Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:16

General

  • Target

    r128gain-0.9.7-2/r128gain-tools/doc/index.html

  • Size

    17KB

  • MD5

    b8e22b954ed0f0c8b70ebc209ad40b17

  • SHA1

    d5c1565a22ff8fe95a67d65270d94385ab9c9113

  • SHA256

    bfa7c12b22be784420a52a3e3ae44c7c548b85815f153c0da5e65f14a92e40fa

  • SHA512

    4769fca53ffb52f7985575a603475482fb72d71fd58c50aab28a97d122df6a4daa01a2f63694b70ecb94c326893b7f999636ba33b442540dfc29d7f5527134b4

  • SSDEEP

    384:zUTQLxWfW6mBzAp49+v4lLfHfE6k0x7dtrfJf6fHOwfxAf5gf4tfJd:QTAUuIW9+2f/Yc7dt7VSHOcxs5M4x/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\r128gain-0.9.7-2\r128gain-tools\doc\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad90f74a464749806fc1370d3dd080dd

    SHA1

    bbc38d359ff3354e36acc0717d9c07cfc8fec3bf

    SHA256

    7ab3d039c06350f356c832f37a5ccc0c6a15fcb707afbc2ae8ec490e565fd0eb

    SHA512

    66a44f17fd7694792e517343142c43ad2e7491921930032468bc3a7a1aa63b08bea3620e9d7a9af9fc51a90da057372a72ad77216d82cbb47a67c32d44c8ad02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d16bd33aab2476a3c339dfa2699c107c

    SHA1

    86fd87d25fdd38372e1b8e3d45980f48d526b13c

    SHA256

    72c1da7bd81a7f382528f3d8d4d61bfd7021e7132e9946c18c715b841646d8e0

    SHA512

    9ab8c3f9b8ace9b8a3d18859130b44848147f1cf382ab1dbcbade707cbdafc63bd945acc3dc1ed8ac9d5768f567d73d85e6eb38d7f555782bfeb8f87c29ff84b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb912e422ce60edbeaade13c8e98db13

    SHA1

    a36b3bbfb75ac1a869296674cf40adeeab7af19e

    SHA256

    eadb77b1b7a0a3f88f0c314dd985ef946d8f5bd8b2b541a1027e5daa7606c411

    SHA512

    086ae21f8354a7140877d142b5f27fe7ca71e3e3ffa8bb2e0310a1effed03c8278ef3edc0afc6a1e5799a27de8088a445cc48da8a6a00bc4058597f910f21aeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ceb076798549813cab07a2e2d5aaf43

    SHA1

    61e4fa360234af8a97759195553fa0df3f41876e

    SHA256

    0c26ec1f9a8c88f0ddf9d2bd047999635c1bde82c8756672cfe0ff927344dd20

    SHA512

    aff2276166f68ad4a5d0af8bc5484b8954bac14d2c354de60d981b5a45dfb70be1ff0c22b0439cb401061abce79381ad5e97469b332ecb1b20b5de7180751ce0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0823a2a0dae10d34da6600269c64f90

    SHA1

    c8a938550c64d8764073de99e58dc2fb4ce2d600

    SHA256

    02117238fe9d0da5f74c6911516d4ce13e7c541d855898375f204cff725c8000

    SHA512

    a78e22e4438a92b3e19a709bcd3041d387fde4b1e5c983545e5b1c60626c97e07206569898ed06f1de924735b050d95e19913f0c58b1348c8234b1eaf685d0bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9941b9ae3c42a4b7937fc95d0a5191a

    SHA1

    f06ed5031701d2ca19c60f896f907f67a3e52ad9

    SHA256

    d819dbdc59fd4c5800fe5ff7d2db8f2d94e693d7d6155af4205a22b9883e115d

    SHA512

    e6e0d6612c7781b9ee9e55c4789acfa4359edde32d33d123282af9ae10fab0d849395b0beff7e6a9dee0722f1d8fa73117f7dc407180930aa612c8482a65c29d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf83fa316606fbd3f2d22209e87f1bf8

    SHA1

    a85c0c9717893bfdbec5f70c085d380c14cc56d2

    SHA256

    725bb0e344cd198a6b5809de0d4d11fcaf29ef089cc914af615413391bea5a01

    SHA512

    c31f319961fc8d0777ca019b59b5f20c08b1df9e662d967c6afab593636b121b6f1072265c11c141f1985d4a28ff636be9f7265b8b35ccdde410d0ad2a2a96df

  • C:\Users\Admin\AppData\Local\Temp\Cab261A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar262C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06