Analysis

  • max time kernel
    92s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 22:05

General

  • Target

    517sf传奇网站模板(峰烟四起)/传奇网站模板(峰烟四起)/blank.html

  • Size

    13KB

  • MD5

    8faee7086877bceabad0c23157d939d4

  • SHA1

    a06ecc05ed332d3d27bc64032925b54b00d55429

  • SHA256

    07a56b1ac6d96d75ba5db5e7342717ecce25c8c089b454eab25b81f8862e5055

  • SHA512

    e474b75a04a7bca41efc1f5d3e08f6b76d163df7dc4d033d94efae3630643c125f562b81a49e0556fd39d96c5734d37fab31f875c0e25f52a36be4b6ce72c319

  • SSDEEP

    192:oI5zpJ6E45sUpC8CwCY0sIKQ6As64zitegiKuL5iKqPMs:oI5zYPj/Wx1wW

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\517sf传奇网站模板(峰烟四起)\传奇网站模板(峰烟四起)\blank.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4540 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    dedb504b3469b24ec0df79c68f5772e2

    SHA1

    177a8b1045b456316ca32d90aba942bf34774c64

    SHA256

    e18111fd56db31f02eb16990f0bbc7991a0c80571703281ee66010e229c9f8b0

    SHA512

    101312fa01991caeaef010d0d21e740244cb3768490a1b82ae12e7524e50b6e7f2e23c08978ac4c373e9013baa0a8f50de8e1994341556b78ecd88ce13df5680

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    a0bac89b61af609a37b4a9c4f060e634

    SHA1

    0693613024b4fdef22d0c6bf058651978ac6351d

    SHA256

    4d13d1d44ccfc198dbb79fe14d4ec8b0bc673d1e15d764feaa48cf409fd14c2b

    SHA512

    f687e20be0f9849f2f37704515a07bacee8d4cc1587a2495f5c88dc65a1f7aa905d2a51a2f742d35ec3c38379dc2f87a4b318620155d1abb20d133bdbc427355