Analysis

  • max time kernel
    90s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2022 10:22

General

  • Target

    硬盘诊断工具(HDDScan)4.1汉化绿色版/res/DEFECTSP.xml

  • Size

    4KB

  • MD5

    4d9ed29fa0132971056d8f3d14f0ed70

  • SHA1

    27f5f087c50add13145b36799eec7d7b12ab2a4e

  • SHA256

    71c20fc32bd3eba6f9ae6854bb8a57e83dbd5666a561ae73ab6429788dedd5c3

  • SHA512

    1c848fde568e1e3a4b8ffe328cfd097c6fab8455e24329c78da02157ce2c738af73542b5ce219adfd5be27255088387e27140700760b8eab5c4d73bc24c5275a

  • SSDEEP

    96:biMR1vSlhCuqDYXA4MASjAIjA+ZrDZMPMAaMTsr4:biMR1vSlhCuqD0YztZnZWcOsr4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\硬盘诊断工具(HDDScan)4.1汉化绿色版\res\DEFECTSP.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\硬盘诊断工具(HDDScan)4.1汉化绿色版\res\DEFECTSP.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1412

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    9ebd067ed9097e52468ed43389e20f84

    SHA1

    254e9e98e444f9aa5025e9f39d26c2ee6343b070

    SHA256

    c2f13a89d711a444d9e2e5a909191abfd3b00b1c73d8b6b5d8f9df8eaa5f8bad

    SHA512

    a70df9fc2fb4ffd351c4702d5b7dfda2f5b96b3596d53f09f981afce933a53768c940dc04e93b0098f5d2a309919d6b3a4398bb03b8bc5aa67c4ac7dff525c3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    de9699aec30fbdaddf0699df5eb1136b

    SHA1

    b4e00a80813b593c1148a0d25e47934dd3a541b1

    SHA256

    9a8fcf46609e0bfc53bd206d64d6ce45be43dd51f96c4f0d2e83658e8965f87c

    SHA512

    cddc6fd556ae15b9c2a74cb50f579887757dae29430429ac0b3ad48027d0084d834deb7baa08c29d66c90d30529dbdd897db2736bab6c2a2c4745c64ceadc91f

  • memory/1336-132-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB

  • memory/1336-133-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB

  • memory/1336-134-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB

  • memory/1336-135-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB

  • memory/1336-136-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB

  • memory/1336-137-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB

  • memory/1336-140-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB

  • memory/1336-139-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB

  • memory/1336-138-0x00007FF892150000-0x00007FF892160000-memory.dmp
    Filesize

    64KB