.66.200.224:443 | yllix.com | tcp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 224.200.66.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | ylx-i.advertica-cdn2.com | udp |
| SK | 185.66.200.127:139 | ylx-i.advertica-cdn2.com | tcp |
| NL | 23.62.61.113:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 113.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | jsc.mgid.com | udp |
| US | 104.19.132.76:445 | jsc.mgid.com | tcp |
| US | 104.19.130.76:445 | jsc.mgid.com | tcp |
| US | 104.19.133.76:445 | jsc.mgid.com | tcp |
| US | 104.19.129.76:445 | jsc.mgid.com | tcp |
| US | 104.19.131.76:445 | jsc.mgid.com | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | jsc.mgid.com | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 87f7abeb82600e1e640b843ad50fe0a1 |
| SHA1 | 045bbada3f23fc59941bf7d0210fb160cb78ae87 |
| SHA256 | b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262 |
| SHA512 | ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618 |
\??\pipe\LOCAL\crashpad_4268_TLTUAXRSZDLYMVBW
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | f61fa5143fe872d1d8f1e9f8dc6544f9 |
| SHA1 | df44bab94d7388fb38c63085ec4db80cfc5eb009 |
| SHA256 | 284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64 |
| SHA512 | 971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | f9aca87596bf8848d42b516d43558ce5 |
| SHA1 | 46e87bb397225a761a956f35018f496b40d59714 |
| SHA256 | 39c30d57626e87cd27f7fc79d8142d6fc418715da86b8a4a7aceb13c3f74269c |
| SHA512 | a88220f28ade4bca480f9f111b19d19e9de04e8ae7692cb44305bca83fbdd222fb4e7547dcbd4b4ab48fca93ab7b62bd786e8ec634051cb4c1bdd82cdad40612 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 206702161f94c5cd39fadd03f4014d98 |
| SHA1 | bd8bfc144fb5326d21bd1531523d9fb50e1b600a |
| SHA256 | 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167 |
| SHA512 | 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | c2eddd1c3f35a14dadd41a313c76632e |
| SHA1 | 93531c220e0b2bc5a65638bce06764af287b314c |
| SHA256 | 36f5201ffb91432e6cb366d8a0af8ec65209806a747e7d8e10244083d15c5fa0 |
| SHA512 | 7e099344145e697f56edd9df2cd6069a4cbf0cb636ecc8b6c5a210b2a5b3471a3fb811618f8e3873ffcfd2949655268d32d600a02c24d21c14a6293025b78bfc |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 538f015b6d6038d39a8c11f7464dd93a |
| SHA1 | 68de2e302019c1da0b74316aff1415f66f6b6408 |
| SHA256 | b20626cc2c73d83a929642f8588b40b42affc15ff9c138e8f35e5adebe3a4121 |
| SHA512 | c37d06b94812f0f06c5f770faab90067ee5430c0c88997f5cd6a6f3d5fd83d72f5bd8c0abc24e6171bc9ad730c696da8dce34f67cd972df3e59e8b948397aeb3 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | a5b784ee4d61136390d954b047539cf0 |
| SHA1 | af7051e0a9b735383858b969b1900b753faf6dcd |
| SHA256 | 52e3eae22c47a33778d4e68c4a2298d7cf6d9341eddfb130f37024512ec8f5cd |
| SHA512 | 2fe75143d1433f36aa7d395c0c7adaabce2770e365a9313d1a2c03eb87bee0be269422d15d1edd7b04dc37a4c18135f0e749846d714f59ec92faa6838e06e322 |