Analysis

  • max time kernel
    181s
  • max time network
    203s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2022, 15:21

General

  • Target

    20220925 - 检查2_2/美军网络安全 开篇 JIE 概述_百度搜索.html

  • Size

    808KB

  • MD5

    258a14654092cda3afdf55f4a204fd2b

  • SHA1

    d8759eac807e2e71e61f1b9a9a34e1dd8123504f

  • SHA256

    ac6175574c6bc5b5415ebd1f5c707130a522ae04e28434350b22921809e35da7

  • SHA512

    8981960533f03a0217edd4210e9f8fb407810248d1c1f3aa59dd1868c3c84033bcabe38e1855cbf3bf8742cc2a50d2b4f9cb2cef9f645917c53e55e251e0fa7e

  • SSDEEP

    12288:rAPUnYDaatiDTyTNv7FC1kdQeYDsa7iDTyTNv7FeGYMSX8qG:oiDTyTNv7F+iDTyTNv7FDZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\20220925 - 检查2_2\美军网络安全 开篇 JIE 概述_百度搜索.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    f303ecb0141c3c4bf20e1f8785785635

    SHA1

    e6f597c80f01ea34c8fe2ec82b9a56d782764dcb

    SHA256

    0fc816b4b14ec284de0d0fcfec029c64ee90ba250e6a12739b34c0827bca9801

    SHA512

    5847e2295a883f6f5b623a8fef40b964085ef4c688cdd6401baa30aa337ae94eacad0de902f791232b78a81d1af22fa321ff248e6ec64ad0dfdba84ec8077364

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6JK0UOW1.txt

    Filesize

    608B

    MD5

    39e34d5662588e6a844ae32c87b76ce3

    SHA1

    89933b21d37934deef5c611d85215945502662a5

    SHA256

    32615a9d4b5d47d3adb3eb021ff2e40d07ad8ab2844c6e38094bfe7dc51e75fc

    SHA512

    511305f48825cd11f11088fc5d9404745e7b658f04c4dc8bc78fdc8d0023fcc3bd8c12cca9db70072118e86a36e59bd14a515f17f2229a175ee336477b66a4e4