Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 04:16

General

  • Target

    download/js/parallax.min.html

  • Size

    315B

  • MD5

    a34ac19f4afae63adc5d2f7bc970c07f

  • SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

  • SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

  • SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\download\js\parallax.min.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2400

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e1ad9a109edc74d6981595af7029d57

    SHA1

    32031be3c7dff06ecc78557c03ac2bfcc3eff36d

    SHA256

    a466c9e074f8e1e05d3f826cea82fff0134e051158b1bfc086982c5325fdba0d

    SHA512

    e9fe0943582e305ad7c059d5881164afec49c0edd91852debce5c4231116fdc2a7fd77645ec1761d9c8590947f328f890eb291676dd2ba889ac63b44ac85f83c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92eea6c64ede92b42bc3b29373f97678

    SHA1

    fe58eaba677bc2027248d0f134790a7a7a5e5d6a

    SHA256

    24fbde495676544dbd059afab7876d1d73f2a3fcb87528e0777f60a8e843e949

    SHA512

    712639192e7b7062f34f82ef7818c07f2e9651c1e69c7b10d8daf15f73bf3464be4b34e90c281421795d396780e27cfb7ecd2b6f3c942ba82758ae8fbfd7d511

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    744f9b85d861869cff8556445a4ee5a1

    SHA1

    3863b5701e65a9a3063e344fe816c3fd81d6318d

    SHA256

    564754ea8fd0f8ceb0c0a901fc052bdbe2d002662466e442493e265e84635b8f

    SHA512

    b0229b8f32437091e40dc4f16e0554bcc06b3e1dcbdf5d8ed0b4edc96bc5401829ea180a260dd66213a0f24c89a61591cb1ce2a38eaceea1c624a3f5cef28d1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59a34dc7519e02a0f48cc145494354b6

    SHA1

    41932c0a77dd8e5a390e8126e9e359cab5e78a8e

    SHA256

    3fe06f819c556fffead3259d720399f32899f240e68e5e8a2a8af7d4fa2aadf4

    SHA512

    d892eb0b55a6e924c50fdb73b7f06409c481a5e2f6914acf803daa54717d7505c945d21859cb224271f37f7829c497a194abdc7443f52abcc0686bc25119adab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35b866811503013b0561328342d0c421

    SHA1

    b779ea7dc15215ec5b9f749c38616b1de8a54c9a

    SHA256

    6d706b73bd4cfb7314dbe3da1e73b8530bdf23644a77bebd35baf5c55fdd8341

    SHA512

    1b2ac4ecf076cda87b67822a2442da17e9322170a896178f8a30a64ce9d68362e091d655fc80cb45887237abdb077f71f91564f50b7e5c6ca85eaac138e3db60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b9db8c5d2b858b028f2d3a54071d437

    SHA1

    8e994625038549faf0f8eb8ba5a2e99e50675e00

    SHA256

    03e31a6bd2e1b07088fc8eb9515f84d7343406fa2c327f91d3601732ff121122

    SHA512

    711f8062c4296eb837f939a7cdd02b10ad0059592e9f54649f4f4ce4073bc9a45ca5431d7aabd1b7287f8bf8fdb0240ea144b292392601f032e7daebc507082e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    382a893810f87d99ead68aa8e398cff0

    SHA1

    f6c9bd2f41dd45080c74c14229ff2ad1271710d7

    SHA256

    a34399a3eb366a94233206615f9887c69351ed749428f665e9e1243d6c8f3714

    SHA512

    28412521376977228a50b56532ef24a0f044144ffe2a7de78d5d5dbeb5249492c71ad9bf957e383ec49434d7fef1a373f430c18d4b6b237e74eedf8f28215586

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51ad3030fe92b553f344257190a04489

    SHA1

    6ef58d239b8180405fe00879a15b2af984303b08

    SHA256

    01917ba0a1f30b0b37908e2a63df5055bd72dd976c826d67f7d42cc2ed9495f7

    SHA512

    789810c6c307ff1b6d6be85e3df4f51ed7af543201bb104d6bcd06aac54fdcd77eb370104cb0ac0c1a25a7340786879839a52f4928454ed8e3fae308054fd3c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c8a806e2ba072c05c906e655b0b4a46

    SHA1

    08c599195a92e32848deadee2787950da023e443

    SHA256

    2b6d3a13876e729ee3774a099ab17f177f653007b2c8e58fa81f709ff60900c1

    SHA512

    b26df6d4a815b030752e2c718604ded4273dfbed9631bcddf8e6c31a4c135bd7abba45351981921d4cd5b10e16a07191e27698efa238387849de1a38ec2d3ec2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aaf8b53e73b766f3c64ec91aa21a0e3c

    SHA1

    0efa314a909bbfacd919b0a200495a8661188437

    SHA256

    985cde5b4c56651fc1d558f4764ee5dd4003bde2bdc2e3bf9dea7db7000a39b4

    SHA512

    9c8f6b65737f31b2ed159ec3ebece8c612926b1c15161907fdd1ae26ce2a7e6b9b5f3b0424397bb74d867df31f76783d305f853344a4c1741924c04eff3f83ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe85cf4793ae0c73209dcce9753f85f3

    SHA1

    c211e6e092c095bd2c9818670c225aa6a6c07e15

    SHA256

    6bc99156ff99c9a21abadcf9df16ce2226edbed524ea36d3a3feb137b517dc82

    SHA512

    956c984d76be82fae18bbeae0b730f3d723ec966118738fa2d074e72c4062a695cbf238ea953c7ed21d22986fb7ad81a1791cf685297e3103309923070701793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1de43409deeb151447c44a98bb55a36

    SHA1

    16a91ee8fcd19a864cf9ab8ad0e78c863d429419

    SHA256

    ea221f80c536465338ffa1d07ed939d573f21b7d580bb2a06c4c219c943a7d51

    SHA512

    5d1c12dcfca30012352a4ada91d9acbc1da2b3959fc4c327b33def6a46173734339e158c8b219edf363a870bcd9cc7494ea6be160bab52cc9aaaf6cf470dd662

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S593MPCP\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab5083.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar5114.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\44Y4DWQ6.txt

    Filesize

    603B

    MD5

    95883a2b398c5b21e208e74ebcadec9b

    SHA1

    47e63ef5ad74f372ba865782267132008c95c3df

    SHA256

    f867a86bd810d41c68191b11e492dd9777444f30147823984082b69bd68bbe96

    SHA512

    06d84a6b2b6c6e16c7228d23c305b8d0c240f910073d1dc23c250d5925ad7ea8ea113198c902e0596b633548eaa8d61fbae0696f7ecfc9bdf3e134402c40ba73