Analysis

  • max time kernel
    66s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2022 16:42

General

  • Target

    代码/1-Promise基本使用/3-Promise实践练习-AJAX请求.html

  • Size

    1KB

  • MD5

    fc3f374e4fb608ab24cf7a93af72c123

  • SHA1

    185476eab334d5def86544aa9ec75a3800b1a4bc

  • SHA256

    b53dfd75870ef955ff82bd2401806c8837c178f035620537bf0c00abc244defa

  • SHA512

    4e577b2f1da95bf438cf9201b643843a8ac0b4c7e0fb1ae089b605412f9c2cf0484fdf29ec5b4b60dd8ed0f1a60eef52e49223ed5a6242949e2a3b0876eda6ec

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\代码\1-Promise基本使用\3-Promise实践练习-AJAX请求.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1692

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    57de6a0f1a3672abaa78d440bac35dca

    SHA1

    785595a0ff9dcee28878a1ba23da63da6ad3bb9d

    SHA256

    a4bd99c1f54c12cb9e8e6aee4addc47f512bb9cd14c82ff73bb52e064b0adc2c

    SHA512

    24c6d28e5d771b29d36fe5e6f441bf1d2a4e5c58193a4361b3a5f9a95d61372e548b10fae8e9d43a8ada87e9a3ab4391c05df0564ab08c57d62f5789580e9531

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A503EN1K.txt
    Filesize

    603B

    MD5

    1b9f6df72dd63d654781503956d06938

    SHA1

    dbc3ee9a5c54e4d702fab83e27f4358bda856c35

    SHA256

    9b6ca5861b6df117231507ab1428f8843320a3785a27b1a07bb82737daa6ade8

    SHA512

    7b7bf1f7a6a0c574ab6a1b773066edf451f045ba49c226e60cd0832756d03eed9b8774955d1fe2f35d17f06259b92dce0d4b4275297720f0653ee6a341b82f47