Malware Analysis Report

2025-04-03 14:22

Sample ID 241211-q8b5jazkhq
Target e1c482fbeb5e106944392ef0485be2e2_JaffaCakes118
SHA256 da6a5e85d4815b8a9e822e252d2abd348d38e66572d78dbecc82fc31769ae4ef
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

da6a5e85d4815b8a9e822e252d2abd348d38e66572d78dbecc82fc31769ae4ef

Threat Level: Known bad

The file e1c482fbeb5e106944392ef0485be2e2_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

Socgholish family

SocGholish

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-11 13:55

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-11 13:55

Reported

2024-12-11 13:58

Platform

win7-20240903-en

Max time kernel

141s

Max time network

144s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1c482fbeb5e106944392ef0485be2e2_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440087200" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95E9D031-B7C7-11EF-B221-F245C6AC432F} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1c482fbeb5e106944392ef0485be2e2_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 t2.gstatic.com udp
US 8.8.8.8:53 www.mynewcounter.com udp
US 8.8.8.8:53 t1.gstatic.com udp
US 8.8.8.8:53 www.zimbio.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 geoloc10.geovisite.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 i155.photobucket.com udp
US 8.8.8.8:53 www.linkreferral.com udp
US 8.8.8.8:53 ping.sg udp
US 8.8.8.8:53 www.bloggernow.com udp
US 8.8.8.8:53 stats.topofblogs.com udp
US 8.8.8.8:53 www.blogarama.com udp
US 8.8.8.8:53 www.freewebsubmission.com udp
US 8.8.8.8:53 www.blogdigger.com udp
US 8.8.8.8:53 www.scrubtheweb.com udp
US 8.8.8.8:53 antispam.searchengineoptimising.com udp
US 8.8.8.8:53 www.blogrankings.com udp
US 8.8.8.8:53 www.topblogarea.com udp
US 8.8.8.8:53 www.blogflare.com udp
US 8.8.8.8:53 img1.top.org udp
US 8.8.8.8:53 www.bloggernity.com udp
US 8.8.8.8:53 www.feedage.com udp
US 8.8.8.8:53 www.feedage.net udp
US 8.8.8.8:53 www.linkwithin.com udp
FR 142.250.201.162:80 pagead2.googlesyndication.com tcp
FR 142.250.201.162:80 pagead2.googlesyndication.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 142.250.179.78:443 apis.google.com tcp
DE 168.119.245.137:80 stats.topofblogs.com tcp
DE 168.119.245.137:80 stats.topofblogs.com tcp
FR 142.250.179.68:80 t1.gstatic.com tcp
FR 142.250.179.68:80 t1.gstatic.com tcp
NL 18.239.18.50:80 i155.photobucket.com tcp
NL 18.239.18.50:80 i155.photobucket.com tcp
FR 216.58.214.169:443 www.blogger.com tcp
FR 216.58.214.169:443 www.blogger.com tcp
FR 172.217.20.164:80 t2.gstatic.com tcp
FR 216.58.214.169:443 www.blogger.com tcp
FR 216.58.214.169:443 www.blogger.com tcp
FR 172.217.20.164:80 t2.gstatic.com tcp
FR 216.58.214.169:443 www.blogger.com tcp
FR 216.58.214.169:443 www.blogger.com tcp
CA 167.114.57.160:80 www.linkreferral.com tcp
CA 167.114.57.160:80 www.linkreferral.com tcp
US 172.66.43.66:80 www.blogarama.com tcp
US 172.66.43.66:80 www.blogarama.com tcp
US 172.67.193.92:80 www.blogdigger.com tcp
US 172.67.193.92:80 www.blogdigger.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
NL 212.8.249.233:80 www.bloggernity.com tcp
NL 212.8.249.233:80 www.bloggernity.com tcp
US 208.98.35.225:80 www.scrubtheweb.com tcp
US 208.98.35.225:80 www.scrubtheweb.com tcp
FR 54.36.176.112:80 geoloc10.geovisite.com tcp
FR 54.36.176.112:80 geoloc10.geovisite.com tcp
US 75.2.37.224:80 www.mynewcounter.com tcp
US 75.2.37.224:80 www.mynewcounter.com tcp
US 104.21.16.1:80 ping.sg tcp
US 104.21.16.1:80 ping.sg tcp
US 52.6.88.216:80 www.feedage.com tcp
US 52.6.88.216:80 www.feedage.com tcp
US 74.208.47.213:80 www.freewebsubmission.com tcp
US 74.208.47.213:80 www.freewebsubmission.com tcp
US 172.66.43.66:443 www.blogarama.com tcp
NL 18.239.18.50:443 i155.photobucket.com tcp
NL 212.8.249.233:80 www.bloggernity.com tcp
NL 212.8.249.233:80 www.bloggernity.com tcp
US 172.67.193.92:443 www.blogdigger.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
HK 47.75.130.169:80 img1.top.org tcp
HK 47.75.130.169:80 img1.top.org tcp
FR 142.250.179.67:80 c.pki.goog tcp
US 208.98.35.225:443 www.scrubtheweb.com tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
US 8.8.8.8:53 blogdigger.com udp
US 172.67.193.92:443 blogdigger.com tcp
US 172.67.193.92:443 blogdigger.com tcp
US 208.98.35.225:443 www.scrubtheweb.com tcp
US 208.98.35.225:443 www.scrubtheweb.com tcp
FR 54.36.176.112:8080 geoloc10.geovisite.com tcp
US 8.8.8.8:53 www.777seo.com udp
US 8.8.8.8:53 accounts.google.com udp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
FI 95.216.161.60:80 stats.topofblogs.com tcp
US 8.8.8.8:53 developers.google.com udp
FR 54.36.176.112:8080 geoloc10.geovisite.com tcp
FR 54.36.176.112:8080 geoloc10.geovisite.com tcp
FI 95.216.161.60:80 stats.topofblogs.com tcp
US 103.224.182.251:80 www.777seo.com tcp
US 103.224.182.251:80 www.777seo.com tcp
US 103.224.182.251:80 www.777seo.com tcp
FR 142.250.178.142:80 developers.google.com tcp
FR 142.250.178.142:80 developers.google.com tcp
US 208.98.35.225:443 www.scrubtheweb.com tcp
FR 142.250.178.142:443 developers.google.com tcp
US 8.8.8.8:53 www.zimbio.com udp
US 8.8.8.8:53 www.blogrankings.com udp
CA 167.114.57.160:80 www.linkreferral.com tcp
US 52.6.88.216:80 www.feedage.com tcp
US 52.6.88.216:80 www.feedage.com tcp
CA 167.114.57.160:80 www.linkreferral.com tcp
HK 47.75.130.169:80 img1.top.org tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.18.190.73:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 23.192.22.93:80 www.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 4363968f2f8d53c4398a07c3c54961be
SHA1 2daeb75ce7ef93b67468d6be0f3aacbe54f24cff
SHA256 9bb4d340bb70069d0043790506547e7401c91c0a1730560c7a67008be4c888d8
SHA512 0993e38c35a60500e3761ad9b0cbc66ca99453359084d3e71521c4569362b3019d9ff4b475484e581ed6e1a9ef5cf2d675486811e2aee68cd6631e8b238d46b4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 9a43a6e17c1cbaa38c3f0c2d4284b747
SHA1 67a0f07978f89a31f99fa0e8ed5410e5d748e39c
SHA256 0b80f559ee5e985534bc6aa6172258f2a112e3caa1093a923ea7f9060e9a0693
SHA512 d69f69b021b7e8c28f038e0ab8f5ee7601f11afec97c877c877d8202f48978998ae99f9ac9d23e4726ff04444550ba4e3244b82493a3960d28f699bea8a4c9a9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 9c3167d02789a944dec764d9e12c6d94
SHA1 7b74553d4d76676867f5b035444d62ae008323db
SHA256 31adc7776dbe50a663195bbc9a597897ec1439131bd3b2c8297ab2e081525cea
SHA512 cb4968aeed8036fd9f20a99d387396388c552f5643a65ed8ab73df2bf38eb403060674463d516ec8622682e8e49ee57f916353630e8ce6f133a0a485da090809

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 605d46acbe7dd48a27cc6977ce3872ff
SHA1 6667d1dc455f01b0843c75f100544b67023814d2
SHA256 b664844ba1a3e49522bef520c3f1bf143fdf455056441c2a42d5146daddf6016
SHA512 9bae2e26434f134073c474a8fcdcf64c96d28e9cf07428e97d70176ed001f5860a106dce795fd5ef15e1144d5fb9f8958320c2174164c60859d1f1e36c6c27d8

C:\Users\Admin\AppData\Local\Temp\Cab4D48.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e3fec07e4c0861cd5c6493ddcc06f616
SHA1 bb0fdd0c3bd46c3a673f3482cd5292f169cecd2d
SHA256 3634acd9a64b602780ad0e3ebb0d4f5c9c0ed70d3bc5cd4e94b86dbb6c6e2f91
SHA512 91920b4462d68ad3296201864743d8ad78550219232def74654b709983da2d34181ed4315da4ebb3e6719933bc1cb0aab839dce09468c68e44b8bd5c4c89b73c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\Local\Temp\Tar4D89.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 80805fef8aded7e8b7d576a043b4824b
SHA1 bb174239a43d3adcb27c46974edb7f23b9527601
SHA256 9983bdce3380168ea477fccd2a7ce6f48008318892a9365ac90038bc247d10d0
SHA512 02032ed150a044e53aca8d52b7bd12ffd3589bf368f0f55bbaf089b4631ba43249cff1942e619de54c743223c9b25e13fe2ba043be75346ca3e1a568f894cf59

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cc6d6c9fa66f35d8c953c650fd06fe9a
SHA1 334a4b9fd2034c8465417e080a8ac4c8d05db63f
SHA256 e11efd5090e3dd43eeccd54c7aab20aec77b925b5857c4b82014e86aa025cab4
SHA512 1eb9426f6c13135b220d0e30f1708331460b7b5b7c3f5dc3817a2de78579dfcb64ab7e7b35dae9eb5b88e103ab91249f0397e028ec71a54509374b7a6be95e35

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 75de656defd632840ee6280b13d5ed66
SHA1 7d5df0a1f158fbdf43a19e767707acc86466b367
SHA256 05984f0b5fc82e4ae6ec1f40cc3085d7258959abd51f707b1ff340086dd7d6ce
SHA512 bc2aba609ac0a4a774bdb071fa3814a0ebfa364399fbabb352c26e09b40c05782c769f01c46ab354a6db11960d7137bbb5e69d100401b0e6668ee237e6812f1b

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\plusone[1].js

MD5 2693cd35d818b48f4cd562c6abe0db29
SHA1 131c844eb658219966c722b60cc12c8a542ebe06
SHA256 911fa262008c6ef2bcf8448ad83a5aa8129c39355b98d957f5c7dde2babf9b7c
SHA512 4f692bd49811addfe89d14b156fed6513f04ec4be2629086a8b66ddcd6e7b8b7df149fa017173824c30f7492c2320a3d7b9c0344d5e1f7074742558125654f1f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6b5d9e99df235914f61c6e720e53e28e
SHA1 4c41480007e0be937b1aba3e26a1a31edf213a19
SHA256 9371215340d8a617a01fd14e3a0b3f172a8f02502673793ae04c7c111b14b0f5
SHA512 eaf2b3e6f9900f221a79b09c6a8e7df04b6be286523d0558f9d183f6d2f63ed8e93ca57085c59175cfca43ceb7c524692a1416910f9ff2cfece8d99fcd6f4417

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 59ad6523cec915e8f3c75d443bbea187
SHA1 35a3037688250c266ad32c7c6739460d1d5d5adc
SHA256 94f7d30fe2f408c9b9107ccd8b65f67b5fdf8698be9863b47384b8a703844440
SHA512 3d810d2827ae473aa10b2ca6db5722f243264bb1e5707378659deb69656dc305c11bf6dae17a2e460be52d13f0485e56928174c834e51d8b25958747c03952a8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 339bbb4e95529d378b4ec43575457cea
SHA1 f17cbb90439aa4b563ba595a8ad88acb75cc69c7
SHA256 f5dd7214465c1e8aa7afa5d99faccdbdcc2801cba83bc9f662d2f011f92fb693
SHA512 9c593e0ccc1d084a2144ffba3df40188a88537b8148f0088142e45c9a38abf1532f66f2d98855a001dec8b37726c79bcb0761245b911a1bbf4d23acc2658a445

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 001ea6d6a50ae4e599afd57269682cef
SHA1 c3f809b7d49a40b074f31e2cd323f65581840862
SHA256 321f311f3dc657404a7355e217935c08efe21d90e282920f748c808573a7357b
SHA512 99d827e0c7640976d1d81ede8ff03f64e14260cf4b3997b5f648478bbe3ca751a3d311b0bba46cbe0ea4c918b7df2681fcffefb967c24ff8f76ccdd1da8df68f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 50f1464495308138ccd399c29ab4035a
SHA1 40b7d05e9198dc3d056d635ba0ddb985fead82c9
SHA256 3001821eabede298c7df54229a36dba9970fe775e29e357cd0b3e245b6c99d10
SHA512 85aad431e0b1063c46dcf198c298a1ec8df8b6ca8797abadb3b039260d9fa75e3e3f710906fc922c1aa2d351e961ac762e50fb2e00f536a071720b09d58aa923

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a02fa2d6db8f471520288894370a9958
SHA1 3d04b1fdd6e12cec6bbd8aa30a73d28b24ae169a
SHA256 6063611909d7055b03b4dbe4a23a2d262e2cb004f765b45b4afbc48f52eea947
SHA512 c4b0838c86b136b0786ebb7dc35aaedc63314e808762969c051ac03e65fbe5134b6949d5832e277ef7ccc01db1c82762dcbd688d6063b219ab1529861e6b715d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dd384de27cdf0e6bcda78546731720a7
SHA1 6d567a40d9bd77b41d09dd0cd9d6becdad5d02a8
SHA256 21bb2260fa6b747e1328b41f27fd4584dce6d547ffcfa291139cbe47b2912f06
SHA512 dbef8c32df13f6649ab3a57e2f18a2d12810816f174cb16aae327a5ec8a7d34a8cd710d64915e016b7a7cf0adf5d77b6404c61293c477bc9f822bcdcacf68b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8150e46bcd6eb3b685a62b8916024339
SHA1 de737e5f51095ed35848517c2538933c841b7abe
SHA256 3c3b00ca778175a871ed2507e59007e818eb63fe92ba9e188f65f36bc3f65891
SHA512 d89077f6b2bad05811958357dc4d84d466cd497d8c1a82a0ced2967d4896ba3b2df9e89b84fcc8f44e3d551542e56599920a120e22f6aee4f6d8cc8764ba4ad7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 9688a80f16ec751ccac482240a6d5278
SHA1 4991913b208fe80786e328c8428fea389e2df94f
SHA256 8ea9f57f3459b8a7f75bfaf0f1c4afe43a2e512892b0e31bb0f7db2f7faa5a41
SHA512 ecb12615c6859f907573b5b2fe6cfc2014652332bce12fd416bc91609cb5ff6ef6087be681ed5e5143c9310eca18630b861d65052eef1d5cfdb4e3809ddaa487

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f995bce4c7b1dd4f41a58b3ca9327c4b
SHA1 8feb841db093ce0770a72ef8d7bc64836205a19b
SHA256 694ba0d364f1ae5587fc2b07f5bb9a1231c88e81ca9fbc7187ff46891734c114
SHA512 e4ce01a6d5721eafdf4648642d1b6cd43b021f40386707aa92d03e0d46353ca369627ccfa4fafeb7e89ca1fc3dbaf9af920b11ae5a88e5b6d39fce39582d95d1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 15816b2f1cb052bfe60c583983b5c133
SHA1 9b3b4d31718d45a94a55f9e3b5cc09fb427d3b38
SHA256 a8e66876106a18fd09e0aa32718e0b1841a817fc32ba7c93f9b9d4dc734e4f42
SHA512 db425ebbe5f99f8691a0f410fa0bc7a1e1a12bc13c6e6ed4ff925832d744613af84244b1467b8dc9f107e9f03589491fd6e197f6a0a78b734972d373f11b4115

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 00b91acd11866c7cda213ae075ebc197
SHA1 0b26b16fe003d7836f0fa3b41e9faffa5a4a9362
SHA256 291c7f8fdcf903928ab892dc663270b6f37e7af0e91385cbad6b62032dc18c5e
SHA512 fc8cfffac74ab5a33b266273b902180afb12f3d5510c3fb86e0562e13866ffce33fd210202025afef172f955c2f443915a58e6458ca9d6f7d36ab7aadd9a93b6

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-11 13:55

Reported

2024-12-11 13:58

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e1c482fbeb5e106944392ef0485be2e2_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 720 wrote to memory of 3644 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3644 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 1756 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 1756 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 720 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e1c482fbeb5e106944392ef0485be2e2_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffddf746f8,0x7fffddf74708,0x7fffddf74718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5374752990260809425,15067035109954425220,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5456 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 geoloc10.geovisite.com udp
US 8.8.8.8:53 t1.gstatic.com udp
US 8.8.8.8:53 t2.gstatic.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 www.zimbio.com udp
US 8.8.8.8:53 www.mynewcounter.com udp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 172.217.20.164:80 t2.gstatic.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 54.36.176.112:80 geoloc10.geovisite.com tcp
FR 142.250.75.226:80 pagead2.googlesyndication.com tcp
FR 142.250.179.68:80 t1.gstatic.com tcp
FR 142.250.179.68:80 t1.gstatic.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 75.2.37.224:80 www.mynewcounter.com tcp
US 8.8.8.8:53 i155.photobucket.com udp
NL 18.239.18.21:80 i155.photobucket.com tcp
US 8.8.8.8:53 www.linkreferral.com udp
US 8.8.8.8:53 ping.sg udp
US 8.8.8.8:53 www.bloggernow.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 stats.topofblogs.com udp
US 8.8.8.8:53 www.blogarama.com udp
NL 18.239.18.21:443 i155.photobucket.com tcp
US 8.8.8.8:53 www.freewebsubmission.com udp
CA 167.114.57.160:80 www.linkreferral.com tcp
US 104.21.64.1:80 ping.sg tcp
NL 212.8.249.233:80 www.bloggernow.com tcp
FR 142.250.179.78:443 apis.google.com udp
US 172.66.43.66:80 www.blogarama.com tcp
FR 216.58.214.169:443 resources.blogblog.com udp
US 74.208.47.213:80 www.freewebsubmission.com tcp
DE 159.69.186.9:80 stats.topofblogs.com tcp
US 8.8.8.8:53 www.blogdigger.com udp
US 172.67.193.92:80 www.blogdigger.com tcp
FR 54.36.176.112:8080 geoloc10.geovisite.com tcp
FR 54.36.176.112:80 geoloc10.geovisite.com tcp
US 8.8.8.8:53 www.scrubtheweb.com udp
CA 167.114.57.160:80 www.linkreferral.com tcp
FR 142.250.201.162:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 antispam.searchengineoptimising.com udp
US 8.8.8.8:53 www.777seo.com udp
US 172.66.43.66:443 www.blogarama.com tcp
US 8.8.8.8:53 www.blogrankings.com udp
US 8.8.8.8:53 www.topblogarea.com udp
US 208.98.35.225:80 www.scrubtheweb.com tcp
US 8.8.8.8:53 www.blogflare.com udp
US 8.8.8.8:53 www.bloggernity.com udp
US 8.8.8.8:53 img1.top.org udp
US 8.8.8.8:53 www.feedage.com udp
US 8.8.8.8:53 www.feedage.net udp
US 172.67.193.92:443 www.blogdigger.com tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 164.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 112.176.36.54.in-addr.arpa udp
US 8.8.8.8:53 226.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 68.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 224.37.2.75.in-addr.arpa udp
US 8.8.8.8:53 21.18.239.18.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 1.64.21.104.in-addr.arpa udp
US 8.8.8.8:53 233.249.8.212.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 66.43.66.172.in-addr.arpa udp
US 8.8.8.8:53 9.186.69.159.in-addr.arpa udp
US 8.8.8.8:53 213.47.208.74.in-addr.arpa udp
NL 212.8.249.233:80 www.bloggernity.com tcp
US 8.8.8.8:53 92.193.67.172.in-addr.arpa udp
US 208.98.35.225:80 www.scrubtheweb.com tcp
US 52.6.88.216:80 www.feedage.com tcp
US 103.224.182.251:80 www.777seo.com tcp
US 103.224.182.251:80 www.777seo.com tcp
US 103.224.182.251:80 www.777seo.com tcp
FR 54.36.176.112:8080 geoloc10.geovisite.com tcp
FR 54.36.176.112:8080 geoloc10.geovisite.com tcp
FR 54.36.176.112:8080 geoloc10.geovisite.com tcp
FR 216.58.214.169:443 resources.blogblog.com udp
US 8.8.8.8:53 accounts.google.com udp
HK 47.75.130.169:80 img1.top.org tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 8.8.8.8:53 blogdigger.com udp
NL 173.194.69.84:443 accounts.google.com tcp
HK 47.75.130.169:80 img1.top.org tcp
US 52.6.88.216:80 www.feedage.com tcp
US 208.98.35.225:443 www.scrubtheweb.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 103.224.182.251:80 www.777seo.com tcp
FR 216.58.213.66:443 googleads.g.doubleclick.net tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 www.google.com udp
FR 172.217.20.164:443 www.google.com tcp
US 8.8.8.8:53 225.35.98.208.in-addr.arpa udp
US 8.8.8.8:53 251.182.224.103.in-addr.arpa udp
US 8.8.8.8:53 84.69.194.173.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 113.39.65.18.in-addr.arpa udp
US 8.8.8.8:53 66.213.58.216.in-addr.arpa udp
FR 142.250.75.226:139 pagead2.googlesyndication.com tcp
US 103.224.182.251:80 www.777seo.com tcp
US 103.224.182.251:80 www.777seo.com tcp
US 103.224.182.251:80 www.777seo.com tcp
US 103.224.182.251:80 www.777seo.com tcp
US 8.8.8.8:53 ww38.777seo.com udp
US 75.2.11.242:80 ww38.777seo.com tcp
US 75.2.11.242:80 ww38.777seo.com tcp
US 75.2.11.242:80 ww38.777seo.com tcp
US 8.8.8.8:53 euob.netgreencolumn.com udp
US 8.8.8.8:53 c.parkingcrew.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
NL 18.239.94.51:443 euob.netgreencolumn.com tcp
US 8.8.8.8:53 www.above.com udp
US 8.8.8.8:53 d38psrni17bvxu.cloudfront.net udp
NL 18.239.102.95:80 d38psrni17bvxu.cloudfront.net tcp
US 8.8.8.8:53 242.11.2.75.in-addr.arpa udp
US 8.8.8.8:53 51.94.239.18.in-addr.arpa udp
US 8.8.8.8:53 30.178.53.185.in-addr.arpa udp
US 8.8.8.8:53 95.102.239.18.in-addr.arpa udp
US 8.8.8.8:53 obseu.netgreencolumn.com udp
IE 3.248.162.96:443 obseu.netgreencolumn.com tcp
IE 3.248.162.96:443 obseu.netgreencolumn.com tcp
US 8.8.8.8:53 96.162.248.3.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 www.blogger.com udp
FR 216.58.214.169:445 www.blogger.com tcp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 d22073dea53e79d9b824f27ac5e9813e
SHA1 6d8a7281241248431a1571e6ddc55798b01fa961
SHA256 86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA512 97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

\??\pipe\LOCAL\crashpad_720_BDBMBRGRCAYKDQKI

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 bffcefacce25cd03f3d5c9446ddb903d
SHA1 8923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA256 23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512 761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 cdb59eed3f08932c1a40decb1ab8b10c
SHA1 ee7b167b1a4075ba03ea9ddb9a6d00f30b4abb42
SHA256 012c1ce5c4967999913d9cf5b0747b17b242e045cf9067eed4b3f396a8075ef9
SHA512 f23c9992bbbb76b215bbab0ac5b6feb7ea610f08fe1f9c35f1a9ea4d3a6c7f806bb452cdfa7fd4259bdc6acb76223b7cfb8b797761a7f4efc5641602c752b803

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 4472e25a9d479c4caa58cd6b16729cc8
SHA1 51c69df7ce7e03877a79320f3ccd885b394f4a33
SHA256 b334d46d0ddd1f5381a922d572dafa789a3164b9bd9b11145979b037174b8feb
SHA512 78a73fdf70d8037b19c6ef6ce536e123b773f6d7f097ffefc41c7b5453f9868e69f662483cb03a342c72a7848b89d574409c2cc32afb31cd6539295e7f51469e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 0dcdf49820eb7e8de7d370fb632b4131
SHA1 6eddf2abc483fc06812699a1b78efc6b3baa4847
SHA256 122657efa758a50cf72fa748688aa657efbfabf37f4382ab029a7d9c3555adce
SHA512 c71f82628214be700343f8b39c3b55c8905ac0d54c848fe9e8a39207f7a2d90e1090f1741e718c295dba3701b3f968b845d3332d995a9536778b84477c554da0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 e97950db3c2c33d82dc4d4c4f6e7d6dc
SHA1 2a7e7387a81f7ff5a38ccaa6a72b2cf4a67d73fa
SHA256 c72516ea95944331d73460aaa362da54d8f6b03a091a0ec68111489c7657399d
SHA512 6c3994d4ae623dfb3f279bb1929603f62b0d61592510c271c313300d989490a796415111d753dbf0b338b16d3f66e59e5ab33f0e37e9677cb107f44200b76af1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 6826fb4f3e6ce041f439314f90ee996a
SHA1 a8262dba6c6e26047d5986df768180b8f22cc739
SHA256 15158090c3d40ad0d373c51fe562d62d9d62834132ef798baf0db4eae6145246
SHA512 284dfc937fd7807b88ef35ffcd2ed237fc9608b6c96f8d67da1eed02e8a63e7063eb74247da208547bd1fb8342068e9158ab4c4fdfe32d2685179948adbce5a3