Analysis

  • max time kernel
    160s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 07:51

General

  • Target

    解压密码.htm

  • Size

    104B

  • MD5

    45ee9e459a334004af019da7bea33447

  • SHA1

    27681031731a88f213686820d8a68b73a5475e0f

  • SHA256

    3ccd7437a8ea9a8ad424f5b11fcae4b323ff29b21a1fead5c042477c36b3ad3e

  • SHA512

    475ba7b31a5e6f3daebdd7ebac95593af5dbe38eb050a01105235b87324c0495722e402b59b790fe86f71548142511de9e783fb24a392df943041fc40280ee6c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\解压密码.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:952 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    779B

    MD5

    f7f91e1b9f9854e68845060656023e18

    SHA1

    1813deb4a5d6bb29d70929116e70e77087edfdfb

    SHA256

    227a33d83938e9524a0ec2990d26cf1df708dbadb8eb353d38f0adca99593028

    SHA512

    466f75996bd3d5d026a5d374a37f3ac7a29120f3c9b9300e256da3807a4b7df3e465d3ea0d352ff9af2de4ae622eb2c5998d3452d6cb15a180faa85f6ff154ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    246B

    MD5

    f8d3deb1b507b50f3664e09c83826aa7

    SHA1

    f6f4f6ef7e9770058356ca589282880aa15b33ce

    SHA256

    200057bf0eee3b78020d0b219d8adb8731dd9c447576d90c537d4731fb3b96c7

    SHA512

    3a79faf8dac8652cd63acc3c33f467d9c80ac89243a6e31d2665e41530a9e09596e48afbecfe03d9bc742ec02c9f133205dbede3ca3df9f83cba106da8a2b369

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    9KB

    MD5

    e4b0f835d0c615ae4da0f84c2258241c

    SHA1

    7aeddbf30103da33bc208a2f982265aaecacb86a

    SHA256

    cb5cf581be9b52624cf7cf76825b46b3942234f7302a2639b292f7b043a6f165

    SHA512

    d7ecc131fca013a2398ae71dfd79f2aac6cb84daea3db817f71a31d14f3b29574c330a3822cc193c62cd9025bcc9a4ffe2274e1462613767e95994c6714fb793

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GMQ6XNBF\favicon[1].ico

    Filesize

    9KB

    MD5

    bd189950c1014d1fb9358f6a64712ade

    SHA1

    1f1cd0dcc1e2c781bcd7a06546c0d8fd7cbcb209

    SHA256

    07175a81a470a3bfd89150a5a451ac65fed7b21cd188a0016b8ede3383a1fd56

    SHA512

    69d4a97aa3fe0d45249795d5c8284494f2f031fbd9814a9e6bede2f766e74ff6c1fc8a78670bc51523f6c103be23a7411df5a23b89bba0cc082530ec0b3c443a