Analysis Overview
SHA256
dbba58f99ba563980bfc5fcd7ec0fa2b758f66b68a30415d877587b3f754d14b
Threat Level: Likely benign
The file a5d5d44915632de67eefbc8a11f904af_JaffaCakes118 was found to be: Likely benign.
Malicious Activity Summary
Enumerates physical storage devices
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-13 13:40
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 13:40
Reported
2024-06-13 13:42
Platform
win7-20240508-en
Max time kernel
140s
Max time network
122s
Command Line
Signatures
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe"
Network
Files
memory/2180-3-0x00000000001B0000-0x00000000001B1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\InstallTmp\Config.txt
| MD5 | 361c7292012c7b10e05833560177d583 |
| SHA1 | 53cda2d765a914760008ed01eb2a675beb274333 |
| SHA256 | 17b51f2a87139037db4efb9fb660ac8fe9d041d5d0523fa18ab0660763aacf9c |
| SHA512 | d960e4705c28cef21c49c0e3fd443ac5631b61fbc2d2a9e541485272a0a3f198d57a8fd8a515b4c520475b1b10dff3f5c71ed15904b494df0e5f702d86eede11 |
C:\Users\Admin\AppData\Local\Temp\InstallTmp\Readme.txt
| MD5 | 660283212989828403126967ca7af80e |
| SHA1 | d2390fbf12c5692f3046a75fa6d10582831e06e3 |
| SHA256 | 2b883de63e0b3e25a31ee2813a1e868c6733439167ad77ae46284699e286a8e0 |
| SHA512 | 01d49226a00e4b7abce0843f30dcd3e5815146c3a444fc1f8b3ad462c2749e152084c5a994a6eb6cd4abb1b316680c0a3d78f5fecfc896dec5e9a9af39a90754 |
memory/2180-180-0x0000000000400000-0x0000000000516000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 13:40
Reported
2024-06-13 13:42
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
152s
Command Line
Signatures
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\IESettingSync | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a5d5d44915632de67eefbc8a11f904af_JaffaCakes118.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3756,i,3724086843943218842,1026644135694712596,262144 --variations-seed-version --mojo-platform-channel-handle=4000 /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/3840-0-0x0000000002270000-0x0000000002271000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\InstallTmp\Config.txt
| MD5 | 361c7292012c7b10e05833560177d583 |
| SHA1 | 53cda2d765a914760008ed01eb2a675beb274333 |
| SHA256 | 17b51f2a87139037db4efb9fb660ac8fe9d041d5d0523fa18ab0660763aacf9c |
| SHA512 | d960e4705c28cef21c49c0e3fd443ac5631b61fbc2d2a9e541485272a0a3f198d57a8fd8a515b4c520475b1b10dff3f5c71ed15904b494df0e5f702d86eede11 |
C:\Users\Admin\AppData\Local\Temp\InstallTmp\Readme.txt
| MD5 | 660283212989828403126967ca7af80e |
| SHA1 | d2390fbf12c5692f3046a75fa6d10582831e06e3 |
| SHA256 | 2b883de63e0b3e25a31ee2813a1e868c6733439167ad77ae46284699e286a8e0 |
| SHA512 | 01d49226a00e4b7abce0843f30dcd3e5815146c3a444fc1f8b3ad462c2749e152084c5a994a6eb6cd4abb1b316680c0a3d78f5fecfc896dec5e9a9af39a90754 |
memory/3840-179-0x0000000000400000-0x0000000000516000-memory.dmp
memory/3840-181-0x0000000002270000-0x0000000002271000-memory.dmp