Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2022 16:42

General

  • Target

    代码/1-Promise基本使用/6-Promise封装AJAX操作.html

  • Size

    1KB

  • MD5

    0e660c2cc3b800c5521def1e1b798b10

  • SHA1

    664be11e839bf4f875dc2ab1d3ec73c20f41cec3

  • SHA256

    57ba0db8b1f75974120cd2b8f3c02360297f445fd37c92a44e9b1b37906826e4

  • SHA512

    548126204d71bdbbee8d88c3297904d8a6dfd35372c3042d01cce498882bae7d6f76aca94ac54cbf73f60016cbb7bf1d8e96a6af673dfdaafd3b3749ca28bb0d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\代码\1-Promise基本使用\6-Promise封装AJAX操作.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1548

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NA88D1SW.txt
    Filesize

    603B

    MD5

    dccab599141e72a1beee1835e1126ffc

    SHA1

    8989ef5de492786df43a03c81ac49db3fd1684cf

    SHA256

    63f0f54574110a6725ae9d64c7450c2f00275e3ca3dcfa26740bbe367365f78d

    SHA512

    0ebb2746ab529ee91df43f583934dbc5692d6b38e0ca29e5a6aad9bfbd39bffd6139423b6fee495d426e44e6c9553cce9c843bcc64c6620856ebebd283f6ec0e