Analysis

  • max time kernel
    146s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 07:24

General

  • Target

    解压密码.htm

  • Size

    104B

  • MD5

    45ee9e459a334004af019da7bea33447

  • SHA1

    27681031731a88f213686820d8a68b73a5475e0f

  • SHA256

    3ccd7437a8ea9a8ad424f5b11fcae4b323ff29b21a1fead5c042477c36b3ad3e

  • SHA512

    475ba7b31a5e6f3daebdd7ebac95593af5dbe38eb050a01105235b87324c0495722e402b59b790fe86f71548142511de9e783fb24a392df943041fc40280ee6c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\解压密码.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:588

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          252a9decf4bc9c8931787262fdd525e7

          SHA1

          4eba943f41b5031abb5900052a37366566724baf

          SHA256

          1eea64a1b2f7b6010de294ebfbbe09579f9cad8fa3363767cf7e23b6d9d5ce35

          SHA512

          736c26959ebfaa57911f6f2c84e7038219388a1124b2a1ca6ba504fc60aa466eceed473010a88fcb28c9ca1bfcf72fe65a6d60dd78caf2bc1cc25c2be725e968

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

          Filesize

          9KB

          MD5

          5165bde59f5e1d830c0e45ecedf9fd75

          SHA1

          7a30178a60e4206dba0939b47966583212306c03

          SHA256

          4b4df294cc55f8e013748b7e5e46b0256eb946e32e4d9cf043c606659ef81136

          SHA512

          02eb42c1eb438d2b2c01aaa152b4042028da3751519451bac620733c252eade54faab8c825d5700786d51b01e0d9185cca859ac7dab187daa9560ba79863f3c8

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7JYSISPY.txt

          Filesize

          601B

          MD5

          25cb41a3cb484e669723510b61cfa879

          SHA1

          95adb39d2f43c67a2826707597a0adcb7888bc68

          SHA256

          89f7e8987a73ff83d7b67bc7aebec22f8fde7ccabd9d5b67d254b08837f1d9a6

          SHA512

          cd3c0ca651a6e1793ec5f00c47840d45b4dee9f4f8706b4e5b4970f8f2ac3213a145c4efcc75e976cd612ab3096ebe81850927a8edb8150053de3abc39c52afd