Malware Analysis Report

2025-04-14 02:35

Sample ID 240603-mmjqpscg26
Target 9176cea31238f75fe085f3d9a90361f8_JaffaCakes118
SHA256 287747a14d59d16e620c2fcda207eca439c1cd509dddad32addd4d2ab4ce52de
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

287747a14d59d16e620c2fcda207eca439c1cd509dddad32addd4d2ab4ce52de

Threat Level: No (potentially) malicious behavior was detected

The file 9176cea31238f75fe085f3d9a90361f8_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-03 10:34

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-03 10:34

Reported

2024-06-03 10:37

Platform

win7-20240215-en

Max time kernel

142s

Max time network

143s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9176cea31238f75fe085f3d9a90361f8_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f07e9aa4d8257948b43c7b81abbf7feb0000000002000000000010660000000100002000000098f68e11e8c8d488b9b9568a1e81ecf0b04364a776bf55fea8798e822db4d273000000000e8000000002000020000000c5ee8b9caf34e87668e55ab1672fb0644007fde1359f452525a1dc59ec3fe1dc200000006b9e5974a972d363ba734c5abce491b6c50849acab6734ee705670ac543ab175400000008ce76bb1e8fb4bdebe91a4d2d83c6b45b8ef3a7b5b6c02354d17b7c650f61d6dd04e0a64235686d796392ce958416ed2bb3df04506c2cf0b63bfd7a6a6ce9720 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c991c1a1b5da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9C699F1-2194-11EF-80DF-F60046394256} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423572761" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9176cea31238f75fe085f3d9a90361f8_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 corporacion3d.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.187.196:443 www.google.com tcp
GB 142.250.187.196:443 www.google.com tcp
GB 142.250.187.202:80 fonts.googleapis.com tcp
GB 142.250.187.202:80 fonts.googleapis.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 8.8.8.8:53 connect.facebook.net udp
US 70.40.217.137:443 corporacion3d.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
GB 163.70.151.21:443 connect.facebook.net tcp
GB 163.70.151.21:443 connect.facebook.net tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab1C39.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\Local\Temp\Tar2CB1.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e9e50d820c2ae02cc1e05b1cebbb295d
SHA1 0997b886013637ed84ad7b223a9ad1315ae70af0
SHA256 9a8d46742974b1c091d54e1e2e7bab76d7971157ddd5f6061b1284861af43c5c
SHA512 28462fd4aa06ab008be4b979c162956c090afaa17b2fb121e7b538aa325ee924c7d4f6c479be52185efb3a5a8fdcdaec7aad284801f9eb3d028eefa6e401fa16

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar2E00.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9478c04b5615fbd6e45fa7b14e5ad4b4
SHA1 f39856a8eef90c6dd1fe7eb7edd6564eac73ddc3
SHA256 389fba4453a7ac0b577f6c62e530c27a43ef421fc40f60b571686b542afd0a06
SHA512 71b4afcd63a9c17533c969e6070e43376b3a8337eded653b9229d4d5f2d65fa912e60956d024a9455cde61e63e43b6f9bb0943573dcccaedcc4fe0c45f73a734

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d30ad719853367f0bc4b65c57bff6334
SHA1 3d0dc8a6172ca56489cb2279a3fcf47bd25d150c
SHA256 ebeb506f0370231654cf21b72cbcdaf1c8a42c346b504011dcd06bff1d811974
SHA512 a5959b5b605836e84f6fbd87d95113d94e7160c64df3c0e6ddd6c37975e4f2cf59856fca081d37f4fe4136bc632e40dbf4138da5792bee6abc8e15e6591b8e61

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 197775425f17414f0d30082153428165
SHA1 c32bd86d1b2486ca23aadef5ceac3765e4f014a7
SHA256 124c545eabdfbd8e3bbde8a29b45cbdb12b2cdb05a43300da65cb1e97be3eb28
SHA512 4ec404901d9210eeedbaf57da86e0988ea7cef4eee00ec60f1744e7f5e21bff3eb127119feba122c8b92a9d3233b55e15699b03d0a4111b8288debc5bbfdeab0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 57069d5c48122fb84c68ce92d7f530da
SHA1 17222792de9cb7402401888cd0475e98419f2646
SHA256 42846779ad20bb2f0188f6452ef303547f71d8c15b07f436c362dbd47e49388d
SHA512 cdc922d39c56f67297169b4d9738255ed28099b554e751c0bb605ca4324ee48f4123c347648dde3efea9dd41ff3b173d48c7b88370a290e0986808e19ddd132e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ea17a838785e10d3adb8f7693f48ca6b
SHA1 bbedbe874a2dd1c3757bc5e6f9d086775ee322fd
SHA256 f70a4f69a542989a891f4bc10c43c25f7f79edd233fa65db24f3f66d066694cc
SHA512 34b8485b7550cee2fc0729d49d7623c93d0e6f9ab7a999c6402a9814a3f77338827a0bdba0b7ed3885d9647789e82d6fc8d715eb149316c844cdfc82e02368cd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e6e207561c108cd1098bf71b5ae2dd9d
SHA1 6c6f7e5b21a55fe308140c44885c41ccf850aa7f
SHA256 28e97bb82763fcac7c82cc59f7e32774ebfa1ca552856b9986fd4792ae578107
SHA512 338346d90ffe4204d6d73a492f713014cbd98e0fa56e265e26dd547f87b9111e1f55e6b8dce5527e41053720d90db087a860398b54654e4ba071b5997dba4e26

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 feb001c98b82285cbf4f21e5d4c807a2
SHA1 d7f6c01bd8160381e8d09392d3f55b716d016f4e
SHA256 012bbac6297b30dff9cbd63aae38ef8837435d44df03d731077e0504a779960d
SHA512 84b82ab3006b0c54dc871f52107e04f07b53ded12845dc176afb7062ed0faf916e89861225d84d6233af9425843ed32516a944943df0ae65ade383b200c35ea6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9d40b4e3240159b255ee1147e559a77e
SHA1 102eab8d08295ab61dfc7b6ba3b994f9abca41c4
SHA256 2e721943bc3e48126b41c8c90a84a2b3506e986dc95fb4b3b8f97404f7b166bb
SHA512 804bdfbe44c3eb70a4cf57381e497c767456095f8d3c3dcc30ee7bd545f0c874acf2c2be873465e4d94e1529bcf0cd646a3ba673b056069d44520e348af2a908

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f9a5b9a010105969385f0b14945f5041
SHA1 5620bd7272153e6e99b0d9d137cdbd14fe4f0654
SHA256 c60755fc076f07e4f2ecf3c214823c0f4ce831c21049fd7aa56cdb2267b85df7
SHA512 c1fe4a441d4e3425b8464a45bb50942dca2709da2e9db67c3629e095aba72d0c77ebc7426ba7d66c1e7fc09fc91fd50d27dacb5a91a593e5882eeac6dad209ae

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8980710ba1cce7a2c1af8ea0214d358c
SHA1 ead227523ec2c734d0a30f1385621864773e25fd
SHA256 3175ee590ab2a655ca313ebb085ec81e7048d744843e360f2fa0251fd1752935
SHA512 bf51b07e64125e1aa913ef0f8732e28e8c7412fb2532645136f2d0c873e2a6c50042aa54b5ff92444ef294e7551e1b2cc477b7a5458580722e0f5382e85f99a7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3e25e6d5fc0cbdb75aafed3069c4bd31
SHA1 318ce73f15f85f4a866c782d4a2f306021f78ca1
SHA256 75d32359220418b7df93a19c1c14bcc6e92b9f09e5573d994de9931c07481653
SHA512 76d0b9d1efd3ef37d8e9215b692c2d3fdca96a676c6ec74f07dbdf4acb0900869f8f5756e50d060b20ec1ae19d1961b269ef0968c8a7ae7d75752d8b6fff1434

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 640cb57c08e8a60c5feb20d5f8d18cda
SHA1 ec9f39181f77d9cc1f2fc1721b5825d392649c12
SHA256 0e6d38328c32765e3b8000c25f1805dc9c2c8dce40aea5d99b100a7210afd5cb
SHA512 e706feae9a3ac6bd50cf4892c07305faa359a9c89f89b4342795e8ab9e606206c13f4c562e0eaa3c90f753e6d72fecb5ca21570e48cd4bb358bbf9bf2cf79b86

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 14011cd4068a30fc546c09286c88ef8b
SHA1 757bdb0e019b2e789b2df04d14f4abf0c3044deb
SHA256 a5ff6de1920d0247c9d845ef04282c90055f86b47098b50fc81b1051f9c37557
SHA512 9837b8e7a2b180070b68e2f6eed74c35eb4b566e0fe2f2b3ffd08f1e5037becef4eb9bbb10fd5f92ac857eb89cab6037c6418290e3ffc41cf076eb60e047f965

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bc5dcc65f77b34f3ef51d86c8328daf2
SHA1 3eab99d6a1196cce051205d46092bc0623e38b49
SHA256 a440ecb8858ed48ae067612f77743571722321bc3236a2628a4a4128ceb2371c
SHA512 7afe151d3e0e1e08f6c8555567149c8336711fb6a945aecdf0d558d8dd62a592d6ed75e26b81fec0fd17d8663009e8b6f79ce45b2d29b51ccfe557b619496372

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 54512af4b01590a37e2b2e2bf01292df
SHA1 88cccaf775a4d4e37c39fbb7243b348af02418b4
SHA256 64b4e00a50d487ba2b57f3b7c6f23e52cc727c1987b62eb93508a97f2e2facee
SHA512 71d60cbb73a32fde8a096c0e37edcef0b0dbe1272d9125ed3cf0a3645de75c4f9731fda35454bdecf6d330329027317bcc144c67723a09993e1de74fe026c0e2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9dcbaaa1db04d6467abbd3408f4591f1
SHA1 821e88a2e96843632399b1660949015fef3b63ae
SHA256 7a4f9147379d8af9d2b39b24695920e6c299540cced8b65edaea1e4fb7234e8e
SHA512 7db22b8bff7c5b5b4b28165e7a26995f6c8ffa58868db2a8eb405c44fe4f8dd3c2b7c37a1765762f74f1882a4fd2c19232a8de325870ad6d8a3044081a4dded6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 19c8f98d902fa9551153e4b85a9d73ff
SHA1 3e7eeeda79bc397a0ebf57994a37c0474c622686
SHA256 be0216728aaf3fef04ab111da7a3cc20930404da41394f414deb8af0a459791b
SHA512 93f31f869d11814cdddb117354f340c534fb0d3f9d7b3ded83fcedcbac83024604b2d06a1c7dec2ea0c644b298612b2c6a5c299d7c16bebc5869466bd7a39103

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7e67e0f15f1832dcd9a2a7b65216c04f
SHA1 8dc8286686906a616bb516d31e6ffa0acc1037ff
SHA256 f7518963a8b9b26a702656ee88a07485ec3ccafd4845020c877e4773df91dfa6
SHA512 d7d19eb826238d98a2c261db5c9dd2fa92cd656ae70eb409d94f3c49d79954eb51a95d2609f257a1955a99c0aba6bbe879d98938068d786bbd054b1e6794d3cf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 777643a2c32da2037974d89961cec56d
SHA1 7dd54cbc074580f80884946bbd018a863a06d8bc
SHA256 1f0709cb0c3493b1d856bb22db08709dd0e68d179cd674e399c0d68f85f80e10
SHA512 4cfa9451c299e56cbf0e7a8239931396ac978b583a5826ef86176a673f0937f75348c5feb506342d42adeb987c0628bdc1d864b07c969dcade7aba3896b9192c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 05af0f34eff43dde736aa887a103ed8e
SHA1 fd14600d3fab2a4544fd0787e478375d1fdc9bcd
SHA256 ab2231738cc0e2f2feae05f0c5247403e1a0125a484e0c08bb52b167ece83f53
SHA512 e085343f06c40ce5ba9bf826717bd974f8526bb8e3ac77136147a39c273ed616765f6c96d8fd2f3c65d428476968478943e57113b6081138ac4bed2271851308

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 04ce6808c0fd126d3a6858e49e533ae8
SHA1 ff1ebead7cbb587f3764bf8925ba1a73dc0b10b9
SHA256 926953b4469f087284d573821b72c46ed872e055a271f4216e92bb17a8f0d2f4
SHA512 413b04d1134c0bbb62996fc504b1dc36a4e3c247c03b79407973ee12c120983af6d7e76ddc9d4576f702053b818f292160cb54569943a76a8a6e91e095ae3fd4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a5257274a9163ed664e3b66d91d11f30
SHA1 ed15d1cb3739480ffdf6e14fa4f26c0a0c1cd175
SHA256 83a3dcad461a4bb920ab6d0cd39675222e3b0c2ead1a694932460ad756263bfa
SHA512 863363f802007cf8d128af3680efaab72da3e9a698df6515f699932c56b3906d11bf2c2f025ee060b340d726982eac027290b4352a1a9ad59b888a300cf886bc

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-03 10:34

Reported

2024-06-03 10:37

Platform

win10v2004-20240226-en

Max time kernel

143s

Max time network

152s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9176cea31238f75fe085f3d9a90361f8_JaffaCakes118.html

Signatures

N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9176cea31238f75fe085f3d9a90361f8_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5000 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4832 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5720 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=4124 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5332 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5416 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
GB 51.140.244.186:443 nav-edge.smartscreen.microsoft.com tcp
US 13.107.6.158:443 business.bing.com tcp
US 8.8.8.8:53 164.189.21.2.in-addr.arpa udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
GB 104.91.71.139:443 bzib.nelreports.net tcp
BE 23.55.97.181:443 www.microsoft.com tcp
GB 142.250.187.202:80 fonts.googleapis.com tcp
US 8.8.8.8:53 corporacion3d.com udp
US 8.8.8.8:53 corporacion3d.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:80 corporacion3d.com tcp
GB 142.250.187.196:443 www.google.com udp
GB 142.250.187.196:443 www.google.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
US 8.8.8.8:53 corporacion3d.com udp
US 8.8.8.8:53 corporacion3d.com udp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 181.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 139.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 202.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 137.217.40.70.in-addr.arpa udp
US 8.8.8.8:53 196.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 99.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 195.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 connect.facebook.net udp
GB 163.70.151.21:443 connect.facebook.net tcp
US 8.8.8.8:53 static.whatshelp.io udp
GB 216.58.201.99:80 fonts.gstatic.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 static.whatshelp.io udp
US 104.21.24.205:445 static.whatshelp.io tcp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 172.67.220.136:445 static.whatshelp.io tcp
US 172.67.220.136:139 static.whatshelp.io tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 nw-umwatson.events.data.microsoft.com udp
US 52.168.117.173:443 nw-umwatson.events.data.microsoft.com tcp
US 8.8.8.8:53 173.117.168.52.in-addr.arpa udp
GB 163.70.151.21:443 connect.facebook.net udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.253.64:443 wcpstatic.microsoft.com tcp
US 8.8.8.8:53 64.253.107.13.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 70.40.217.137:80 corporacion3d.com tcp
US 70.40.217.137:443 corporacion3d.com tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
NL 23.62.61.160:443 www.bing.com tcp
US 8.8.8.8:53 160.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
NL 23.62.61.99:443 www.bing.com tcp
US 8.8.8.8:53 99.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 2.173.189.20.in-addr.arpa udp

Files

N/A