Loading ...

Play interactive tourEdit tour

Analysis Report http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047

Overview

General Information

Sample URL:http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047
Analysis ID:392889
Infos:

Most interesting Screenshot:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Found WSH timer for Javascript or VBS script (likely evasive script)
Potential browser exploit detected (process start blacklist hit)

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 6892 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6956 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6892 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • wscript.exe (PID: 4592 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\codepoint.js' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: unknownHTTPS traffic detected: 172.67.132.46:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.67.132.46:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: Binary string: wscript.pdbGCTL source: wscript.exe, 0000000D.00000002.904846709.00000209375B0000.00000002.00000001.sdmp
Source: Binary string: wscript.pdb source: wscript.exe, 0000000D.00000002.904846709.00000209375B0000.00000002.00000001.sdmp
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Windows\System32\wscript.exe
Source: unknownDNS traffic detected: queries for: codepoints.net
Source: wscript.exe, 0000000D.00000003.729131342.00000209392D1000.00000004.00000001.sdmpString found in binary or memory: https://use.typekit.net
Source: wscript.exe, 0000000D.00000003.729206190.000002093930D000.00000004.00000001.sdmpString found in binary or memory: https://use.typekit.net:G
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownHTTPS traffic detected: 172.67.132.46:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.67.132.46:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: classification engineClassification label: clean1.win@5/9@1/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BACD341B-A159-11EB-90EB-ECF4BBEA1588}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFF181345E7CC054BD.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6892 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\codepoint.js'
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6892 CREDAT:17410 /prefetch:2Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\codepoint.js' Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: Binary string: wscript.pdbGCTL source: wscript.exe, 0000000D.00000002.904846709.00000209375B0000.00000002.00000001.sdmp
Source: Binary string: wscript.pdb source: wscript.exe, 0000000D.00000002.904846709.00000209375B0000.00000002.00000001.sdmp
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: wscript.exe, 0000000D.00000002.904918744.0000020937A80000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: wscript.exe, 0000000D.00000002.904918744.0000020937A80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: wscript.exe, 0000000D.00000002.904918744.0000020937A80000.00000002.00000001.sdmpBinary or memory string: Progman
Source: wscript.exe, 0000000D.00000002.904918744.0000020937A80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting1Path InterceptionProcess Injection2Masquerading1OS Credential DumpingProcess Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection2LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 392889 URL: http://codepoints.net/stati... Startdate: 19/04/2021 Architecture: WINDOWS Score: 1 5 iexplore.exe 4 57 2->5         started        process3 7 iexplore.exe 28 5->7         started        10 wscript.exe 5->10         started        dnsIp4 12 codepoints.net 172.67.132.46, 443, 49741, 49742 CLOUDFLARENETUS United States 7->12

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=16183650500470%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
https://use.typekit.net:G0%Avira URL Cloudsafe
01%VirustotalBrowse

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
codepoints.net
172.67.132.46
truefalse
    high

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    0falselow

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://use.typekit.netwscript.exe, 0000000D.00000003.729131342.00000209392D1000.00000004.00000001.sdmpfalse
      high
      https://use.typekit.net:Gwscript.exe, 0000000D.00000003.729206190.000002093930D000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      low

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      172.67.132.46
      codepoints.netUnited States
      13335CLOUDFLARENETUSfalse

      General Information

      Joe Sandbox Version:31.0.0 Emerald
      Analysis ID:392889
      Start date:19.04.2021
      Start time:23:53:08
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 4m 38s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:19
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:CLEAN
      Classification:clean1.win@5/9@1/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
      • Excluded IPs from analysis (whitelisted): 52.255.188.83, 168.61.161.212, 40.88.32.150, 88.221.62.148, 20.82.209.104, 92.122.213.194, 92.122.213.247, 152.199.19.161, 52.155.217.156, 20.54.26.129, 2.20.142.210, 2.20.142.209, 20.49.157.6
      • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, go.microsoft.com, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, ie9comview.vo.msecnd.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
      • Report size getting too big, too many NtProtectVirtualMemory calls found.

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BACD341B-A159-11EB-90EB-ECF4BBEA1588}.dat
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:Microsoft Word Document
      Category:dropped
      Size (bytes):32344
      Entropy (8bit):1.7941498862400327
      Encrypted:false
      SSDEEP:192:r+ZFZl2SpWSptSgHifSg0UAazMSL0MSBSZ0eMCkUZASt00Q2p2:rKr8zUNgN0VO0jk03k00m
      MD5:63C210596BA8430CE15F8FB3B6D249D1
      SHA1:5D50CCB96AF48C9F6293B3992B00F81A1017B046
      SHA-256:11BD99350A5AF2948531B54D8A6EB5731614F6E32CD2DE35FA33588CCA1F0675
      SHA-512:4E93A90B23F5DC6CD4B33662B886C6ACC381FC3F658A31C59468B25FE7F2B3E0EC03427F36CAADF9F96ADEFF648DC148AB6D05390E7404AB51C0BF9052073B4C
      Malicious:false
      Reputation:low
      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BACD341D-A159-11EB-90EB-ECF4BBEA1588}.dat
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:Microsoft Word Document
      Category:dropped
      Size (bytes):19032
      Entropy (8bit):1.5981621410564495
      Encrypted:false
      SSDEEP:48:IwKGcprXGwpawG4pQgGrapbSR9GQpB2GHHpceTGUpQBWGcpm:ruZBQw6+BSpj12u6Eg
      MD5:1C2972613848EC9E93E2E068F4FAC735
      SHA1:A03BD40A142E7E7D95FF7D3B5715E22597DDFECD
      SHA-256:7394474F9BB1DEC697CF0303BDAAB1E9A01208DCC63B01D210671F687E52303E
      SHA-512:A1324B49C150527682587BE193E2BB939BFC71E4D2919E807F2685535CF05D9D88BBE16995C7649F4F978042C0EB827A2E9623C18A22B2C3735715B29EF2D986
      Malicious:false
      Reputation:low
      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\codepoint.js.m2r13t2.partial
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:UTF-8 Unicode text, with very long lines, with no line terminators
      Category:dropped
      Size (bytes):31433
      Entropy (8bit):5.334704231959762
      Encrypted:false
      SSDEEP:768:hkhSZhy+WU3ex7lVB3vCg+nMo9mNaOHf8cKXJXac:hAw3ClGoVKXJXD
      MD5:3C67217E710120291B75E8C13546E320
      SHA1:AA9D4DC6BCB030B4B3669D98D1F2474D60544A5C
      SHA-256:BC3DAD26E9361E22809C5DA883066BFC4C724FDFBD552BB6E048F7DF5353FA38
      SHA-512:8F2EA8352350BBEE3E7E43F258D0607778BB27695F9E664F06E3689B1B6C1696FEC7C34122F882F8EBC726F0D4D47035C1E10A2EF52CDC6E5B497F9096AD0459
      Malicious:false
      Reputation:low
      Preview: !function(a){function b(a,b,e){return 4===arguments.length?c.apply(this,arguments):void d(a,{declarative:!0,deps:b,declare:e})}function c(a,b,c,e){d(a,{declarative:!1,deps:b,executingRequire:c,execute:e})}function d(a,b){b.name=a,a in n||(n[a]=b),b.normalizedDeps=b.deps}function e(a,b){if(b[a.groupIndex]=b[a.groupIndex]||[],-1==o.call(b[a.groupIndex],a)){b[a.groupIndex].push(a);for(var c=0,d=a.normalizedDeps.length;d>c;c++){var f=a.normalizedDeps[c],g=n[f];if(g&&!g.evaluated){var h=a.groupIndex+(g.declarative!=a.declarative);if(void 0===g.groupIndex||g.groupIndex<h){if(void 0!==g.groupIndex&&(b[g.groupIndex].splice(o.call(b[g.groupIndex],g),1),0==b[g.groupIndex].length))throw new TypeError("Mixed dependency cycle detected");g.groupIndex=h}e(g,b)}}}}function f(a){var b=n[a];b.groupIndex=0;var c=[];e(b,c);for(var d=!!b.declarative==c.length%2,f=c.length-1;f>=0;f--){for(var g=c[f],i=0;i<g.length;i++){var k=g[i];d?h(k):j(k)}d=!d}}function g(a){return s[a]||(s[a]={name:a,dependencies:[],exp
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\codepoint.js.m2r13t2.partial:Zone.Identifier
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):26
      Entropy (8bit):3.95006375643621
      Encrypted:false
      SSDEEP:3:gAWY3n:qY3n
      MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
      SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
      SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
      SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
      Malicious:false
      Reputation:low
      Preview: [ZoneTransfer]..ZoneId=3..
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\codepoint.js:Zone.Identifier
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:very short file (no magic)
      Category:modified
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:W:W
      MD5:ECCBC87E4B5CE2FE28308FD9F2A7BAF3
      SHA1:77DE68DAECD823BABBB58EDB1C8E14D7106E83BB
      SHA-256:4E07408562BEDB8B60CE05C1DECFE3AD16B72230967DE01F640B7E4729B49FCE
      SHA-512:3BAFBF08882A2D10133093A1B8433F50563B93C14ACD05B79028EB1D12799027241450980651994501423A66C276AE26C43B739BC65C4E16B10C3AF6C202AEBB
      Malicious:false
      Reputation:low
      Preview: 3
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\codepoint[1].js
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:UTF-8 Unicode text, with very long lines, with no line terminators
      Category:dropped
      Size (bytes):31433
      Entropy (8bit):5.334704231959762
      Encrypted:false
      SSDEEP:768:hkhSZhy+WU3ex7lVB3vCg+nMo9mNaOHf8cKXJXac:hAw3ClGoVKXJXD
      MD5:3C67217E710120291B75E8C13546E320
      SHA1:AA9D4DC6BCB030B4B3669D98D1F2474D60544A5C
      SHA-256:BC3DAD26E9361E22809C5DA883066BFC4C724FDFBD552BB6E048F7DF5353FA38
      SHA-512:8F2EA8352350BBEE3E7E43F258D0607778BB27695F9E664F06E3689B1B6C1696FEC7C34122F882F8EBC726F0D4D47035C1E10A2EF52CDC6E5B497F9096AD0459
      Malicious:false
      Reputation:low
      Preview: !function(a){function b(a,b,e){return 4===arguments.length?c.apply(this,arguments):void d(a,{declarative:!0,deps:b,declare:e})}function c(a,b,c,e){d(a,{declarative:!1,deps:b,executingRequire:c,execute:e})}function d(a,b){b.name=a,a in n||(n[a]=b),b.normalizedDeps=b.deps}function e(a,b){if(b[a.groupIndex]=b[a.groupIndex]||[],-1==o.call(b[a.groupIndex],a)){b[a.groupIndex].push(a);for(var c=0,d=a.normalizedDeps.length;d>c;c++){var f=a.normalizedDeps[c],g=n[f];if(g&&!g.evaluated){var h=a.groupIndex+(g.declarative!=a.declarative);if(void 0===g.groupIndex||g.groupIndex<h){if(void 0!==g.groupIndex&&(b[g.groupIndex].splice(o.call(b[g.groupIndex],g),1),0==b[g.groupIndex].length))throw new TypeError("Mixed dependency cycle detected");g.groupIndex=h}e(g,b)}}}}function f(a){var b=n[a];b.groupIndex=0;var c=[];e(b,c);for(var d=!!b.declarative==c.length%2,f=c.length-1;f>=0;f--){for(var g=c[f],i=0;i<g.length;i++){var k=g[i];d?h(k):j(k)}d=!d}}function g(a){return s[a]||(s[a]={name:a,dependencies:[],exp
      C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):89
      Entropy (8bit):4.502442319249751
      Encrypted:false
      SSDEEP:3:oVXU1fzW8JOGXnE1fVCn:o9Up6qEpVC
      MD5:EAB023F74C7A0D3B35935F1D7C242560
      SHA1:2034F413A40B4A08AAB3DD2232C9E75CB082EC72
      SHA-256:DA7B11CFA7DCC7523DA89A6020DB5EA07912CE8FB8A16ADE8E61CC150D6E1CA5
      SHA-512:C33D88140A2476D9349099BF6EF7FFB40130AB956B70913F1456CFF8BBC34E3582DF9130238703AB0180B18E744DDCC439C03829EF59DF04AC8544E41C5580BA
      Malicious:false
      Reputation:low
      Preview: [2021/04/19 23:53:54.263] Latest deploy version: ..[2021/04/19 23:53:54.263] 11.211.2 ..
      C:\Users\user\AppData\Local\Temp\~DFF10E4E5C2FE6A606.TMP
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:data
      Category:dropped
      Size (bytes):29989
      Entropy (8bit):0.3305105966046147
      Encrypted:false
      SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw39lw39l2h/9l2Z9law:kBqoxKAuvScS+gmh+QBy
      MD5:87D717A7239FBFCFA6CE0CA547C583F0
      SHA1:D1F8622B5CBA4F9D8CE762090A64825CB05EDBB3
      SHA-256:958EDB88873835EDEA1CDD82D0128ADA5BEC43242C062E4DB2967499455E639D
      SHA-512:1B17FD22E5ECCCEC39926AD279C3E7F279E3A0B37DFF5AD2F531D9577C0FC15A2F97B4B28C01FA193AA34CD1E86B08C2D9FAECEA1CF23ACFA86D1CB5DC0B3D68
      Malicious:false
      Reputation:low
      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Temp\~DFF181345E7CC054BD.TMP
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:data
      Category:dropped
      Size (bytes):12981
      Entropy (8bit):0.44336979889492417
      Encrypted:false
      SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fRIF9l8fRw9lTqSYfUn9QES:c9lLh9lLh9lIn9lIn9log9low9lWSsU6
      MD5:42CBB93022266593F3358865644E168C
      SHA1:995496AF94565B4FE101551FBE96E86159406F7F
      SHA-256:1C4C5610D495EAB04D485C792486E339F6A8A83FF9CC7738D35AC3F9C2698F52
      SHA-512:E50FD016C2C724AAF32AE28A6C74375F48A41C4D8A3BD3769939CC97A559F196C97C49DD753DAA263FCF71D30F8EC3EA3B2AFD27FF5D768C04D965157D98FD68
      Malicious:false
      Reputation:low
      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

      Static File Info

      No static file info

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Apr 19, 2021 23:53:54.975366116 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:54.975625038 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.028001070 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.028196096 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.028794050 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.028918982 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.039735079 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.039845943 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.092560053 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.092945099 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.096431971 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.096483946 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.096546888 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.096590996 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.099276066 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.099323988 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.099378109 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.099450111 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.141254902 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.141336918 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.148056030 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.148190975 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.148210049 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.193818092 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.194015980 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.194118023 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.194148064 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.194226027 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.194334984 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.194813967 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.194849014 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.194906950 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.194957018 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.195952892 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.196392059 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.200213909 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.200261116 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.200916052 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.200943947 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.200968981 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.201105118 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.201205969 CEST49741443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.288170099 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.288214922 CEST44349741172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.315992117 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.316023111 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.316046000 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.316061020 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.316086054 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.316102028 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.316142082 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.316327095 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.316525936 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.316553116 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.316581964 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.316625118 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.317790031 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.317821980 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.317877054 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.317898035 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.318979025 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.319009066 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.319062948 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.319086075 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.320161104 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.320187092 CEST44349742172.67.132.46192.168.2.4
      Apr 19, 2021 23:53:55.320357084 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:53:55.320379019 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:54:10.300618887 CEST49742443192.168.2.4172.67.132.46
      Apr 19, 2021 23:54:10.300745010 CEST49741443192.168.2.4172.67.132.46

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      Apr 19, 2021 23:53:46.515996933 CEST5585453192.168.2.48.8.8.8
      Apr 19, 2021 23:53:46.567748070 CEST53558548.8.8.8192.168.2.4
      Apr 19, 2021 23:53:47.310153961 CEST6454953192.168.2.48.8.8.8
      Apr 19, 2021 23:53:47.367610931 CEST53645498.8.8.8192.168.2.4
      Apr 19, 2021 23:53:48.240883112 CEST6315353192.168.2.48.8.8.8
      Apr 19, 2021 23:53:48.300683975 CEST53631538.8.8.8192.168.2.4
      Apr 19, 2021 23:53:49.060908079 CEST5299153192.168.2.48.8.8.8
      Apr 19, 2021 23:53:49.121968031 CEST53529918.8.8.8192.168.2.4
      Apr 19, 2021 23:53:49.955579042 CEST5370053192.168.2.48.8.8.8
      Apr 19, 2021 23:53:50.004164934 CEST53537008.8.8.8192.168.2.4
      Apr 19, 2021 23:53:51.012029886 CEST5172653192.168.2.48.8.8.8
      Apr 19, 2021 23:53:51.063780069 CEST53517268.8.8.8192.168.2.4
      Apr 19, 2021 23:53:51.937895060 CEST5679453192.168.2.48.8.8.8
      Apr 19, 2021 23:53:51.986617088 CEST53567948.8.8.8192.168.2.4
      Apr 19, 2021 23:53:53.318337917 CEST5653453192.168.2.48.8.8.8
      Apr 19, 2021 23:53:53.375696898 CEST53565348.8.8.8192.168.2.4
      Apr 19, 2021 23:53:53.667521954 CEST5662753192.168.2.48.8.8.8
      Apr 19, 2021 23:53:53.731132984 CEST53566278.8.8.8192.168.2.4
      Apr 19, 2021 23:53:54.497611046 CEST5662153192.168.2.48.8.8.8
      Apr 19, 2021 23:53:54.546381950 CEST53566218.8.8.8192.168.2.4
      Apr 19, 2021 23:53:54.884290934 CEST6311653192.168.2.48.8.8.8
      Apr 19, 2021 23:53:54.961283922 CEST53631168.8.8.8192.168.2.4
      Apr 19, 2021 23:53:55.336338043 CEST6407853192.168.2.48.8.8.8
      Apr 19, 2021 23:53:55.385243893 CEST53640788.8.8.8192.168.2.4
      Apr 19, 2021 23:53:56.268110037 CEST6480153192.168.2.48.8.8.8
      Apr 19, 2021 23:53:56.325206041 CEST53648018.8.8.8192.168.2.4
      Apr 19, 2021 23:53:57.103991032 CEST6172153192.168.2.48.8.8.8
      Apr 19, 2021 23:53:57.162662029 CEST53617218.8.8.8192.168.2.4
      Apr 19, 2021 23:53:57.993885994 CEST5125553192.168.2.48.8.8.8
      Apr 19, 2021 23:53:58.049508095 CEST53512558.8.8.8192.168.2.4
      Apr 19, 2021 23:53:58.806931973 CEST6152253192.168.2.48.8.8.8
      Apr 19, 2021 23:53:58.858587980 CEST53615228.8.8.8192.168.2.4
      Apr 19, 2021 23:53:59.930802107 CEST5233753192.168.2.48.8.8.8
      Apr 19, 2021 23:53:59.979367018 CEST53523378.8.8.8192.168.2.4
      Apr 19, 2021 23:54:00.723134041 CEST5504653192.168.2.48.8.8.8
      Apr 19, 2021 23:54:00.771675110 CEST53550468.8.8.8192.168.2.4
      Apr 19, 2021 23:54:01.595043898 CEST4961253192.168.2.48.8.8.8
      Apr 19, 2021 23:54:01.645509958 CEST53496128.8.8.8192.168.2.4
      Apr 19, 2021 23:54:02.619385958 CEST4928553192.168.2.48.8.8.8
      Apr 19, 2021 23:54:02.679955959 CEST53492858.8.8.8192.168.2.4
      Apr 19, 2021 23:54:15.911190987 CEST5060153192.168.2.48.8.8.8
      Apr 19, 2021 23:54:15.984669924 CEST53506018.8.8.8192.168.2.4
      Apr 19, 2021 23:54:20.449359894 CEST6087553192.168.2.48.8.8.8
      Apr 19, 2021 23:54:20.511166096 CEST53608758.8.8.8192.168.2.4
      Apr 19, 2021 23:54:23.664849043 CEST5644853192.168.2.48.8.8.8
      Apr 19, 2021 23:54:23.713591099 CEST53564488.8.8.8192.168.2.4
      Apr 19, 2021 23:54:24.674622059 CEST5644853192.168.2.48.8.8.8
      Apr 19, 2021 23:54:24.732996941 CEST53564488.8.8.8192.168.2.4
      Apr 19, 2021 23:54:25.688848972 CEST5644853192.168.2.48.8.8.8
      Apr 19, 2021 23:54:25.746259928 CEST53564488.8.8.8192.168.2.4
      Apr 19, 2021 23:54:27.704555035 CEST5644853192.168.2.48.8.8.8
      Apr 19, 2021 23:54:27.753149033 CEST53564488.8.8.8192.168.2.4
      Apr 19, 2021 23:54:31.720577002 CEST5644853192.168.2.48.8.8.8
      Apr 19, 2021 23:54:31.777987957 CEST53564488.8.8.8192.168.2.4
      Apr 19, 2021 23:54:32.448478937 CEST5917253192.168.2.48.8.8.8
      Apr 19, 2021 23:54:32.563456059 CEST53591728.8.8.8192.168.2.4
      Apr 19, 2021 23:54:33.100658894 CEST6242053192.168.2.48.8.8.8
      Apr 19, 2021 23:54:33.233350992 CEST53624208.8.8.8192.168.2.4
      Apr 19, 2021 23:54:33.261826038 CEST6057953192.168.2.48.8.8.8
      Apr 19, 2021 23:54:33.320349932 CEST53605798.8.8.8192.168.2.4
      Apr 19, 2021 23:54:33.804673910 CEST5018353192.168.2.48.8.8.8
      Apr 19, 2021 23:54:33.883384943 CEST53501838.8.8.8192.168.2.4
      Apr 19, 2021 23:54:34.307898998 CEST6153153192.168.2.48.8.8.8
      Apr 19, 2021 23:54:34.386250019 CEST53615318.8.8.8192.168.2.4
      Apr 19, 2021 23:54:34.932460070 CEST4922853192.168.2.48.8.8.8
      Apr 19, 2021 23:54:34.989706993 CEST53492288.8.8.8192.168.2.4
      Apr 19, 2021 23:54:35.714381933 CEST5979453192.168.2.48.8.8.8
      Apr 19, 2021 23:54:35.771601915 CEST53597948.8.8.8192.168.2.4
      Apr 19, 2021 23:54:36.296214104 CEST5591653192.168.2.48.8.8.8
      Apr 19, 2021 23:54:36.355124950 CEST53559168.8.8.8192.168.2.4
      Apr 19, 2021 23:54:37.148894072 CEST5275253192.168.2.48.8.8.8
      Apr 19, 2021 23:54:37.197535038 CEST53527528.8.8.8192.168.2.4
      Apr 19, 2021 23:54:37.968961954 CEST6054253192.168.2.48.8.8.8
      Apr 19, 2021 23:54:38.029148102 CEST53605428.8.8.8192.168.2.4
      Apr 19, 2021 23:54:38.484452009 CEST6068953192.168.2.48.8.8.8
      Apr 19, 2021 23:54:38.544632912 CEST53606898.8.8.8192.168.2.4
      Apr 19, 2021 23:54:40.879432917 CEST6420653192.168.2.48.8.8.8
      Apr 19, 2021 23:54:40.944780111 CEST53642068.8.8.8192.168.2.4
      Apr 19, 2021 23:54:52.588983059 CEST5090453192.168.2.48.8.8.8
      Apr 19, 2021 23:54:52.648052931 CEST53509048.8.8.8192.168.2.4
      Apr 19, 2021 23:54:52.668716908 CEST5752553192.168.2.48.8.8.8
      Apr 19, 2021 23:54:52.728681087 CEST53575258.8.8.8192.168.2.4
      Apr 19, 2021 23:54:55.850220919 CEST5381453192.168.2.48.8.8.8
      Apr 19, 2021 23:54:55.919131041 CEST53538148.8.8.8192.168.2.4
      Apr 19, 2021 23:55:27.933608055 CEST5341853192.168.2.48.8.8.8
      Apr 19, 2021 23:55:27.991823912 CEST53534188.8.8.8192.168.2.4
      Apr 19, 2021 23:55:29.759084940 CEST6283353192.168.2.48.8.8.8
      Apr 19, 2021 23:55:29.831799984 CEST53628338.8.8.8192.168.2.4

      DNS Queries

      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Apr 19, 2021 23:53:54.884290934 CEST192.168.2.48.8.8.80xe404Standard query (0)codepoints.netA (IP address)IN (0x0001)

      DNS Answers

      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Apr 19, 2021 23:53:54.961283922 CEST8.8.8.8192.168.2.40xe404No error (0)codepoints.net172.67.132.46A (IP address)IN (0x0001)
      Apr 19, 2021 23:53:54.961283922 CEST8.8.8.8192.168.2.40xe404No error (0)codepoints.net104.21.12.155A (IP address)IN (0x0001)

      HTTPS Packets

      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
      Apr 19, 2021 23:53:55.096483946 CEST172.67.132.46443192.168.2.449741CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEFri Jul 24 02:00:00 CEST 2020 Mon Jan 27 13:48:08 CET 2020Sat Jul 24 14:00:00 CEST 2021 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
      CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
      Apr 19, 2021 23:53:55.099323988 CEST172.67.132.46443192.168.2.449742CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEFri Jul 24 02:00:00 CEST 2020 Mon Jan 27 13:48:08 CET 2020Sat Jul 24 14:00:00 CEST 2021 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
      CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

      Code Manipulations

      Statistics

      CPU Usage

      Click to jump to process

      Memory Usage

      Click to jump to process

      High Level Behavior Distribution

      Click to dive into process behavior distribution

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:23:53:52
      Start date:19/04/2021
      Path:C:\Program Files\internet explorer\iexplore.exe
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Imagebase:0x7ff684880000
      File size:823560 bytes
      MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      General

      Start time:23:53:53
      Start date:19/04/2021
      Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      Wow64 process (32bit):true
      Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6892 CREDAT:17410 /prefetch:2
      Imagebase:0x1120000
      File size:822536 bytes
      MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      General

      Start time:23:54:34
      Start date:19/04/2021
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\codepoint.js'
      Imagebase:0x7ff7a5d90000
      File size:163840 bytes
      MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >