Analysis

  • max time kernel
    130s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2022 16:42

General

  • Target

    代码/1-Promise基本使用/6-Promise封装AJAX操作.html

  • Size

    1KB

  • MD5

    0e660c2cc3b800c5521def1e1b798b10

  • SHA1

    664be11e839bf4f875dc2ab1d3ec73c20f41cec3

  • SHA256

    57ba0db8b1f75974120cd2b8f3c02360297f445fd37c92a44e9b1b37906826e4

  • SHA512

    548126204d71bdbbee8d88c3297904d8a6dfd35372c3042d01cce498882bae7d6f76aca94ac54cbf73f60016cbb7bf1d8e96a6af673dfdaafd3b3749ca28bb0d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\代码\1-Promise基本使用\6-Promise封装AJAX操作.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4288 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4676

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    60c5dda6c87529c1fdbe874fd534913b

    SHA1

    141dd530c67ebdac9998a8f253aede034519ebbb

    SHA256

    c210d69c28a4a6abb399a425ffb66797df7c3fcf3bfc9eab0bf0dc7e19fc84ee

    SHA512

    bfd86d9e0ee15f5b183070573cfd693e83ce1083aa9c061ce9e68ed0f38518352ccd11b5f78a4b9179bccbed6dad89ee2003b414fbc1e20cf835af7c57b232c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    ecbe3f37b47728f4a37dd6a6900b8272

    SHA1

    f8517f569153c770f74a584f6ac69f465608470b

    SHA256

    5cac5f16f7156a6f989adc70932287310abd843c97b686bc17dde54a699e13b6

    SHA512

    7f76d349145dbabe18e4d627ac226cb4d4ab58ddd2a2fc45f474ae42bee2670f9e2703d3487a6a206cf4c5a8fb42d977120a67a24771cbc1cb7c0319336d63f7