Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2022 10:22

General

  • Target

    硬盘诊断工具(HDDScan)4.1汉化绿色版/res/IDEID.xml

  • Size

    8KB

  • MD5

    593a6ff1c8ca4b379458b8d033637956

  • SHA1

    679e175fb7c81cbe7419f759258cf3ace440a9a0

  • SHA256

    fd1638aa488ad75ca9a3130b77f0f5cb618ee152680da176a7b627828c92d33c

  • SHA512

    48ee0ee1342b97f8fdb042ce9adfd5a71e659b7017f1b32c8e4b53fe0f2d934a40b9dbaa4d7b191cd83f2ba0e489ce40ec2359a996328203a753205c1a91c98c

  • SSDEEP

    192:w16vSlhCuUhVpw1s+v6urabVpw1Uv6urar9Vpw1qv6uraGVpw1Av6uG:w1llhCuUhVpw1s+v6urabVpw1Uv6urai

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\硬盘诊断工具(HDDScan)4.1汉化绿色版\res\IDEID.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\硬盘诊断工具(HDDScan)4.1汉化绿色版\res\IDEID.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3808 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    9ebd067ed9097e52468ed43389e20f84

    SHA1

    254e9e98e444f9aa5025e9f39d26c2ee6343b070

    SHA256

    c2f13a89d711a444d9e2e5a909191abfd3b00b1c73d8b6b5d8f9df8eaa5f8bad

    SHA512

    a70df9fc2fb4ffd351c4702d5b7dfda2f5b96b3596d53f09f981afce933a53768c940dc04e93b0098f5d2a309919d6b3a4398bb03b8bc5aa67c4ac7dff525c3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    812e851522496aae482ec1e84f66a9ce

    SHA1

    d8bb3120ef0404db7f152026c3041d9fd9c8dee7

    SHA256

    a14e2be9681d7cbe9779139e1fcc610868d59bc29351054817c38c92520426d7

    SHA512

    eddcbed12e6042f62c04f1b148e2cfafcd9d88bddf3861cc747b46357c38482768c6038944086ae58b4f953f3612c01a94f1d2694406c1fb82c047285f0a5414

  • memory/2228-132-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB

  • memory/2228-133-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB

  • memory/2228-134-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB

  • memory/2228-135-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB

  • memory/2228-136-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB

  • memory/2228-137-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB

  • memory/2228-138-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB

  • memory/2228-139-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB

  • memory/2228-140-0x00007FFA31DD0000-0x00007FFA31DE0000-memory.dmp

    Filesize

    64KB