Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 07:51

General

  • Target

    解压密码.htm

  • Size

    104B

  • MD5

    45ee9e459a334004af019da7bea33447

  • SHA1

    27681031731a88f213686820d8a68b73a5475e0f

  • SHA256

    3ccd7437a8ea9a8ad424f5b11fcae4b323ff29b21a1fead5c042477c36b3ad3e

  • SHA512

    475ba7b31a5e6f3daebdd7ebac95593af5dbe38eb050a01105235b87324c0495722e402b59b790fe86f71548142511de9e783fb24a392df943041fc40280ee6c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\解压密码.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6f69d7ee8af813e1bed30389c310000

    SHA1

    bd1c75b49687f9374211766a41fe299e6ccc9c2e

    SHA256

    78b885bbd1da8b385fdfd78b6a64679e1e260d6cfea9290f43457d1c65328002

    SHA512

    0c8b42f81fda76163c325f7089dc0abcec404ef9f7ce507dc909b0dca40e9e3c28676e827dcc3f543c06dcc7d61832da206312626a1117b277375688a70357e8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    13KB

    MD5

    71ca0839c497cd1b817b107483d08f78

    SHA1

    d3838a06c57eb108ee869490f0f12066b31d6985

    SHA256

    079084515bf9c43ed9ec04922fed74b38c0569d36d9b83394e3520433c03a670

    SHA512

    d17ac2795bea16422e03312af8328d14e1b274f3613287f4904b0cca0b51f136f475520efc8d23313d749df271d42bdec5378bb75326b98a04fb2b9fb915c2fb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LXOV748S.txt

    Filesize

    603B

    MD5

    a1fc1005e4888f21fb9dd29fe29736b6

    SHA1

    0765c306341607d5edd2ed65b4b0af85f9c0ce82

    SHA256

    73837539805845b8a1d4aa1d44b0aa4eda3880e0be8a681bcffffb4c0413781f

    SHA512

    d8649256ad2f827758607514748bec49ce47cf5f6b761110b4d7a0c686f27e9890fc712e92ee457e6e3f5082f303de0a906d873cce301c56d7bd2cbf192ae4f2