Analysis

  • max time kernel
    76s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 23:36

General

  • Target

    元神电脑教程/原神电脑启动器3.1版本/Resources/Icon/github.xml

  • Size

    2KB

  • MD5

    26c8941c9bb9e03a75f8b6201b5b84de

  • SHA1

    c5d339cd6145fc23ad0bb5d6f7a7a7d1a9fdff07

  • SHA256

    85cd1f6d46d72b6ba9c7a290b42b826247632a8adf0a750e13cc237120c289db

  • SHA512

    5ca5f3cd9fb5a5019033ab72f5420f131594d0eccc13727d79e5bd4d785258be48e4f15eb06b852420df702a17721eb2df8523c42d0c7d4f81f666573a2be52b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\元神电脑教程\原神电脑启动器3.1版本\Resources\Icon\github.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2ZU1TRQ0.txt

    Filesize

    603B

    MD5

    0f55767075817e226c39677951e4744f

    SHA1

    13396db4a990270490adea27bd9ef550e9e0fb6d

    SHA256

    a089d6f4497d0c218b3770f00e357f77278ac5c5055ae6d508557eda9bc56c7f

    SHA512

    0a52895c615c0ddab9b7cbe655870b006bc9adead6cf72c5d89afebf5a0c550dc4fefbf945cafa29435a2bf8b9b39c0bbb8f19461b17beb5040a7c825cc47c06

  • memory/1280-54-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB