Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:48

General

  • Target

    更多系统软件下载.html

  • Size

    410B

  • MD5

    7bb7ae902ffeb8c37fe00b88fe68c1e7

  • SHA1

    c839f12d71b57aafbdbd7bca481e9438e8801579

  • SHA256

    8d518dfe520c4464fe9fd28724ae8d9700ab0a6e5a648f9be8a85a526b095c87

  • SHA512

    46ccd91f2d826b19b272c1440b5f8ef7c96261e0ed8cc40d064a0ddc547400e8c35831280999ab37fb7df2a525c8c88d1d5f3e36161b0b633249c7f226b66803

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\更多系统软件下载.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1064

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38aed59474bc2222f5eb60e2530dfa93

    SHA1

    4d7fb72d52eb1d3293ee79002de27bb10fb489b1

    SHA256

    d221f8078d9ee633a59f432b591309e9bd23760931553a2cadb1ceebde49c207

    SHA512

    c513459131aa9d08d2218931af13a93c26c867ffb78d6d392c6f911f7ca71b72830f13a33f362ce7e2ca5b424169f754384eacb0b7ffc92832f3fdb0bc976bb7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    9KB

    MD5

    e7059842474dffdc0b7fbbf9f56767e9

    SHA1

    94ecb154ac0864824c7cc75183d1bcf953b0911f

    SHA256

    0c1cf33e70eb445c639b14d87dde79e98c23644cbcce363a0e4aab7f82b396aa

    SHA512

    fbbb2a920cc87935305af88fb8114cb9651b42d1897928a728f64194d12bfb0165dedfa7fa6f408fba2400fc400fb669bdc6edc8c316cde634a3aec8c3eb6d43

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\623GLZLB.txt

    Filesize

    603B

    MD5

    ac305aecd42d4cf16c63707dd8fdb1f2

    SHA1

    431bba20747db5d03261e2ecbb22865e11a5bd75

    SHA256

    8345606dede4d8166c5f1ecb5bef00402652c461baf787a83b3992fdb8e4a3f9

    SHA512

    612c8963a7ad389d04b18ba725b039d1b564257f64accdfa4f6537a65a5f1fd649e64a504101a033711bbfb809cf6d02ae2518782f61795a33ba067cb0fbc91a