Analysis

  • max time kernel
    110s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:46

General

  • Target

    DNF绝情阁模型工具/gj/exrpg.com/Language/Global/ERROR_Default.html

  • Size

    1KB

  • MD5

    4883088ccf00156b17588ee8a9c30448

  • SHA1

    b9a599fa92cdff172b1d49350072f598f707ee91

  • SHA256

    cf77e3a22dd8440a8a42776d537e44adad0ba00841b4445eb69965067d9ba52e

  • SHA512

    c4c40e2aea205eb1b681537918088b6003cf3f0d6360b1dcd62222de670eb7b7b39603874dd6c8868ea7f85f5419bce8560c58244db0ec8a2bab04a104882638

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\DNF绝情阁模型工具\gj\exrpg.com\Language\Global\ERROR_Default.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1200

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4MN669II.txt

    Filesize

    602B

    MD5

    f2fdc49de801854ad3e8a8547a00c3f8

    SHA1

    805037615d6902844f4317fdca532cfce48d844d

    SHA256

    06b97913d5f5535c6086ba56871f9d51cb704e9ff4195eb812c8d8bd8db8cdb1

    SHA512

    d1b7ade2b18a6b357492ccd50e6f30274d657310a89952c1c9e7aa3f099035eedb91e0de4dddec206790bb0ad90f2b33a83289f69520f78500b5dc9f47de93d1