Overview
overview
8Static
static
81433_hack4...st.exe
windows7-x64
81433_hack4...st.exe
windows10-2004-x64
11433_hack4...��.exe
windows7-x64
81433_hack4...��.exe
windows10-2004-x64
81433_hack4...er.exe
windows7-x64
1433_hack4...er.exe
windows10-2004-x64
1433_hack4...me.swf
windows7-x64
31433_hack4...me.swf
windows10-2004-x64
31433_hack4...in.url
windows7-x64
61433_hack4...in.url
windows10-2004-x64
1433_hack4...��.url
windows7-x64
11433_hack4...��.url
windows10-2004-x64
11433_hack4...��.url
windows7-x64
11433_hack4...��.url
windows10-2004-x64
11433_hack4...13.exe
windows7-x64
11433_hack4...13.exe
windows10-2004-x64
11433_hack4...14.exe
windows7-x64
11433_hack4...14.exe
windows10-2004-x64
11433_hack4...��.exe
windows7-x64
81433_hack4...��.exe
windows10-2004-x64
81433_hack4....5.exe
windows7-x64
81433_hack4....5.exe
windows10-2004-x64
81433_hack4...nH.dll
windows7-x64
81433_hack4...nH.dll
windows10-2004-x64
1433_hack4...��.exe
windows7-x64
11433_hack4...��.exe
windows10-2004-x64
11433_hack4...fs.exe
windows7-x64
61433_hack4...fs.exe
windows10-2004-x64
1433_hack4...ex.hta
windows7-x64
11433_hack4...ex.hta
windows10-2004-x64
11433_hack4...SD.exe
windows7-x64
31433_hack4...SD.exe
windows10-2004-x64
3Analysis
-
max time kernel
98s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 18:02
Behavioral task
behavioral1
Sample
1433_hack44.cn/12-18/Gh0st.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1433_hack44.cn/12-18/Gh0st.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
1433_hack44.cn/12-18/MD5修改器.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
1433_hack44.cn/12-18/MD5修改器.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
1433_hack44.cn/12-18/update/Server.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
1433_hack44.cn/12-18/update/Server.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
1433_hack44.cn/12-18/update/look me.swf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
1433_hack44.cn/12-18/update/look me.swf
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
1433_hack44.cn/12-18/update/skin.url
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
1433_hack44.cn/12-18/update/skin.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
1433_hack44.cn/12-18/update/使用方法.url
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
1433_hack44.cn/12-18/update/使用方法.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
1433_hack44.cn/12-18/update/华中帝国收集整理.url
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
1433_hack44.cn/12-18/update/华中帝国收集整理.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
1433_hack44.cn/FTP2013.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1433_hack44.cn/FTP2013.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
1433_hack44.cn/NB12-18/2014.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
1433_hack44.cn/NB12-18/2014.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
1433_hack44.cn/NB12-18/MD5修改器.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
1433_hack44.cn/NB12-18/MD5修改器.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
1433_hack44.cn/NB12-18/NetBot5.5.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
1433_hack44.cn/NB12-18/NetBot5.5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
1433_hack44.cn/NB12-18/SkinH.dll
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
1433_hack44.cn/NB12-18/SkinH.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
1433_hack44.cn/NB12-18/免杀审核.exe
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
1433_hack44.cn/NB12-18/免杀审核.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
1433_hack44.cn/hfs2_3b285/hfs.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
1433_hack44.cn/hfs2_3b285/hfs.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/Hex.hta
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/Hex.hta
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/KSD.exe
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/KSD.exe
Resource
win10v2004-20220812-en
General
-
Target
1433_hack44.cn/12-18/update/skin.url
-
Size
346B
-
MD5
8b3a3d200c3def8b566b9258e0524179
-
SHA1
59a49b1525f017e58275c47d26768d2dd51acaff
-
SHA256
806dcb6e36ced7feb8d9fa0e00a6ebc8004d0205263b6408e2a54e71e99238d2
-
SHA512
c1b3931cd11eed5c9292b5727252dd9cfe400f769d9882ee0fc73976a192df04cf9daa9a5d706450f83bfa02345a0cd830a35250336542650a101788704e82f8
Malware Config
Signatures
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a000000000200000000001066000000010000200000001d65d7d132cae89fbf4eddf62acae4e66b60f179115866f2d83815e0f7d9b68b000000000e8000000002000020000000855b8177a945a1f3f44cf0eec35fea801faa5d5116bc49399dc8c3ac105f6e5b900000007d8996ca381e6d1c438b8173180d09f32994fc8d1f1d6fd18b484cc5496afba0b948ce5e6c69a1a6d8f78ee037a59104c6208de887fe6b6149b28fd5598e94c70b30197a92bef62a8777271067450c83454ad00921002cab0bffa6bbed38716c83b4ba461fe98de26a0495bffa6ef51c00ced135b26fdbff4dc50de7444f5db6e766bba3ea111bf2061f8fd9a3649127400000003cc5fae0dde9aca772894116edee4bcb4106507eaf8c104090b8f9fe259f2a80c41e9062ba4b6d4cab33ee05c21ebbad58ea991c654a9b7533339568bf9c96c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005a94cb4002d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376305419" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a0000000002000000000010660000000100002000000004bebc08c6ef421d6645ee67104a5935561dcc6a691b406e8555a72d2c6d8c49000000000e8000000002000020000000518a7d84866c05c966da17be1cb679016f264b6983c3d6224d65e3041c01829620000000dd476a02f9bd684a42397c615b86f3585beb5384053635a3c3d425086ab6df42400000006c63e0211c46c1851b0b7513dd55ba29954a8df2de8e9f562cad737a526f90402beac74dd75400085fa8fd0d08b27ca37b7b5d9a1d7aa6d56cb5cc9f205a5815 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D626AE01-6E33-11ED-9D78-7225AF48583A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2044 iexplore.exe 2044 iexplore.exe 572 IEXPLORE.EXE 572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2044 wrote to memory of 572 2044 iexplore.exe IEXPLORE.EXE PID 2044 wrote to memory of 572 2044 iexplore.exe IEXPLORE.EXE PID 2044 wrote to memory of 572 2044 iexplore.exe IEXPLORE.EXE PID 2044 wrote to memory of 572 2044 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\1433_hack44.cn\12-18\update\skin.url1⤵
- Checks whether UAC is enabled
PID:1204
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD51b6ea8ac927ad36ad4e271c276bfb01f
SHA1c3d928f7682fde2c521db8d37e189a49c5e1bbe6
SHA256d9649fdcafbe9bb2cfbe7b0d6cc3a1a04323159af17139200897f01af12ac078
SHA512e8ac2a21faba3bab4fed014b224f0d6708f62b49aa2eb4ecd600d66aa20dc257fa4866d03ea61fb7f508e51471873b7bfb3d1bf38acde3f57ec98331146421d1