Overview
overview
4Static
static
4练习参�...aw.xml
windows7-x64
1练习参�...aw.xml
windows10-2004-x64
1练习参�...ne.xml
windows7-x64
1练习参�...ne.xml
windows10-2004-x64
1课时7/�...��.exe
windows7-x64
1课时7/�...��.exe
windows10-2004-x64
1课时7/�...��.pdf
windows7-x64
1课时7/�...��.pdf
windows10-2004-x64
1课时7/�...��.pdf
windows7-x64
1课时7/�...��.pdf
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 07:03
Behavioral task
behavioral1
Sample
练习参考程序/练习6/clickDraw/clickDraw.xml
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
练习参考程序/练习6/clickDraw/clickDraw.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
练习参考程序/练习6/dataEngine/dataEngine.xml
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
练习参考程序/练习6/dataEngine/dataEngine.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
课时7/练习7/ddraw-演示.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
课时7/练习7/ddraw-演示.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
课时7/练习7/练习7要求.pdf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
课时7/练习7/练习7要求.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
课时7/课件7-绘图和图片控件.pdf
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
课时7/课件7-绘图和图片控件.pdf
Resource
win10v2004-20220901-en
General
-
Target
练习参考程序/练习6/dataEngine/dataEngine.xml
-
Size
10KB
-
MD5
1044d192e0be979b904823671e94c646
-
SHA1
5b7d4121d2ce5c1d4dc313591e6f0bb3bcf8adde
-
SHA256
0fded46357d28bf0a00c7bdd887a1cf3656edd36628ce295726894e886bee4b7
-
SHA512
cd76ef28e6f59239113a33dc7012105ea984f61d933424439cb2dd9f0a7203927e2be17d2981dfa092079f88fbdec2f4092259e3c5e4acc0e4abe72d0e67b4d1
-
SSDEEP
96:yY0/zcpvzF1fNOimF4mbima4G2YyaLbyaLMyaL6yaLDmPsOB9UAD/e44fh54AD/M:yx/zcz/RBkRbn/UfH/sfD/zfe/rfwX
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307fee5863e4d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373021749" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6E2643C8-5056-11ED-B696-D2371B4A40BE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b142160000000002000000000010660000000100002000000051b21d150870a3f53369f61fa4c71c336b6d65a09666d731cb3c7af200c700e0000000000e8000000002000020000000e90aa94cb30cf5e5198e45473c44ee911218f86c505957f8134e0dad898c86bc200000008b720c2e1bc87d362d1ca1ca59affc48ae27b7c75ad32001034289bec537b80c40000000748b83150c2af22b6b22c61841be2ea39702b4cd93b4d8458a842aac3848f6645f6f86000e94abbe2150e734bc734857596e4b53bd745b2fc627c90741e8391d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1198126923" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1198126923" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991459" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991459" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b14216000000000200000000001066000000010000200000008018fa0a77a1c5cc70abdeb88187d3bec18be7f462bfe0c496b915b356be80d2000000000e800000000200002000000003acd38b8bdf806da22f7d8d3c06b0b3c74fcc1b7596565d79c3b643abd0ffaa20000000e8df0c58b4fbba5231aaab3feaf57e5334e50816bc27ae0b391e0ea7bb27917b40000000df992bba923b22fd44e9e3029fb17b3f19098269a8699862d2ece29569a8b3df851c9a6cbdb6cdb1b5ccf8bf6580387987efda63bf1da520bbe289c7a238c049 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0992c5963e4d801 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4944 iexplore.exe 4944 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 1360 wrote to memory of 4944 1360 MSOXMLED.EXE iexplore.exe PID 1360 wrote to memory of 4944 1360 MSOXMLED.EXE iexplore.exe PID 4944 wrote to memory of 2988 4944 iexplore.exe IEXPLORE.EXE PID 4944 wrote to memory of 2988 4944 iexplore.exe IEXPLORE.EXE PID 4944 wrote to memory of 2988 4944 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\练习参考程序\练习6\dataEngine\dataEngine.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\练习参考程序\练习6\dataEngine\dataEngine.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4944 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
-