Analysis

  • max time kernel
    136s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2022, 02:38

General

  • Target

    海螺模版V4.0最新修复版/conch/asset/img/play.xml

  • Size

    535B

  • MD5

    22060d9826ade6c4001f2026b35a3050

  • SHA1

    5954a60ba17f9214e7a86aa9b3ac6f2c46887fe4

  • SHA256

    744a4fd4533cd4b004ebcc0305c2036124e7fbfd6d05216f2e32e833d8e57d6e

  • SHA512

    ad097f4e62dbb131d61f4df8296a37f4a683774da58da05be1e68d38dfce19f5b01b15e38cab548fe5ab2f8422ad2e36a7ad92f759e5c8496c99b4ae20cf581e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\海螺模版V4.0最新修复版\conch\asset\img\play.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\海螺模版V4.0最新修复版\conch\asset\img\play.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    15afcebf1b296be7a78fac9d3700ef3d

    SHA1

    c2210c056209dc67b283c3e5b5963e134479e4c3

    SHA256

    4cab446eedf9d32c7e41482cac22a453dabcdbb0abb924801aefcc3c364636cb

    SHA512

    ae33f97863d9de21fe642d432a0983aba3206b00e15f9430728a03127067424749d88a51ed1f59ffa6cd8428fb10701ed83b148f4f57ca0cd61553086c68c551

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    83c30a65ac54f0f15dec04f0cd53078b

    SHA1

    cd9849b9b7e248ed7470aa14f82415312aaf6602

    SHA256

    1bc037655ab212e2c22a17b572981d525cc71718adb1e916cf97cc2ba77f1f72

    SHA512

    6a03434bd139000e15d2b9bfe0451962c21a3619a24391824aafb1534623b24d84fe3007372f304019e0e43e41ecdbc9a605cf2f2016b62a26e3b648960a0490

  • memory/720-132-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB

  • memory/720-133-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB

  • memory/720-134-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB

  • memory/720-135-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB

  • memory/720-136-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB

  • memory/720-137-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB

  • memory/720-138-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB

  • memory/720-139-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB

  • memory/720-140-0x00007FFA10630000-0x00007FFA10640000-memory.dmp

    Filesize

    64KB