Analysis

  • max time kernel
    142s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:00

General

  • Target

    主题之家.html

  • Size

    265B

  • MD5

    37ef2c6740fbf2297744f81fab16f81a

  • SHA1

    861e9922f9e308f9648b66c254573afdb798ce37

  • SHA256

    916d15c31c84fdecb989ae5a05fe69dc190b7aff233d73b7cc7e70d5b9f26d7f

  • SHA512

    7cec309861a4048ee799be6b21dddab1384e810227a29fdaf11349ca667b0b4c9667fb419b5b5d31ac562d1f1fa8bf271def513f0c2bee44638e92663502c96a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\主题之家.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    c5cea42e397c5544c77f2c129526b89c

    SHA1

    d21496f1bd8717635800e166ec2323f23f1098d9

    SHA256

    370f1513c77ea732d02864066f7032514c06a16e07cfad750301151f04d6270e

    SHA512

    2b1f287c9fae1d45b3b569f93ce11babda032f48129de644b2235c89010eb336036e890e2d675e8b13de7c5a1e6ce8f5fed3d57d012558db5a98d8abcce565f3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    13KB

    MD5

    73bae55f2bd2f5897d010cd5c3055261

    SHA1

    8afdf010a601f4264f8bb89515389cd5370d3b74

    SHA256

    c50ce904f32fe83d4b8da1604ba735c22bec91095bb0eda3b7c907a148de3157

    SHA512

    5b1752bf86bdca991dcdabdfe10bc54716a3b2ed11ce1e873d545a5e0cfdbd6d72c4d9c96f4d1cf5b1816f9144c4dc73a56fdfed196197affd0dce32757a2305

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZGJ5E0K3.txt

    Filesize

    608B

    MD5

    a1a13b4bd8774d1db2694c4cc6ecf24c

    SHA1

    d9070b2e4e22f85fa2c7247b5d8ef3bc01370a7d

    SHA256

    e63ec433e757bd3c21e720ef5aab9ea865d625091348141ce7fba4cc1fe7ac59

    SHA512

    6f553a35b30734ed3dcb6fade1b378bed5a02c106dac0874c4c8586c9a5b03215df61881b0b92ae8aac4a22c940e7b4bf3d2f94dbadfa1c98c2a766874cd9d62