Analysis Overview
SHA256
4b6b4b950b2b85a3d019d7196945445620f5ac417f9e0d4a8ebe48fd9c91c47f
Threat Level: No (potentially) malicious behavior was detected
The file a47357f1dd2b140c30d5b4b6d162fffb_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-13 07:35
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 07:35
Reported
2024-06-13 07:37
Platform
win10v2004-20240611-en
Max time kernel
145s
Max time network
129s
Command Line
Signatures
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a47357f1dd2b140c30d5b4b6d162fffb_JaffaCakes118.html
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff896dd46f8,0x7ff896dd4708,0x7ff896dd4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4712822897684588813,6922930496083161928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 74.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | soicau.biz | udp |
| US | 199.59.243.226:445 | soicau.biz | tcp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 203.107.17.2.in-addr.arpa | udp |
| NL | 23.62.61.104:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | soicau.biz | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | b4a74bc775caf3de7fc9cde3c30ce482 |
| SHA1 | c6ed3161390e5493f71182a6cb98d51c9063775d |
| SHA256 | dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280 |
| SHA512 | 55578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f |
\??\pipe\LOCAL\crashpad_1044_DERXGKAHQCEMBCXV
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | c5abc082d9d9307e797b7e89a2f755f4 |
| SHA1 | 54c442690a8727f1d3453b6452198d3ec4ec13df |
| SHA256 | a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716 |
| SHA512 | ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 9a38da8a30a40960aa171214b63257fd |
| SHA1 | d7b5561b797be9f8f23595ed66794b74f6ce7ebe |
| SHA256 | 3776d435cde5c705ac8eb7261d74b4231ffdf3abbd89267cfde8b388cf41822a |
| SHA512 | 5ca8f0c3d4e6b46146feaa59dd5dbe2e82855b1d5660bf29946b6db87a8bd1e94c864e37b8992a71e07541dec52bdd729411ea6c476179d74db97446831d6219 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 206702161f94c5cd39fadd03f4014d98 |
| SHA1 | bd8bfc144fb5326d21bd1531523d9fb50e1b600a |
| SHA256 | 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167 |
| SHA512 | 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | ccfaca63151cbdce3a25e04b87a4c867 |
| SHA1 | 71a0eaa690720043492b38ced4ea99eaed37307a |
| SHA256 | d9bd942e6f86a154f0567bc61be265eb269c4e5d29af7d705dd56a340e15e8f4 |
| SHA512 | 1c37f72dd2f42750f19a50b076a07d4b1c79ac927895b2a225e6ed0a5e409f166e0c6c52792011a90e149dab741601574393ac2f26b81dc12861cb5e3e1c91c4 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | b3d20be7959f081d9590ac43fdb67de6 |
| SHA1 | 170d7f529d31288b26b3ae067ba5cd3d31350573 |
| SHA256 | 3ef2e3f720d7faf589d7c040ab55ccfbeabf4e2818f87ae83eeded151b2f4950 |
| SHA512 | b831e92385032f0492eaf6e8175612c98e38bcce6b2996ec4a3b3fda52e3d29523c73b7e9c7944be4df4aefd25bbc3829de7330d7b9e9eb1508da37d1994a8ae |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 07:35
Reported
2024-06-13 07:37
Platform
win7-20240611-en
Max time kernel
122s
Max time network
133s
Command Line
Signatures
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424425978" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000923d9333e10fe5d9987bc72be73c07b225c3a7e173a3a751a0ad4c1491540b32000000000e80000000020000200000000fef071faea57cc99176d4723c04ca7c4fd1fae4947782bdf5a72b8a8d5990549000000091e88fe35e3eb59a6835ba66250d10dd41630e3f53a49ff6864d25a73d3bfcc2d5e830e665cbd2d64aa3d97d321fee0b263699e579549f4afe09aa7af29cad5020cce6672ff08c6ec3ef3a803707bd0fd024b46f3d188d3494ebd912976663810133a05b8faa02bc5a432e766753145a48d1a41750dec7de0bdb86dba4cf973127004c04fa90894b3ee5b7218b2a5ad4400000005f7ff722055646cd05f47a4cc98ecd1d62f042a5282c6383a37de3e2d03c8a2df5fa724b5df0a8c63844707a4f1a2a6ccaf5ed852b44013cdee7530953ab87cd | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7574C841-2957-11EF-8A4F-62EADBC3072C} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000b6d802d958c75e0eed03b374ad81b6e778466dc8c3e3d49c25131fc25ff70956000000000e800000000200002000000054dc2970d0e9b55e5d662be5c58f1f0ed38fae7d5e2b1123107c55a2ae3a197c20000000f0a6c581ad5b70cd6ae48713c93e8a780bc105aec01e7e4a3cb843cacb569b31400000001de1c075aa626493155c0669aca5e5ee4751ac2689ee635875f440d4d5dbccaba6ac6d649bdeec4eea935f7a8d811fe9ae0775ae4bbf3dbeaaf7da6bda46a06f | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9049294a64bdda01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1720 wrote to memory of 1928 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 1720 wrote to memory of 1928 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 1720 wrote to memory of 1928 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 1720 wrote to memory of 1928 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
Processes
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a47357f1dd2b140c30d5b4b6d162fffb_JaffaCakes118.html
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\Cab8D54.tmp
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\Tar8DF3.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b7d8415d303437903fbaab069927ec43 |
| SHA1 | 9fed115b1163e6307aa12d1dd85f73ad3df01ab8 |
| SHA256 | 083f6c0922be58c677f2f20bb25b6df80bb16581af6797d8d646aeb21b952745 |
| SHA512 | 40682d688cb5d6d8601e97d6f0409547b28119544ba221da46e8f02bc6cec7a7fae24fbee2b367e9923186640db4f22555ea51f2c916369de46bd1d5187a185a |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5648c7ecf1cf4c0b885ce8a9223b7c6e |
| SHA1 | b5f0986476a01f78fb5cedcde3afa30a1056b8c6 |
| SHA256 | 68d739e6e958f31ab2b1f8db043853ab88759c1d27b6ee91af902360a5efa726 |
| SHA512 | 77c00f3b505cafb2dc0e51678c0d40fd215c3b7dda1ad6656b4994f0ba70a6fbf643da337465d059864e1922f0628dfb5f8a46b000834a8ec4219f1da92816c9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 907e607766434d2ef93d14617bfd68f1 |
| SHA1 | 09408355c6e3fb715ec6f086dccb76f32c0e9fc4 |
| SHA256 | 675ad007edfd2a3901fb29315ed00c026bbe7ea7f5f43e3b6bf8b8354784cd7b |
| SHA512 | 59eb90a8c8380bce8e9b8c183b083cab417bd3ba0ff832f6979ac89d957bbb250af3726cd0d48dc3a4b7c78c9360b5f6a287059d9f545a72bf6dcb88d6ee03e4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 4e5e23eff32e31a6722cc078e2f02dac |
| SHA1 | fe3ad8aef47d27f6480e3702d1884eec1378150b |
| SHA256 | b6e62b23da2b76fc98052d8e8075f70a30ed939a41f564bae0b7c842c4f672ac |
| SHA512 | 85e40379c449f259d374a661ee90116dda68ddc6ade3b8e5090189b332410b004910af65d81ce345d02a27d3bbeb31bba88b7661b173740f3c1b031ba63b481f |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 84116251a6fc83c617a6ad5314609548 |
| SHA1 | 4224b7cfca14735d41331bad51cd871b77685712 |
| SHA256 | d965b9abb2112c33ff850ae86a9b03b4665ed4b8d23d80c6e97cb5ec0d45054c |
| SHA512 | ff3b2d815c20ee34e90bd89e639b1ab76c3777551d2ffbae77cf5dd9be6ce2eec1428ef92b55da6dd1445c2295a47bf754dd9edaf9c1e0457276680066b0cf78 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f22f8258dcb6882118593ccbdd5e32c9 |
| SHA1 | 12f3eb5127b74ff0d015bef57909e958e6971cc3 |
| SHA256 | 1faa69d65b957808a50ccfc9888cdcf1a2b80aac09e11cd7d32aff9580fed9d6 |
| SHA512 | 11f465606f74325d5a6f41df78e2a81e8a44e44b8c7a0f29c433acf0bb59ab79b9d68851e2edae727693f71fe15e03d4a347dabe1c0b66aae8b456cf967cec0f |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5418e6dfdb91cc5798e8fc287360a3e6 |
| SHA1 | a146c57fa428bcc520cbe2818222c1173dfa6380 |
| SHA256 | c3c2bcd6f80e09fc69a7945f5eca9f08c97a82933d5df6b66015e412c93147e6 |
| SHA512 | bacbdc831e1438ede31bc72c1abdd69991d585708d635dd5ee04f9f05176cf2ff0ea752d2bdf696687065045ee5eb80e043ddcd0c47579b1b47da00281ab2375 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 368702af573f655c76fc62a3cf2a1f97 |
| SHA1 | 3a48ae57a1b15c420ddce6bb07134f03c0041374 |
| SHA256 | 95bc0093680df2d02362b84772411d3ff24b06cc7ef0199e9625a00af7870563 |
| SHA512 | c4d40042df04723123f51cefea13f9833a93e0d3982c71eeb7529b3662ff2d006bd5538a652adff16d195903667aa788f421f4fbb3547f6055e0e535852664d7 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9a198036422843ae70a0e0d83479e085 |
| SHA1 | 70ab2be6053a6578fed9ac65dc71b24e38c63fde |
| SHA256 | f70ad73fbba76b52d31a6e875b6a493f2f35a24ffe8089e487be3bd3501a9c2e |
| SHA512 | 6d6978b89bafe56250a87f8401dc9c07ed134b34431f643293853d7344ef9100add6a1a0c9165a4dbdfb9310a28cc3065e076a832088b7ba20d7d9b7212702e4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 425a6567f4a14fd1902e8fd78a9c294b |
| SHA1 | 561ca5fab32b0cdb9eb081be320e220fba3c3033 |
| SHA256 | d1e8c1879e7478acce75bde2af6282a4e09e179bfe7bcf29400afbe2709cf342 |
| SHA512 | 2c780edf69e491c3544f61e6d3ddd1d5b49ae9d2a61201aff7d6c8d7291e84f9430d5bfc45f98dcef87520d99211887c608f4f43e57e0585efa62192bf26d041 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f951ee3249f6fee4544c6d6e635be8ef |
| SHA1 | cfb98ac46a3a332363bf226f4461f245a8a1e25f |
| SHA256 | 4e9a068eda8037d75da74c314ae42f2e54ed9e0d081af52777da2c4d7054389b |
| SHA512 | 83c820a1defb182a53dc6b1e69d0999dce263b1012271d8e728d6c337b9da61c339a25173a55e452ec878869f114201754632340b87552165de0eb4e271cebff |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | dc8b409c763b50ba4efac9f46e0e043e |
| SHA1 | 82468d2abaf9e53570f397e6347af68f9c957ecd |
| SHA256 | c60b603ee9a5136227a5144d4f20044c119875911434eb03ec2d58bc82aeff92 |
| SHA512 | 3897144c6f87b00a9e4a777dc58bae49ed17763fac0ab26bc31ec4e886d7eb83370d6310112147efdf9c8581c5cc71683dacf82cc653c87d6fbcfc42fe110aa3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | ca35f6e63f65621bd2b369b1c6ca61e9 |
| SHA1 | 004f6b5c95274cad0b95c88209339b9584e5fd91 |
| SHA256 | f478d90abdf84d7594533e578173bd92c2e2ed98360e0afc3185715610ba3e41 |
| SHA512 | 8e05d1b881fba83566af8456ec9c1807652ab3f66435ef799556e5bb33d5c2f8b4596d8c671f4d573280e9396f1db8e1ffe3d6eedb59feffccd0e96cecf6dc11 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c96bf881e9c0e7ca802fe20cca76b5f1 |
| SHA1 | 7a6dd3083b13e36960dfe8214c6d6b049b1b411a |
| SHA256 | bbc23a0ff87c685426cfb4a615ac958cd0714024622bc7485e3bb5f64257654e |
| SHA512 | 6c3b48efe81ae076f9c69e25c84e46a835f00a7b1c66bd160faf631d5ad0b1ae31c454860dcd305b27a647d86aa50c18e970dda80832fd3c95e61ff35253f451 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c38fb244156116bd76e2d8c67d3e68ab |
| SHA1 | 7bf2f948f457d82746c1299eb481cdeb90b97547 |
| SHA256 | 3889929ce794ac1afc77a48c0012ad4f41925204e88ec4c317efa04c96242111 |
| SHA512 | 5d31ad30544d8365d8a485bab55134a1d679e2b7c06cf4e4bccca7c349b848377d733008262624d150edf3a024b0a3a7ce7e9475479d3d9529a5ced15a70c05c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 1ddf97e1ee667fbccb6afe3aed4deb18 |
| SHA1 | a80cc0864c39fff7320fa0d0c5bcd586324ac811 |
| SHA256 | 0de272fc14b1cd530dd8a60b06e928b42e9953b8c31bdfaf3a15d140d9d4e513 |
| SHA512 | fb9aa21b2bf9fa66a6d3a77b4fb4711c34d6e5d82125719327bd7da9852129cd969abcadc0aec341aa4ad69c6cfdca53c8fd4adef190dbff612bf74065c21130 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | defb928a4655477110e1a562d668812d |
| SHA1 | 2b9bebf26744e1bf4f7f5283a2bc312aff525ee9 |
| SHA256 | abffd6abb7e403aec37491de7732c64ec1c100bc0654b3ac91881c4f12107e3b |
| SHA512 | 12e3efbbe1e7778a886207a32bb5cdaac223c0c14ddc91029dd55d3feb26ec50d07b431d7ed3dd819512a7c555c4b8f1a2965dc676dce2705ac123356413eb79 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 8a5491b777f4de332a00e591614f05d0 |
| SHA1 | 1252f7c75f54d0276ba52f7bfb3bbbc9c8bcecee |
| SHA256 | 5388a419a079825510ff3bb5233e50cdebbfcebc26b4c1b4feaf00dd9d0f76e2 |
| SHA512 | 473ca1609294134d28865d611ca42bea032dce75096e291f26d7c1037b1c34b0afd6f52c90297dcafb2d2f72e2c8bcf424fcc1353ec45095c3850549298061c6 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 96d148818c5b2275f6c28df709561e69 |
| SHA1 | 81ace97fd854a40f22ffa330ec39d3f582286c0e |
| SHA256 | 7840ee84bba2ec92e8d6381ed37635c877afb7c8f0bca3e1c829cc679a358d1a |
| SHA512 | 6b5b8643f28afbc1c817039730623a57bf5b80b0c3b47b40c152f47ead0b1ad356c04ef638b1c89e3395fe8859e742ea5f53c150e988d77a9befc34538749231 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | d4bc8e1341cb0f2cae9c7d3b6abf8b16 |
| SHA1 | 2bff6ee0972db7abafdc117dd02b99fce67a34b8 |
| SHA256 | 329b103d1bbd950acd973e36215fea6c91b017d5784ccadfed6fb528d03f32bd |
| SHA512 | 6cbbe600b8c44e7504abcef497e7f83a19bcf68e4b82ae8d5ef2709b243e5b535e6529592f7646a1d75789e6ccbc2a029b98b4243b58f87fde13aed6bfefab9c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 73a9fa0bf28af70c2bbd1baa1667ca6a |
| SHA1 | 8c458c446c0ac8a61cf645b914133031db1eaca6 |
| SHA256 | c01048f0796b1235caa40597f2718174ef367cc4ffcd137949de4b982b33d512 |
| SHA512 | c9b4349342fa9c3b446584b3e07398b81014bbe0e3a90d0585f502353f6f0bb8056c5eb6ed72a2fa627396ef9edf16d955386ed518c6b4b7d8cfe5b4f64f327e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | da675e4ef2cd2fb72e6a9b5e7d28195e |
| SHA1 | 8f122e43aa1e48a5b4a1464cfd9c2492ac969f89 |
| SHA256 | 439af51b59db5285f19a5302967746523a386a6ffaa4c06e8c4d5f8b368c62ef |
| SHA512 | ddcb9f6e89a6856fdcc3f8b6e9d4915ff53d6e4b97f8e0d735b9ed8026bbbec439d34e8ccbbd816f1dfa30afabf6e3f0881da9d7cda2a6eda43a1de9c34060e6 |