Analysis

  • max time kernel
    189s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 19:25

General

  • Target

    codefans.net/Android手机一键Root原理分析/stuff/Superuser/res/raw/changelog.html

  • Size

    5KB

  • MD5

    d991b7868d0620af233eb205a0303a8d

  • SHA1

    9433726fdc43f2a741593195cc15463cf01bd1f2

  • SHA256

    b5ccbc527e0ac29525e41eaad71b7391d443c5ed0ff2cf7a8e02d8b9170063d3

  • SHA512

    0c4d838448696c17d207dc87a23f80485a0a949c70f675369ab930ea8a8df3cf659d2dfdb6ab38232bdd6ee1e67f54451b65835976d8f45802140e033e00cd59

  • SSDEEP

    96:ux+W6W3PJdi9kdp0uEK5C3jWHxsjUheg3DX0:u0j+JsSdpvEK5C3jWRsjUhTr0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\codefans.net\Android手机一键Root原理分析\stuff\Superuser\res\raw\changelog.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2K6DTGZP.txt

    Filesize

    608B

    MD5

    9dd6cb5e41949247d8b25a7087fb64a9

    SHA1

    c79ba8c35b2af9363a99f7a826b98c945a848409

    SHA256

    4c6c3fddcb182d0db1e5f3489225e32d6717705d6f56661a5e4735f346e53533

    SHA512

    08b1c468f17b8517edbcdbc034785edac546bad46ee1ffa6ad494718ea529cc8678f4af1347828c22d3cd12400686c099ac26cc5f13cf331ed48090007036009