Analysis

  • max time kernel
    143s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2023 04:16

General

  • Target

    download/js/jquery.min.html

  • Size

    315B

  • MD5

    a34ac19f4afae63adc5d2f7bc970c07f

  • SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

  • SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

  • SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\download\js\jquery.min.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77bbb0421a4db18b326796f2bcb417ef

    SHA1

    96c8400b752abfff5b8470bf13cf8adaed10e7b6

    SHA256

    f4b44fe897996230abe1975d6a935128b036408f0f13871a134ab60f5a5058f6

    SHA512

    6793e46c3a4ce000515372d6e3fc4926ccaf8c2aa6ff1f5c504bea863d787a4a6aad0753941819e067a85b1b96523f0a77205d86474ae7fb4760f7705e3e4ff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d8f1f9bad35f5caa131b93668b16575

    SHA1

    0ee09e554f61cf6c4a87cfda5124f8f0a2b4b6c1

    SHA256

    dc56f06f43e0ca351caa318dc60c8dea993aecf57e7f3ee58fdccebe52594b3d

    SHA512

    31193f26b44ce84e6c13dfaa3e99a6800b5426d760574ff01bad1aa418e801a02c24dcd02c67f9dd85f1f38a2e4615191c1fed6b4be3f541fd1b78800102fd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    faa48a7889bf0c1af0c95574de177801

    SHA1

    ffbf9a2a49e309ca2cde31658c1ff85b66b44851

    SHA256

    f2e4bdf22c141a3b27a6c2f2882ed5132eb6a7d6aaef9ffc7a33196f529ae1ee

    SHA512

    dc0b6fe851f654544814d82492c62dd40f93c0ab4f7ace3fc28d8d1956450cb8788a244e0d2795bbf6352e3d522cb929542fdf4629197da295671eb5f8021023

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    698419dcd29d87fa621aa844af0b5977

    SHA1

    f6b5bc9e1c9308b0bd9edcbbb75f54e27efb6fb9

    SHA256

    8a74984ed87845d280a4d364c6b4e85ba330ecd5c8fc3eb3289ba00d460614d9

    SHA512

    ce31cf4fb288bb00fa64cc9dc4c57fac17e920baf3a0f876cb8228fc9400832aeab0fc93e65eb1e15e28990e8e6afd167d88178a51fa7c4dc6547a271b68198d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1eb25f1e947306e4189f7eb7610974eb

    SHA1

    80e0bba45d422c379df379b85071cfe906afc7f5

    SHA256

    6545a3a902dfffcadd35b1fe12b31a770e62c1381c6351e0eefb48b5fef252fa

    SHA512

    10df3700ba5e48c190fd5aad8b4a62047a8a2a65b9a917405e01d7f9711c7172c7259c547d865b88cda5163e8f73ed649c8d019110d1cee9cf81d54cb7f67676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93410e7f7fc8bd478c77de39c54e0de2

    SHA1

    d4f98014c11783f29602d365e39dbc78af9028e5

    SHA256

    b9c19f0ba3891229f77cf12b66fffff89d180ae33682489eed5f4f542387235c

    SHA512

    e630b618bd8f17afeb317e42b3de991b806c13bd8497ed4429832e84eb66c7bc384d1b8c57215f106a4b8ac0962176c6fa19e2f6741fd22023951b4ef7e19640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2aa4901f08cf068c48e5028ade45c7d1

    SHA1

    c77409337f7696d8e871f06d7240744859a0f252

    SHA256

    a11145757ba3d88d3ed3927839f48d459ae5dd9364375ae8f8661896f140ffe1

    SHA512

    658cf6602b52f72bcf5435e69d57048ed161ff93a4be9745aa3c82b9ff9939871a6d85d53ff14a8195f9b9e26c3a280705bd2b51ea935ac83a0c3ff05fb705ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c89c9f269ed5dc6b00596f7ee8f08988

    SHA1

    404bf72755faadfb8fec62e382c29b33c75f3895

    SHA256

    d736a4b8b8255bc9e073a3ab692b0ff6097c446923589465b32efb701e2f54db

    SHA512

    93108e07078594cbb5cceaaace6f30c08797edbfae4fb600f3a674e8c6bb7f2e7c57a23ed98e3bffd984fe139d17de48b24d4d6a30d8cc89aa27fcf7fac1af8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a52d69c58169350a731987867610a1f9

    SHA1

    8df93d7efccb8f9f36f360a08d674779d4be61de

    SHA256

    36aa1414e9a0dc49bbee3e5d03e8ade62e0ae27a278fd70c84472a9c7330bf81

    SHA512

    f4894c7c71f4927180fea045dae0990ff6c8a135f11fd81e36bd2fedeb1ee0744cf3451f36b6c4be6ebf1c7ed000b0abdf98ab7162ab9dc1b0530db4fd2b1e55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00556773d7c76b392409da47d4291455

    SHA1

    ee8771c8b760b4941890d37ac1f1404cbaad0112

    SHA256

    5aebde80880029586a2b3389aeadd3eef616c2f23d88bc2645dfed6bfb9ca457

    SHA512

    01a0ea7c26c291b1fb41194e549f1b61a811deff87290f05ec59ad783c736a4c37194c9ffc8ce2fd2e583e63a44fae6b2c461000ed6271e0997dd4eb6012525a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IXTVO3I9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab4656.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar46D7.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PY0INV9G.txt

    Filesize

    601B

    MD5

    3ed10b054a512f2e53762a246697b4a7

    SHA1

    e73641b25a250341af79d54dece6a84da024cd8f

    SHA256

    5f35546dfa1492af3f8b72083a574a9bb63140279891348f8d1442db1edb20a4

    SHA512

    68d8893b199733aea72b39e885728845f94c5d4ccc6d9f909bc04a18a80b8bb120f5139c7e4f9dea35821617a2dbb2a345afd19cd04f7284daf167678d067844