Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:01

General

  • Target

    主题之家.html

  • Size

    265B

  • MD5

    37ef2c6740fbf2297744f81fab16f81a

  • SHA1

    861e9922f9e308f9648b66c254573afdb798ce37

  • SHA256

    916d15c31c84fdecb989ae5a05fe69dc190b7aff233d73b7cc7e70d5b9f26d7f

  • SHA512

    7cec309861a4048ee799be6b21dddab1384e810227a29fdaf11349ca667b0b4c9667fb419b5b5d31ac562d1f1fa8bf271def513f0c2bee44638e92663502c96a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\主题之家.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1480

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    9cdab11ef457df8fb1941dc1cbca8ef2

    SHA1

    9ba953c82397383987728e9f4b23fe5dda8ee450

    SHA256

    31ff0ff450742300d969024d87e8e20f624c6856841339bd370a8d77bcf5fa94

    SHA512

    c0a4875e45da25a62279fc0de0021731bd30723c161a3f71feeb7a1af0a4f1f7ae66ef64e13fbf0ce0a5976581f684d815a9e9eb2cedd952d02c2b4ad6ac08d0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat
    Filesize

    13KB

    MD5

    5f9e1fd59e9b36cb2eae5155e8cf2be2

    SHA1

    1a2cdb8d7088e8b9769c2fe0001bcee0e5f0b631

    SHA256

    2e271eea9fb096ecec9fb0e27ff1423fd1642753981872c2fdd7332b17a43679

    SHA512

    7763cf113022880f9b79617520db265dc0354f346a423ae89ed45b2b0b63383b7580d3ea018e247a02a4065558ab6eaca2019c3d2a9ca621b44e2d523f1a62cd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NV21AEBX.txt
    Filesize

    607B

    MD5

    077a7a7d501d2d99ca6888472d3d1a5d

    SHA1

    04296f7af6df6677a00bb5481e06f3ab6754b1b4

    SHA256

    f4ea5ee4938d77c74fb73452942efaa95d842dfa337c57ecc4ec5589e810637a

    SHA512

    57f890c3e5f08729d2df4319330f4c2b46fbd4d67bca3cc89e32b54db65f401085ed7899863311b0335f5c17d18bd35e79ce17d1e89dfd2faf18929717d5ca1b