Malware Analysis Report

2024-10-19 09:37

Sample ID 240613-1debhsvbpq
Target a6a8b6531cf958e5e3fcd110de8c9bd3_JaffaCakes118
SHA256 6426c4240ef47bcbb0424853ed7418bd57c0252c835c5f2fd20bf962df1002ec
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

6426c4240ef47bcbb0424853ed7418bd57c0252c835c5f2fd20bf962df1002ec

Threat Level: No (potentially) malicious behavior was detected

The file a6a8b6531cf958e5e3fcd110de8c9bd3_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 21:31

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 21:31

Reported

2024-06-13 21:34

Platform

win7-20240220-en

Max time kernel

137s

Max time network

139s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6a8b6531cf958e5e3fcd110de8c9bd3_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0cbd329d9bdda01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424476172" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54B1FA41-29CC-11EF-8547-E6D98B7EB028} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000997678193b506d438774fa0e83010cc800000000020000000000106600000001000020000000468e3c6603718313550fbad62d80e890b6737e473cd9ba7ff500e300277f6ebd000000000e8000000002000020000000084fc1997e1de47cb5a8c82e62b4d80aa8d15f5e8f39df9cdcfb035f192f8bf420000000d91888853f681409d64239980155ffc8059297a1f69a49e1bae989bc8561029b40000000f3f6d59ca147f136c26ea9f44c4c119d537ed92adaacc01ebc908aa5570b7aa681ab3ad2b2489de55ae7786ab5cab4378e5d7c4421eca6166c49d56940b186ee C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6a8b6531cf958e5e3fcd110de8c9bd3_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 img.sedoparking.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.187.196:80 www.google.com tcp
US 205.234.175.175:80 img.sedoparking.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 205.234.175.175:80 img.sedoparking.com tcp
US 8.8.8.8:53 partner.googleadservices.com udp
GB 142.250.178.2:443 partner.googleadservices.com tcp
GB 142.250.178.2:443 partner.googleadservices.com tcp
US 8.8.8.8:53 www.adsensecustomsearchads.com udp
US 8.8.8.8:53 akordy.ru udp
GB 142.250.187.238:443 www.adsensecustomsearchads.com tcp
GB 142.250.187.238:443 www.adsensecustomsearchads.com tcp
RU 141.8.192.170:80 akordy.ru tcp
RU 141.8.192.170:80 akordy.ru tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e2cea1cf8a446ccbe3aae854af8fed63
SHA1 b306ecb543b3894f0f254b043499036462b3f67c
SHA256 b0d3d7e4c94d68e7b6da9690f8689c6ec5d6ed9fd41d5bf9f35bdbe01ad00d1e
SHA512 0048c0ec70ed6b2773e0fa20cecab571fc512405823a44f8ca9e1ce9cda0f098c79d97bcb33880c60e31e048b0fc5b3ca96cb5eb08fb982b1d74f6d4826c26df

C:\Users\Admin\AppData\Local\Temp\Cab343B.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\Local\Temp\Tar344E.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\Local\Temp\Tar351E.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bbbe83f7ca57a74f66c063a56611928c
SHA1 58055bfaa6de046e12a47b4b337d91f34bab57db
SHA256 aeb47fa38d85f5101ad51f458b161308e54404b7faf019469ce7f54ef2c344e3
SHA512 d75e8ace7116ab307622826b482aa23000df714ddd054b5404e047d51d1b649a706808b292b7e7cd52d8a424cbb5befa9fd058cfc0e94fd2b66cf6d7b217cbd2

C:\Users\Admin\AppData\Local\Temp\Cab350A.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9abceb231f9e52a36eff103bcc548fe3
SHA1 937c6930d91fdbadc84d54238649fb51ff46ca07
SHA256 e40a452b10464095e984497b23d9f9843104114aa7f158e6c113c4b63510cdc1
SHA512 31655b87fc929fe390a868ac36a228774e2ce1141d8e8fdbc06991a3b7acdf6ef14a0cb69d89993187d502fbe836c798d1e6533371ac61aa4c3efda1cc51154d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 43eece8895b3afa669f55ecac98e221e
SHA1 a4e2b0c31cf8380597a836963015a073b542d643
SHA256 26971ca9f1b7bcc64e8224fe6e85dfb8aff491830a571cc7c98046128e5e3a0f
SHA512 381fd65edec815d395eb9cf02a37e5c9315e37c8e008bbcdcd037323eae9d5c85d3815dbd54d598234cbac2746a02e8d138a7877cd6919873759830197ffd24a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5b1dd6340df1026b8a85d6b2d4f4a6dd
SHA1 25155204630ca3d3d635c3d3486eba96f85cf9c6
SHA256 e4a028c00e66b73e8969ead5d2acdb01e868a080791014654db78c8e795ceee0
SHA512 172f943d337be7d3e044e4a7809908c58928ea385c098d75b7f692069d0811eb71e148793ba188fed77baecb4bfc7183e6907f7fed26c8f4bf85bd3536e5f22f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 703507c6e72f4e528b3a415b28d8186d
SHA1 c524181241a0cdc5ea1f34dccce2b539556c3ac5
SHA256 51534f2f15e8465f8f40d7173d8242619008ff4ab30350e4bd3a5f1a7f38f629
SHA512 06fdceaa852da2bbe33165ab2f86dbb665cfabf7c046ced51dae6516db9b7a30b3dee96d795d5f366118842ce3dfacee54c24ad1551533f8d76c80effcfeb1eb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e03fa54d91a5d1caa97a92833886a85e
SHA1 7da584009ee2e75a9b65663196bb7921784889da
SHA256 169e18a637b025c0374eaaad563c9acf2beb200a8e026037eafeb752534d2cdf
SHA512 b2de1a55eee21226c47f6d0a0152a097ce1e24ff42b4177e34c1240ed6f9f91cd35a1ab5329288490f2175569c3ae39d3d75ed38a4ac06b174b6101850e9970d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 01f49bdf08bf07e0035d86dcf58621e0
SHA1 440ea7a31962a6923f2b4a5311f00a968b3a63af
SHA256 bca58594521bf340e2f8fb1e65a68ed73a19b5f031a266bb3246699b3b9fa517
SHA512 22bf46380979897c7171dd700ac2344e842ec562ed8cf5191b8157dddc180a646286008ca2d0a130512bde25cc7eb62be68ac121c94a05c437b0a07d5e1037e8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 75ea40a89b290100f95119e6c9ada56c
SHA1 1f788c27823ed07629b74dbe7f45000fcc071472
SHA256 555bf2a36399dee3a7e22b93cab7509859fc1b36c59e6858f95ac13daaf45640
SHA512 7d15b01900a7f85fc5dac9202bda5b71565dcaa9c293bfc83606753dc75c0d220653d68bc318842d26602335be33b787d973ff3535c0016ef438065faadc647d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 77a233b8204bc5a43c5878637b80b615
SHA1 bf826b11aada19102fd7bbcd6024f9056e311081
SHA256 59f4bb4f8f798d593f6c15e69c4ce9c60550e1a9f3ec4d95a614f8e68730d768
SHA512 8b34fd81daacd3d0e48137d0e9237ab0a93c703fcf0db212ceb38927bafe7a1fc61f069841ae8ca8a4f73270bfb17f8a6ffd8486f8fbe32bcf62c18a77ce4d39

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1bbff9e371dbad59a5096a967c01559f
SHA1 b9356648175f3fd15d08b2a17e19dafbe5f88144
SHA256 e050ceeddee25119c0c0c24920376d7bf87f4d393816b42e2308b0e7f28d9da1
SHA512 1f83f4ec5475186fa0c258a3f97df04c5fdadd4142ea3db0696ce3ea035f6479dc418865e115be662aa9fc2bdabd0fdb791eb2ed5b5037fdd5fdeb5c1c7bafeb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 376b3c3990601f4ef98ff104713bc562
SHA1 221153306188e40ca49248a763c876425f106d64
SHA256 85657597fbf20cced869cec1e281c182589b1c9f59e9232bcb8081d3f9b4d32a
SHA512 a357b2a70e6f841753478ac338d5d8f4363d1345774310298d0f88f81e151451feaf8147a53aaaca16949644061cccfabb642808984aba9a99f219e1dfed440e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 6010562e565cab78b398b93a19255380
SHA1 956fcf51c6c888635db4dcc5d8980502f91ad208
SHA256 798ccf29ccc6672ce70166bc7fde6959fe628c6184a67318209df47d1765d5d6
SHA512 2fe88e7b1dc19383d855bb55946b01467198776cc31ba713bb9019b684b0f269f5121929f5fee342752d20fca8d199a8fb363753b840f68d0b53b3064b146f22

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8ccbd595c0f0abcf9f3b700fa7f0f7ee
SHA1 c026a919ad8e2bd225779d712e28c5b1d5182e27
SHA256 996d4ae101db4e37cbef79f516d22d1f43b3ac40218937565d2d4378f1b20bd5
SHA512 f21d8677ad2a71eeb6053f29817c9ac418ce06266873e5420ae7e49a71a852778c9503bdc754a7157898d8dc36e06e46a53ab47c4348d1c16e1a6b9c13bd5d93

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 32dce0a27cee2fab83bec786f344246d
SHA1 dd2787dff189fdce3bcc110212d20bafbc8147cf
SHA256 6ab1a144e95dda712532c345a1bbd34b0f67a4a0e1447226d1d61230ff96f35c
SHA512 b71c93988699cf710aef22c33ad23d9f1fc0399f600d29b8ab63e5502a3bba578594c5ba8d67dcfde5c1cf117373f3f9ed677bc0623796fd5e88904fcc27f2f1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4b28c65a947f419e7a0dd886bce1c4c5
SHA1 33567592d1e52967cefdce3fd0486026aee4a727
SHA256 254c104460c9c258c085112d17398e97eb0af0ac59c9f939c18abb79668ffb68
SHA512 130460a22f925a267d9da22712633fa062a06214555e1ec3940357a5638483466cf1abc32b0cbbea02b7a51f92036a9ac57d061f700c4cac547bfeffcd67fda3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 87e110ffd9c53ecc0e65f3e7a36260ac
SHA1 03b92a5cffb943f02aefc8a774cefadae2dfe132
SHA256 c28ebc9372cd5b3d3bb58c221bd51add7eb0022c9a0009f5f09ae169f803ceac
SHA512 1f25eafa3a5c1396a92f757c4657a76d6af062f72d4db6a2f7b5e7df2e61d96661740ba14cf890d658f1ad30df19f99047ca530627985251f70d7138930de1a0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9f8ba21423f0d54bf26c3cbcf9d68f4b
SHA1 b0b59ec08a3c92f9633918fecd9e308fed8a0f6f
SHA256 2b3644fa3e8ca1e89fd9da456a30b289aa218caf0169cc397033184e076c3279
SHA512 3a558a45d22847fca9f6d4f47f972c1edd405b5b696aa2de7c00ca75a1b3db283c4b5ad4d5295a5367c93c7e2681a6efdd23f53aa0bc935926dfd41dbc3a31cc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 bde58e2c3d4bd4bc561623b7cdea10a1
SHA1 685f2f3fa8cac50643762509fc0d583df578c9d2
SHA256 049dfbadd1d6b97df2f74f38130124b5a386adc40846e6fd96a338f4750d97b0
SHA512 22c0216b07c40b6354762a523896cefae09769757ff149e6915a5aaac45dd497e9e530353ef68b02337ce150e49a8e4b3a948ae47f6d0bfec7f5c359eeadfae4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9dc57ea06b881e39c4e62f333721245e
SHA1 33ff6659a1c9e253e0ecac678ba9ea3307b1d33e
SHA256 5dcac95b98cf1ddfa8d508c0afae5a308dc0b6ab8cf8370f0c2b547ab31cac24
SHA512 9023516567975082278f69f68be58e5ab881822fef5ddbe6fde6cd2a46fc170de3ab6690dc4c5bd24a91fa92c41d0d20c7c92a9dc4394f054845d05ec0f97fd5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fd32f7231112c62720542d83d172063f
SHA1 613dee629e472396d56f2b07d61245a7e5b44a96
SHA256 bc11080d8284aa8af85fdb77389049cdafe8909810d2b90a36f03da7912839f9
SHA512 5a5985229cec259c8b79f0ed0d4e4308b6cca8daa1070e15573a785cf17aa031827ed93f5c02fa7aaf08d3c968cd104b6e9f0201ba18584e39bcab74a71d2aef

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d2c377ff59a32cbf926472d3c46d5cfd
SHA1 aa01b57f78ef768955c49ba7981d304662270824
SHA256 fdea065af990e39bf5d4398ea7538d2ac0bcab8d626cb857b1b0b2ffe1608b73
SHA512 098d8cba37cc26e511e7caaf93c1e66c30a877efba816d6d25c5892ea4bb3bb9e2142f0a0a36da455a8f7a722f3763991c02f3ae8f61a9811bbce4354f015080

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 21:31

Reported

2024-06-13 21:34

Platform

win10v2004-20240508-en

Max time kernel

133s

Max time network

148s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a6a8b6531cf958e5e3fcd110de8c9bd3_JaffaCakes118.html

Signatures

N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a6a8b6531cf958e5e3fcd110de8c9bd3_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4516,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=760 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=3904,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4964 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=5288,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5360,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=5460 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5464,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=3864 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5292,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=6840 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5480,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=5780 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 img.sedoparking.com udp
US 8.8.8.8:53 img.sedoparking.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 img.sedoparking.com udp
US 8.8.8.8:53 img.sedoparking.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 img.sedoparking.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.4.4:53 google.com udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 178.223.142.52.in-addr.arpa udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp

Files

N/A