Analysis

  • max time kernel
    120s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 23:36

General

  • Target

    元神电脑教程/原神电脑启动器3.1版本/Resources/Icon/QQ.xml

  • Size

    1KB

  • MD5

    176640a4b5354bcd204a2c4b3499110c

  • SHA1

    a01ad372cb978559a7911c43db03ea87fca368f4

  • SHA256

    0d00e6329bcaa3294cd22c546b067967587c525fda5ff1d16836199333213ec6

  • SHA512

    16fc68670446d17e28410a89e9738b66fb88b95d6773de3f26c9d0c7c34bf14a03aa8a077cba3c7fa7327b843b4b2410da1f06929025aa0b36c85d8286eb90d5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\元神电脑教程\原神电脑启动器3.1版本\Resources\Icon\QQ.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WM52WFL1.txt

    Filesize

    601B

    MD5

    b217daa595a50cb2409d03f3be67efc2

    SHA1

    821e1656560688c1dd7aae16948415b59a32b32b

    SHA256

    d31a5e87a7642b1d382ae6fc0927dc6ee921ae82f97d6ebc7f134bf1d2593f87

    SHA512

    d448724dca5bd50520a6d3dcfb3ba897aaf6b315b2729f923f1de99371fdc7d26aa30174ddd9c05c2fcd897035f373684148fe23f8f4102d707cc68c0595191a

  • memory/576-54-0x0000000075911000-0x0000000075913000-memory.dmp

    Filesize

    8KB