Analysis

  • max time kernel
    117s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2022, 07:03

General

  • Target

    练习参考程序/练习3/VS2017/改错3/改错3.xml

  • Size

    7KB

  • MD5

    d853b5aa8fd722c74daea19f140bf881

  • SHA1

    067ede09124a8d265f498975822e07bb219b7d43

  • SHA256

    d1caa25edf61345bc424551de32fcab5a99ea60134fcd41e5c92a7a5c111320e

  • SHA512

    e3827198e591fd806c045a3d4e222fe8bf36ab14b0319576b9a4ac0f7f6a268a1d799292f10ef430d44c6cfd4a500366b5621e534dca7aceb5a2b68ec7821bef

  • SSDEEP

    192:yx/zcr/iqrwb7/YPce/gPcg/JPcV/xPcL:yp4U/cL/kl/do/lC

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\练习参考程序\练习3\VS2017\改错3\改错3.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1K4KVRMM.txt

    Filesize

    608B

    MD5

    9355844190b66b97530fd83002e2aefc

    SHA1

    12c0a3285530b0baed97e311453866015be57196

    SHA256

    f166fcb1eaf2f5c301222e4ea782cf670e4073fc6c7d6a8ee218efc856da7042

    SHA512

    c221fd4162d9798b4f6949eb6401701def5ff8606a54951734dc24878268bc96d0f03a46d482a7060d4d4e21486fbb7f983376a82ced0fb94e1cdabe73e0dca4

  • memory/864-54-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB