Malware Analysis Report

2025-04-14 03:08

Sample ID 240613-e585bathqg
Target a3d426b3b44e0bf0161ed6bc35c18a9d_JaffaCakes118
SHA256 3b99361466361db2b41682429411a86056c39171d5c290e45cd678fac6c6838f
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

3b99361466361db2b41682429411a86056c39171d5c290e45cd678fac6c6838f

Threat Level: No (potentially) malicious behavior was detected

The file a3d426b3b44e0bf0161ed6bc35c18a9d_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 04:32

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 04:32

Reported

2024-06-13 04:35

Platform

win7-20240221-en

Max time kernel

134s

Max time network

128s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3d426b3b44e0bf0161ed6bc35c18a9d_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bda235f480e78048be64218980b9d44c000000000200000000001066000000010000200000003a9ae0bf23cdc46adf3a6051b801be9ce7c3ea93956848154e96acb739c7ea5f000000000e8000000002000020000000a96068e15d9e9f5dacb14b93633414bed1e4f03a09ff37e9045020466c51041320000000c6d0111dd1777272963f60cf6a0ab5e677fbd4a627a0cfde69e0c09890ca412040000000d65d26c2269cb3a2452134d5a7db30fdfe8a5d45f69c9718aea241f54bc50d90dc52771f59dd093aa14754ebe30a9fc72ae89d04102565c31c42bbdd274dcbd4 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2043d7cc4abdda01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5A66791-293D-11EF-B012-52ADCDCA366E} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424415024" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3d426b3b44e0bf0161ed6bc35c18a9d_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 saltworld.net udp
US 8.8.8.8:53 coinhive.com udp
US 8.8.8.8:53 www.gravatar.com udp
US 192.0.73.2:80 www.gravatar.com tcp
US 172.67.166.97:80 saltworld.net tcp
US 172.67.166.97:80 saltworld.net tcp
US 172.67.166.97:80 saltworld.net tcp
US 172.67.166.97:80 saltworld.net tcp
US 192.0.73.2:80 www.gravatar.com tcp
US 172.67.166.97:80 saltworld.net tcp
US 192.0.73.2:80 www.gravatar.com tcp
US 172.67.166.97:80 saltworld.net tcp
US 172.67.165.117:443 coinhive.com tcp
US 172.67.165.117:443 coinhive.com tcp
US 192.0.73.2:443 www.gravatar.com tcp
US 192.0.73.2:443 www.gravatar.com tcp
US 192.0.73.2:443 www.gravatar.com tcp
US 172.67.166.97:443 saltworld.net tcp
US 172.67.166.97:443 saltworld.net tcp
US 172.67.166.97:443 saltworld.net tcp
US 172.67.166.97:443 saltworld.net tcp
US 172.67.166.97:443 saltworld.net tcp
US 172.67.166.97:443 saltworld.net tcp
US 8.8.8.8:53 gamingw.net udp
US 172.67.160.162:443 gamingw.net tcp
US 172.67.160.162:443 gamingw.net tcp
US 172.67.160.162:443 gamingw.net tcp
US 172.67.160.162:443 gamingw.net tcp
US 172.67.160.162:443 gamingw.net tcp
US 172.67.160.162:443 gamingw.net tcp
US 8.8.8.8:53 i1.wp.com udp
US 192.0.77.2:80 i1.wp.com tcp
US 192.0.77.2:80 i1.wp.com tcp
US 192.0.77.2:80 i1.wp.com tcp
US 172.67.160.162:443 gamingw.net tcp
US 172.67.160.162:443 gamingw.net tcp
US 172.67.160.162:443 gamingw.net tcp
GB 216.58.213.14:80 www.google-analytics.com tcp
GB 216.58.213.14:80 www.google-analytics.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\CabE07.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\Local\Temp\TarE19.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 1625d60e84f7b0c2b700368175f72811
SHA1 c9807f017e88a8d6c08ace30009075c035628259
SHA256 295c92e2bf36a4efed3ad9b04889b8058cd98226920adc32662d6a451da8303f
SHA512 89c11f5036778b04b2e9816210cebc4878be8ff9325af2c93df02f7677e64bc612ea466116e2ba6b78d9e2210b2203a9ba5733647aad79fb6487914036c7bed7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 d3049f1a4b143f13261e38abab901109
SHA1 1810917619ef7b98f40697c12f35a75575665f8f
SHA256 69df6863aa24aedecf107a7e2e0353d592c52a5905cc2833d824c2298733e9d6
SHA512 6af844057e960d6f4165f297891b676492281fc4abdd7346a220b1972124fabe2a9e0f7b3825c9f67c1ed885262cf6fb994c4dcd607c1981005291a240b6e958

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarF0D.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 539c15e5e949f174e986f50fbc17f7b2
SHA1 6acc30e16378c4e5714bba902c3d92d1b7de1c7c
SHA256 4be10a7faacc104d76ab7d99ac1c20918fadcd070ae755eda0d21120e0e2f63c
SHA512 1d9d282a1401649c36b5e14aac80bc1652542aaabe0531a9332b3e3e20ae91b08d34c816556b49fac90710151b44d604a4b3f4c04eb0167ab8b85b5033182e04

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 98820ac29c4776db7c2379ba60a56563
SHA1 1e49610028bb6341dc7a2d7f14611a6dfdeba02a
SHA256 a561dc06a016ad92d6fcd8ca091f48a1a89d738d0aba60f920200caa18f4a7c4
SHA512 c2730fa0ec4fb6cc0e82e8f658cafb17d2e29f5ca0182d078b956838ad28e4c8ca297eb183e9dba69231253cbd3a08048373640dcf576f31a03550ef5a66c9cf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1f9acbea3065fe7a339adb092196034d
SHA1 d4c7472eaf223168e494f419a61113567e92da8e
SHA256 7c2e5ad9bd68a7066bfb340c3c088c0f84bb911901839c32cfe0827c6db51aa3
SHA512 5aaf63b386f6cb8b31b4843950c86ed9c7fc9c66c3ac0116a873ea6cae42d98f06c67614dd7f2a1e562b506db502a6ffc200d8aa1417e03545589de97db5c03a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 667b59257631fb13feb3a4ef1d07430e
SHA1 01785264eb2ce14faeb6440d00cc3381f7416f07
SHA256 e8c8697b70abd69dafca9b1bc5981b032b327957c90365f0290ec9913ffca88d
SHA512 129a1f32e2dfc365b5ab6ae477992368aa2c5ea8779c62ebbca409482cdf97b71e2814f437392e12f8420a79bfe83136e16a1fd62e0ad1db53fb30b1fd020e2d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ec9a78bc6e545425aeea0dadd3b5a47e
SHA1 0fe1a7e10aa726cdb141d92af30226df138ebd20
SHA256 a25cd0021c3e4d221b968d8df5296d0bb426e6ecb8f4d35149498aa61094e49a
SHA512 811cdc1efac7b51fb3296ef09553c8f7da09a163986ee4eaa3a9e8a8acfddfa04db28b1a5ba262c0abc4b5ac32f4ca7a8b48f73d8e6c52c2d57d837986ff0ed2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5e4d121a87dadd0df3b6f23693a64c49
SHA1 d06d78c61e4800c6ebd7de3d98add85f5ef99097
SHA256 848848f1c6ae849c4ebb0e960c8e9cc48071d735a3f4b04b0881175cc6dd6852
SHA512 8cf223a38afbc1330c1dc3da92e1438a51b7de51974399ea5f9726ebf5cc99a7ca388563e538b754063026df10c7799fd00002b92ca96c591af88e9d8f8be142

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8356ae032f702e3a616744e17fb8c89c
SHA1 99ce4a2cfb8d028023e186ccef648b5adc0251d8
SHA256 fda645b88970a526b86dd101ac5abcdd379f3a28f4217d80e3ded438c5ff4048
SHA512 eb96866eba6853bc9d631812243b7b277409e520760dfd194a48a6a510142dc9030091dd5b962ade262c997d9399ee1b5ef1b1aae68cd02d21ea75604139bdb0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 605c57356b9e8ce29a7f8949bd419c61
SHA1 1e4dfcdb13df09508c011f99ad25963eb216d66a
SHA256 dbff547116ef7233975e58687ee3ccba263af811704401149d435159503ae4ed
SHA512 83ade4d766ce6583295c724d75e8264a29ab6ccf0ee43da99c2e256b0662a0f98b77990c152215c06ca139087b279b204681877e2ba5e348860c23f2853dc909

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1b1f1926d36130c57d51856a87dfe808
SHA1 d820a46fb60c7f8c7176cdf49ddb5ab5dcd03571
SHA256 d6b1d7c000e0e904ae8e470845d97e0977ec916c13b7a4f7e88e45b8d4224e8f
SHA512 881894795b32b925b8b2224605d4a5dd78d233bcf2a9ef627c7ad1e4a930db576ca43159977b97e2af6cdd3631ad23e1e68cc7b46e0ba47b3b05d5f74309dd49

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 be7e2d5795ebe9be81ba0823f02609da
SHA1 088337ce9ac003f68edf578f4986669361dbdd6e
SHA256 92564c10a5d1b4a2665a322652637ef0b42533a82b3dfcd8325aab8ab5a0c568
SHA512 0518e1522e860c8705ac3e81eec6e76d564c8184ae5ecaa0a8e672cce6e754431d5b0389b2b50d222e2a1440706f048aa574499d5ffef9dd5c7ac7eaab100169

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ea205e15970f21bebf50d4feabf94ac3
SHA1 be37cb47a6a9aab482225892959dff3e7bd000cb
SHA256 71370b33725b45f90693e4edcf27bedb6a1d0d4d050250ec350844c32f304a0f
SHA512 28c41ab08a054a9e5c286165db52e7fd361adfc5aea51752a5aec9e2e8357558af016ef22a7426f996184f455bd5b484662d20e9329ade2d9e23ed2f4a42073f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f86bc5be4f6a1d9e9e13dd84e19e974f
SHA1 070cf21cfa9d7bfc643e0f4aefe4f6c2d1e6ca03
SHA256 714257fb897317d887bb65792c2b06e6950739fdbf168192fc7455f6b2858967
SHA512 ee267c3d9faa473ccadd8b748dcd51da9353913157b41c08bd3205e1d873fca29402e716fe3ca38037067d3dab12bf9af547c0c72b5d36ff5144cd6fcae43fd1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 435c525984dcbe1753d4094860731d78
SHA1 6b753cf265acd9cf70ac478ed5a5d1c00f9b1e60
SHA256 664b278c7db97c609804b577f6d9b28c94313d650e50a9ccb4be9f934b8aaf6d
SHA512 871bf74b4efb014648463c854650ef5c89fb327b8fbf3cde3f76c8d16ed7191ca0163a6e019c51fc1cb10ac47e64e8d080ebe8a343fa865dd5f6bb227711a22c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 c5ca319d92d96b2567a1976b4339d1cd
SHA1 4633cfe58f73b40df2416475d5c51b5b62a11c0a
SHA256 a562dcc4bbfa78a3156210ee7e2d5c70fbd8d50fd7048a20c6b56c81997638da
SHA512 cac15aa40936281e308bf375bb6cc1fb3b066dd5a33b8a116c962cd239d727b53baa3c7add76a0ec2b51dc97ef66aba6127a39ee90a36de18acc763bd52e0dd1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 16444a813a1102c3e835223dea321759
SHA1 04bcc0f9fc45d89c7e487a07d0ac5c141080451c
SHA256 c13ecbf2297a649b8684ac3ae927c344717324a024bc9cac9974725d04cdcc5c
SHA512 5eb8af4a1a13cb8dbab1af6895edd9cae3048ee59b2be92aac8665d2ef5df457d04a14e6a0f613df0ca9e18718fe067e43057fc4ec0ea79060629100c7ee23c5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0c312fd455662163411b52fada21612a
SHA1 7a88eec815b74a31f564a5c503b12f314ade2f42
SHA256 b7494bfce5abcec97a8169e731f175da9ee8fb9fec84271726f7b38444b29211
SHA512 0b6c83292ad37903a6e045da454b8c1294a38b68a28c7d5ecf73ac1caa9a54990b88d37fd3f5522371152e691b30514ad53bd698caddf59c87fe312bdbe2269a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 45b1a417e282a29e3cb2fd557e8a67d9
SHA1 80e97e7f025efc2a01f637c44033fa64447f7868
SHA256 4e15e5d7bb0b32a098f7ac5e9a73e447690f5c6ea86fec513b0788db55e3b57d
SHA512 a49f3db736411a0740ad23abcb433339565564b2ff1e0488da24303b0923ea9bf88352f3fd91ef3e30c3574939c0904a7e28588ea497691fad3f2b5f87d2543c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0834f51bb361333eead420e282dc80e2
SHA1 36a2f8227b3f2c91e60631c3717118c7a76497eb
SHA256 e167a85ccae7dc4bf5d60d2ca1df7c7831f434910bfb6a3198606102b0cd6baa
SHA512 6195a6dceeea410c16720c247b746bf218fed78c1e8268a6f3a535efb8888548e4d524134558cb3fdee021745c8d50dff9b8d7fac52a32b6dbaa738990dc9f8a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 fed880a63823091f70cc9b462cd6e783
SHA1 a5d6deeb7626715d1d14fbea3b04fffeebeddd09
SHA256 92077c9cfbb01efc2f33fd5e49624c354180f3dda0ce77c2fe0a381e7a1202be
SHA512 4e857491f983c51ce11a3083091a6c5934ccf53f5f19987b84bf3756592c2fb37e9ec9bf64be7ef2467d43af5952b6a8f19744f55031c4c1b26fa21f6f4aaa8a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cfbd1352637a3dee6b4005a172a13dda
SHA1 966645e9a4c85812d5203b94179a2d190f6d1e0e
SHA256 2dc65cfc6299d84679e0986527df5e8443fcd3797526534260c39d60e55badb8
SHA512 d7d15749b5bbeaba3dff00054adb595b99e3881a58f217aea86095e513456a98c5d675785f15a22cd2f626d2976bcb842ad7a14dc4674b5cd83eba9f768f975b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 df63c0fdbe76979b96f56544f67164c1
SHA1 da5245e570ad5aa09ec8df09eb58b2a72f0c14a6
SHA256 13fd0b0163bb91701fca8200c622c5394db6b691b2df780e1a547ddda5a8f267
SHA512 7f2d05af7e92000c993324769bd20dd6c2a2cbd0b3c1ebddf0d93bfd16dc9fb6d0b3675ce75ddad3bf4c2633efc3b1e50e6486fa9d2be04c686ec1c742de31a6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b41adf4ab36713749a3e00651630ac63
SHA1 6611a58109efc8e48992ea10fa1f4b8148798cfa
SHA256 8a52b4cb9079e54fefe8c18dea1582074d329e7dba9386133b047ec2c386aade
SHA512 f1e657e6090e0560345df5ce1ed1dc790c371400880d63454464ae39bc8ce7fa3720629c6af8e2b7201cfc69b1cd436252467a70fd0a92a6914d63ecd26bddbb

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 04:32

Reported

2024-06-13 04:35

Platform

win10v2004-20240611-en

Max time kernel

128s

Max time network

141s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a3d426b3b44e0bf0161ed6bc35c18a9d_JaffaCakes118.html

Signatures

N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a3d426b3b44e0bf0161ed6bc35c18a9d_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3760,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=4348 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4048,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=4884 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4524,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5468,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=5476 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5480,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5992,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=6060 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=5824,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
IE 94.245.104.56:443 api.edgeoffer.microsoft.com tcp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 13.107.6.158:443 business.bing.com tcp
US 8.8.8.8:53 saltworld.net udp
US 8.8.8.8:53 saltworld.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 saltworld.net udp
US 8.8.8.8:53 saltworld.net udp
SE 184.31.15.40:443 bzib.nelreports.net tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 104.21.11.155:443 saltworld.net udp
BE 23.55.97.181:443 www.microsoft.com tcp
US 8.8.8.8:53 gamingw.net udp
US 8.8.8.8:53 gamingw.net udp
US 172.67.160.162:443 gamingw.net udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 56.104.245.94.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 40.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 181.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 155.11.21.104.in-addr.arpa udp
US 8.8.8.8:53 162.160.67.172.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
GB 51.140.242.104:443 nav-edge.smartscreen.microsoft.com tcp
GB 51.140.242.104:443 nav-edge.smartscreen.microsoft.com tcp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 104.242.140.51.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 www.gravatar.com udp
US 8.8.8.8:53 www.gravatar.com udp
US 192.0.73.2:80 www.gravatar.com tcp
US 192.0.73.2:80 www.gravatar.com tcp
US 192.0.73.2:80 www.gravatar.com tcp
US 8.8.8.8:53 www.gravatar.com udp
US 8.8.8.8:53 www.gravatar.com udp
US 192.0.73.2:443 www.gravatar.com tcp
US 192.0.73.2:443 www.gravatar.com tcp
US 192.0.73.2:443 www.gravatar.com tcp
US 8.8.8.8:53 i1.wp.com udp
US 8.8.8.8:53 i1.wp.com udp
US 192.0.77.2:80 i1.wp.com tcp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
US 8.8.8.8:53 2.73.0.192.in-addr.arpa udp
US 8.8.8.8:53 2.77.0.192.in-addr.arpa udp
US 8.8.8.8:53 14.213.58.216.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
NL 23.62.61.97:443 www.bing.com udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

N/A