Analysis

  • max time kernel
    152s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 19:01

General

  • Target

    主题之家.html

  • Size

    265B

  • MD5

    37ef2c6740fbf2297744f81fab16f81a

  • SHA1

    861e9922f9e308f9648b66c254573afdb798ce37

  • SHA256

    916d15c31c84fdecb989ae5a05fe69dc190b7aff233d73b7cc7e70d5b9f26d7f

  • SHA512

    7cec309861a4048ee799be6b21dddab1384e810227a29fdaf11349ca667b0b4c9667fb419b5b5d31ac562d1f1fa8bf271def513f0c2bee44638e92663502c96a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\主题之家.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    c99fbffa141bee9ce136556b0251a54f

    SHA1

    25299514166d84968ce91e4db7e11c98ff9f115e

    SHA256

    45f4f814fdfbfaf2c362e0daa16ec740f5e172da1c862554c0eea7a41e6e84a9

    SHA512

    2ac97d801158c1046f44c6dda9f5e24eb8ffa4a7ca4ff417c62a78f2e15e105c98514441e7249e4b9617c20323e71a7bd10947b464663bf2e38cc197b901f32e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    13KB

    MD5

    cffd43c6a2eafcc6414875229d1077b9

    SHA1

    df9c4695992427ee2f8a3cc26dc08f602367b4ea

    SHA256

    9aee30cf61f0493fc1de194aacfa6b14a5c291ae84f73195f93c5950d0c8ac9f

    SHA512

    d1a09b351eaf0c5f4d377b931f97847691e9a3cb5cd2391f2c395d9adac0e61c96f9bf2ae567e31b07d9681692de70b764062b913d8603ae211b469e7c18baa3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I82X8SSR.txt

    Filesize

    603B

    MD5

    84d0607bd998517107f73fc81f9e2ef6

    SHA1

    02ccc861a956750b6f265b384a0a8622b88970c5

    SHA256

    c8b8841504a1c27ba9ebdf036a141aebbeba23160a6bcb5b883e68d2deb0084b

    SHA512

    be962de992c64b543850a59f2027db7fdc28ca80ade70732505dc2082b69abc4be435705f9304d819a48927de9e70de95b420c8ec7601f1c6d94e4b8ce65c241