Analysis

  • max time kernel
    175s
  • max time network
    287s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 19:36

General

  • Target

    MirServer/Readme-说明.htm

  • Size

    2KB

  • MD5

    70f8e0a8f3cc2fb89704dc6ab1be4481

  • SHA1

    8e29ae18eb8876b6cdfcd43d90fb8b703bd44608

  • SHA256

    22f1a011a15cc161aa95e928b1821ff55de4a588b527c42e780a376a8c9bc224

  • SHA512

    dd393fe80aaa014fea51e9cd15b18c95484b1646aa109d84a0a886cc8ee9ae5de74463a5c6236e02cb2888264a0bba7a05a5583266c266fa9bd232346186f8b6

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\MirServer\Readme-说明.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1816

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    1b94d915494f5cde1daf5ff5073fc849

    SHA1

    a223ed26ae708e6daae1904a90afd3d8faad1760

    SHA256

    cc5c46439a3a12f6e1b3969bac3676087214598dd89f7d3d7f53b753df3ee986

    SHA512

    3569dc699065753a137db1418a3efe172d153e383f7765faf8808a490c899fd0bc376697ad20d3089e76ee1ffe89f333944783290f729ada350327cce4ce823f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9881A9PI.txt
    Filesize

    606B

    MD5

    1f4180874978f5573fd601570b2eed6b

    SHA1

    4836fe56359f1479cbf6301f4c1763f518f35a1d

    SHA256

    6431ba81d9401db1faac74ce10c9d62238e066753809e19f9eb59c4b5679c982

    SHA512

    6de3f37cf9c23b487a5e903682832ab94501aedfe3754b67dc0c2d8aee6dfc1c9d0fc5b70134f00093f55687717306960cb619908a44df0c24e5b5d8f8cb17c6