Analysis

  • max time kernel
    146s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 04:30

General

  • Target

    下载说明.htm

  • Size

    3KB

  • MD5

    9bd1ac9ead8eda95e8284f12ddba89e2

  • SHA1

    44ad2b426711da0bc122d500b9117808385bd406

  • SHA256

    54198ae94a082537ca82686954de11084ebb050917b65871fe1639c2c1a308b8

  • SHA512

    e94611639a7396705f684055fa762db261bbaffb2d7b459b1fddbd44d25358b3bb3111ae84a8bc444388f26908193fbfa79c232570f52a38f1c49fb57b322850

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\下载说明.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1480 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1300

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    618abd61ad09b43cc6620fb57de524e6

    SHA1

    4620cb4ba295be7c6b42bc8261f3d6000f4094ce

    SHA256

    591e4ab86d394fe9241e02996bc3b16b0efd492b8cafd653823cc46247352ba5

    SHA512

    2b86979b0834e3583634fcc0797b95cca96ccd570fb31ca9ba0c181ff9dcda3a90eb783e8c4b615e71cef39d2953e71355df01648d6992c5e796c9f5fca16ad6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1b4wh1e\imagestore.dat
    Filesize

    9KB

    MD5

    df7e0f589e8e5d5ffcc62426c83ca373

    SHA1

    02fbd53933ee7fabf45b882bffb036c9fa6d9082

    SHA256

    28e01815bfc7ffc74675eb565666fdc555b05b0a67056b608371678ecca9520f

    SHA512

    21f4e2a7cae6f5d7924bb7bde5bef972a63f20493f139d74e12a905d11048f1419f03691e30a27c4e3ea7368079f0ac60e199fcdc73bffe5b2ab03470a88f783

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VWXDKWT8.txt
    Filesize

    603B

    MD5

    f04d3b3935cd53b22ebc3e9b9568a4ef

    SHA1

    6b47f2174089d94750bfa29cb8e0342f9259e811

    SHA256

    7b705dd0bf3e79e34ed1a0a665986ba2c74c303fff3f7b2ac6484b82a4157776

    SHA512

    11d3412ca3a9d1ddbb15d3175e24d6b1172804ddb06bcd31ffdf71f7fcc2bbe5c4bd4b02511c2919bf48d7c380d0964e6b8ee9b7bf124a06e4351260ce7be854