Analysis Overview
SHA256
5606c88bf2d3235fd70fe9218803977e1515ed147af076e2ab9936e9374141e3
Threat Level: No (potentially) malicious behavior was detected
The file 9a6164661a03cee2c3ecac42ad648871_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
Suspicious use of WriteProcessMemory
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-10 04:25
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-10 04:20
Reported
2024-06-10 04:41
Platform
win7-20240221-en
Max time kernel
48s
Max time network
129s
Command Line
Signatures
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{877AD571-26E1-11EF-BC57-569FD5A164C1} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3024 wrote to memory of 2088 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 3024 wrote to memory of 2088 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 3024 wrote to memory of 2088 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 3024 wrote to memory of 2088 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
Processes
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a6164661a03cee2c3ecac42ad648871_JaffaCakes118.html
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.771000.com | udp |
| US | 8.8.8.8:53 | s13.cnzz.com | udp |
| US | 154.197.145.108:80 | www.771000.com | tcp |
| US | 154.197.145.108:80 | www.771000.com | tcp |
| CN | 220.185.168.234:443 | s13.cnzz.com | tcp |
| CN | 220.185.168.234:443 | s13.cnzz.com | tcp |
| US | 162.250.140.195:15936 | tcp | |
| US | 162.250.140.195:15936 | tcp | |
| CN | 220.185.168.234:443 | s13.cnzz.com | tcp |
| US | 162.250.140.195:15936 | tcp | |
| US | 162.250.140.195:15936 | tcp | |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\CabDFF5.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b041fbe126be6290a98ad76a10dd014b |
| SHA1 | 6b418ec16120e337e75b7f228506267bb900dae0 |
| SHA256 | 48f0bd2e884b118e347f87b3f3c6149019bfe63d2441a1bd5a8740ee447c0dea |
| SHA512 | 518a5ce6e991109fb6f10033d6da770ba76645c050e39e7e11f47126f923438b03c979e302ffaa9866de3b79e2b1453244e75b7adea5d127f78a6721fecba4d2 |
C:\Users\Admin\AppData\Local\Temp\TarE0D8.tmp
| MD5 | eb6c5d133e765f60e207b0f0d73b3e61 |
| SHA1 | 72da6cf3efd42a6368c43c04d98b033eb12b70ee |
| SHA256 | 7546ce6c236d3710f109392fe960bc1fec45b5ec535d7d3c1beea6ed5bffc756 |
| SHA512 | 0e15dff61ed7ff5cd094365719a9e5fa37a51e3ac3d57776e87637489a2098e99739599a704516ce10f20ccdcd1a2e4b1da21128d85438178b7b5fdefbcea75d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | bc645a45ab0b7be16b809fcd0726e949 |
| SHA1 | 51811d3ad44bf2012dae9e7cf88ea08d032b38d7 |
| SHA256 | cb08eea27b1961c9b3383f9716d37cb6cb8be8bfa7298744f0f6aff11ac63e0e |
| SHA512 | 18d377e133ada8db968d2759a7322439f3dfbf927505323e4a055376408c9d3a1a9bd3df25b61e9f5e5ab85ad9b9f3de87c94cc50abbb4e89c8a211e713ea1ec |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 648aa37f6fcdc359158f162ab6cca624 |
| SHA1 | cd5753a1a50ad629f08e2cb949622155dccdd355 |
| SHA256 | 9f22b69178e033d7ed0b8996c9d5eead9e1818aecef819481e2d18170c1a1aac |
| SHA512 | 7a5be55e6a325de1052cf4311f97f3e87bfc7535baa1a5f2ab733f8c028aa4d98dfde7d73257a6cd799a5b7bdab4f478b9e6141eb4ed13ba3af46497ada24b00 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 92a94a53dbcf25aa639b557dcf8d33b9 |
| SHA1 | a674a9f36d096cc8a26de2d33206f9561853ba82 |
| SHA256 | 677d6b6240ed7a5d7f18af36eb8f1051be065a277e9ac8ca62054fea92e4c1e0 |
| SHA512 | 7e919bd82f4e4f5418f0d78ee7f0f4e9bfcf6c986024cd673d2d578c6f182f7853fff12eaf4b4e1c54189609b5539432da0cfc8c5681f0a85b213777c4e07f64 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 11a6eae3ec14d6b8f62d3b3ec88a6e95 |
| SHA1 | 5e3a4ebdf23b5fed51e2e0d29ff7672f907434cf |
| SHA256 | b6342ee4316e22f8255c624b9ad7eddf0632912494ccd6d9fd9eafc9798574cc |
| SHA512 | d6d735c2121edd245268d7a30add3fac914e68512fa64d3734cb8b73d1c53728a64cb50b77dc12aff3233668d346af9c2f22ae162504bc77b972f3d434351303 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f634ae0ef573b86d0fa3c13f6e7153c9 |
| SHA1 | 55532ef5e6f8087e95511d0b126e1b2bd01126e3 |
| SHA256 | cbe2a4f982824a661189217f67e1d47398fa8d04f65435314edfb2809d92ffe8 |
| SHA512 | 9192cd59539397353c2e58957e5215d5c0dc0be63370c42786c5e1fae92a00139862408df1fe7a46d1d25c3c296c2a28da12575da0d91393d4afe54d401f1a18 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3c5678f05ab6dd8fe84af59383cd73c6 |
| SHA1 | 83cfee86636fdf28fc1cfcaf9f209a2591a18cb5 |
| SHA256 | b25c1b7d6f30a59c80c2cb7695f45f612e7c9b8e39e70f859e3397213b7dea23 |
| SHA512 | 0c4410f8c40b7a9c586b3d790f304132bd4a14b6adb49a03930c2786c1e6622f828d6a6b9dd1e2eab73fdf44b71bfba89f53a24304719010e5f4d85c6b1a9d26 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 1b8f247bf2021a82415e933788d4e0e4 |
| SHA1 | 9e8196114ce2811ad6e27d2db013401601e81c9d |
| SHA256 | d83a3e45f182a1f479b738b70da9a0a0582eb17c0ecf4671ef5f165e15e91ff9 |
| SHA512 | f45e22a7b88eb33a99b258cd9166cacbe7210adfe4536b4e07acc7336de49750b08c9a47b13907f9823343abfe13ecea0bb50131b19df49b76e7cc0c5b99bd05 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b8fc77156016030c87e2bb0c55b60802 |
| SHA1 | b9dc1dfdda7dd499e1c9b8ce1e6da9420f081b2f |
| SHA256 | bdabf00fa7add355d9a224cf8a8da57f4de12092d2d1f28c8e154ff327bd9481 |
| SHA512 | 1b4fe573ca67eb2331d4789682e3da7a5a8c35b78b120bae201b040eaa37bb3ccd7c338d43c80197a46bfbf517fb1b08f2a92ab8d947043bc2939784cddeb34d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5f8979f8d163991aed7b0cf305dc8c01 |
| SHA1 | 356e3d4e1c7fcda0d18bf4af0cea36a4e7c941e6 |
| SHA256 | e8a8003f4479598b661d4efe4eb09f63cd640a529e7e1a6bfb233246520c73a7 |
| SHA512 | 442c208ccd979a73d3efb6d4046e7a97891e56546f2b8c66cfc80703f3529a4cffc00c45b013ef3700eb22daaee1cb776fde80e8b3bcde4073249fb3f93dd78a |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 14302f03fdb1fb6fada749ed56617163 |
| SHA1 | 9cad39f42f8a9f559bfa88d98605c09dbf622c77 |
| SHA256 | 4f1dba510c367d39e4a3e2f00084713279cb76fbab9eecaa6886f9764d5b7178 |
| SHA512 | 8888c971fa8649d79cd91a749bec2f16aed2c3ad958545ad3c51db66a5409dda6ae87ef01edf49be0790d4231a99c78452e60c4d5436b06c79a24eaed51ae382 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 0f2c2ceae15f69393ba8063488a4fb84 |
| SHA1 | 3f04720d228dec3dbd7f81c756b639a70ee00915 |
| SHA256 | 6466de656634b417e8a0093b41b46d20b46269d5b78db6d4200ee3bb38c89d4c |
| SHA512 | 8b984fa63586b27aa9f70e15722ba19521d0f98be3833517770442997ea7d375e1a582d1929630112ec0b7839aa0e26b1e036f7cbef02296386529306a1dabdf |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 29894c68199242da567d908132df1532 |
| SHA1 | 24ccdec6fc2c9d38f8179e137206e25d1dca9dc4 |
| SHA256 | c64a99a1a489c188d4f8a8d9977cf25a393765f6775d89987cb9b7f7142550ba |
| SHA512 | 85f078f838e97ad36c40b10674f6f18e28f5c5ba8ab287e14b63374d5923c540ff0bd34ccf21789c27421940b13c6d9fc37a4d61b6ce0f96f0146d298020c5e3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 7c09072f4c63767116f5145376204c96 |
| SHA1 | 00f70c230eb0cd6c56a1ed8a27c3bfdf6d287a8b |
| SHA256 | c300b4dda82dcf4498593704acd8d663ddb2ae9d694861175e1a72aff4be28fb |
| SHA512 | 944d2383a03f8875aa108823c43be01db348ead65d89b2b40f4febc90778be49fb941bf0350a67f594e09aee052f7227a44bd65615e165294f076bdad36a9781 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 2788abd9421cbc61df459d5a6ee3a096 |
| SHA1 | 87b49e23e63b4b805e97a74f830aa8dd4a40557c |
| SHA256 | 853d20156f8daca3bc705ded1f77ee990f1a7d1adb335eaa251036493474b2c4 |
| SHA512 | fd5d64a78816f7af77b5fe10a254865f6fc7a55b4c45b465041203155ca2ab60e66859bafb3cc63ce7e4052d44e71d4dfb25905385c4248a055b077cf530801d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b3af3705c447259cc72e3b59f24e73ba |
| SHA1 | 6d61b09dc6ce81cf06b643647661e998d548a87d |
| SHA256 | cdb51ad4e729a9e7d26666d835a7c726928e453a2debbda8541d5eadb3406441 |
| SHA512 | 6a3d872d7e3fc61c0af6b99a7f6c47121b8198da0346cd7147c093baa752866aa53e4affb5e7967b6da1a563b1504b2a694518dc990334fea10253dd42856133 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 4e091ae1f4e722aa63735f7d5f809ea3 |
| SHA1 | 4e54031fa274d979eb0afabecb4c96e57fecee6d |
| SHA256 | 6acad64e158454e9cc1c45d5126869cb8257f5fb029746afcedd73d18f19ed45 |
| SHA512 | b78654a4fe23accb7527cd4270ac15e041328c13f759d0b52f732fbd2f5c5e40de1513bf5eabb8868bddf2182a50a58f9d246f0b57d35173ab764210a26dc103 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 2b6aa82d64ad097b5a2d5f4d48cdb129 |
| SHA1 | e857696666fee998b2935b996c13e76764e4fc20 |
| SHA256 | b85026091275137304c10cfb008f97b2c1eff3a6249a60d7d0f342796fefd5ec |
| SHA512 | b0136f278acbf8690569532cc8c0b4fcf9f59d7e252af3c40298861066da3ebdd7a628befb0ff164efb25d13402acbc42f2bc8420d2c2642500af73f0263f9e2 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a5f54e68ec75e0e395b6afee6e5413ed |
| SHA1 | b8b669af1db60f8ef37f815a6eefa8a7dcce62e5 |
| SHA256 | ab55cb0990fa78ec2e5984fcd4219308b81c6a4385a5099d5b78dc6e6a967a3b |
| SHA512 | 9a3c94d20a744413f68b4fbf09d7bcf8ca929879e25225904639199074076153d9f2adbb0aceda2ca5654b36b0d17a8d417c2a90b0574ff76afc4bcd126a1f7d |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-10 04:20
Reported
2024-06-10 04:41
Platform
win10v2004-20240508-en
Max time kernel
25s
Max time network
133s
Command Line
Signatures
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a6164661a03cee2c3ecac42ad648871_JaffaCakes118.html
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cf6a46f8,0x7ff8cf6a4708,0x7ff8cf6a4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3851478414613405077,10055797671184779858,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.771000.com | udp |
| US | 8.8.8.8:53 | s13.cnzz.com | udp |
| US | 154.197.145.108:80 | www.771000.com | tcp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 162.250.140.195:15936 | tcp | |
| CN | 220.185.168.234:443 | s13.cnzz.com | tcp |
| CN | 220.185.168.234:443 | s13.cnzz.com | tcp |
| US | 162.250.140.195:15936 | tcp | |
| US | 8.8.8.8:53 | 108.145.197.154.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 87f7abeb82600e1e640b843ad50fe0a1 |
| SHA1 | 045bbada3f23fc59941bf7d0210fb160cb78ae87 |
| SHA256 | b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262 |
| SHA512 | ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618 |
\??\pipe\LOCAL\crashpad_4428_KFBQRACMDBKGJOOG
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | f61fa5143fe872d1d8f1e9f8dc6544f9 |
| SHA1 | df44bab94d7388fb38c63085ec4db80cfc5eb009 |
| SHA256 | 284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64 |
| SHA512 | 971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | b9f05c852d354b351890776768488e2b |
| SHA1 | 5e5c964630b0c1cf948ebae8eee706e7e5419e68 |
| SHA256 | 29635b4bcfab133e00218db1cf3fb0dab3068e035978588032c8a2fda32878ee |
| SHA512 | 1d2c9ce64350951691d93f6b578a15ffc37995e628131237abb5a8bb432a29fda4fa02ac8179ba43d368ba932d625551d48a04b74059942f77e0103bf0244a56 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | e7f2c7d32b80185b24bb7e78d8e0331b |
| SHA1 | 3654a720a49d9a28d9b68d56205388ad8896b6a1 |
| SHA256 | d5a41762e604cdcb148aeef20d745fec6437ced34fd024d57e61b7c62b53cb1c |
| SHA512 | b3f20596434c850e4d92ec36094c7eee9d1def66e738c1199d6f8031725d5630f21718eaf30e07528c40852eaac5ff0c08751d0b69c67d27bf090f5aee90cc45 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 915cbcf91f612d90aad70c40dd403986 |
| SHA1 | bb6b567bcbc5c6a79e2c5d6992c032f67085a2c6 |
| SHA256 | cac34abcdf3d065f4266e7bea7619dce584b6d096e1d402e63ac73300ee0fddb |
| SHA512 | 11a8588fe4939c2ddaf1a4570506ea3f36eb2eeb8c2b796089ba5597a31ca700278a20218619eae375b6b9efc7d310b02fe6167016dcd9c7537c8447ac44f56e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 206702161f94c5cd39fadd03f4014d98 |
| SHA1 | bd8bfc144fb5326d21bd1531523d9fb50e1b600a |
| SHA256 | 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167 |
| SHA512 | 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |