Analysis
-
max time kernel
134s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 11:22
Behavioral task
behavioral1
Sample
wjj11.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
wjj11.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
使用说明.htm
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
使用说明.htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
小游戏.htm
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
小游戏.htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
常用软件合集.htm
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
常用软件合集.htm
Resource
win10v2004-20221111-en
General
-
Target
常用软件合集.htm
-
Size
88B
-
MD5
5967ad35d7f881dbf791d0ed77426d6f
-
SHA1
3f1402ab9518330034a556e3e49433ca5ce6fe1b
-
SHA256
cdbe65a81ff04a5a6412ad0deea549418e22fa3207a7ad94b01172d1ce69aefc
-
SHA512
65ee6b0bd1fa9e902b7e3803eb714ce5443539ca780807082bfc84cff2364a44e2b82a446f838fed88edb3445b2fc8e693db0a80a877f30f76415a3000ee3e56
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000d6b1c7ed2c42f1aafb507efc8af903c1f8d15ebe3fbfaa1e5eba76b2385f08ca000000000e8000000002000020000000ae9b9bb90c71b271ea1a0586e1a4b9086bb303fa1856ad49e164c8546695dcbb200000009db066d17e43ec07e6b040dec6066106a268a98eaa4808ee88396dccb57eae6f40000000a4dbb03723c29ade74b01192aa4652351a99c76c23bd8beb11881ce0c0310704b1a49a087567c003ce7d39c2159c49f799e5a569c4ba48e1d0a6ef0ae96ce709 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376391038" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60816f190803d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2ABFA9E1-6EFB-11ED-9431-E233F62F3A57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2032 iexplore.exe 2032 iexplore.exe 936 IEXPLORE.EXE 936 IEXPLORE.EXE 936 IEXPLORE.EXE 936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2032 wrote to memory of 936 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 936 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 936 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 936 2032 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\常用软件合集.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a280f990d10976582a1055adb1358ad8
SHA17ce1207ea6c295c1e0d44c098b1e9fe5c88cf065
SHA2563849a272b82b2c62ca15c49b4965f37ad2a6c095482996c61487dd671fe95901
SHA512803d56c6e6ed3441c0174ac92a8fb2dca5e859e03c13863bbc801bdcecf41f4c621ecf4ba4658c24e11bba70035169deae4478a24649a5f2edf1b651aaceeb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54a26e02c454c034da17bc711b3f3bde7
SHA1e6eef847f6376d7476311bbf10d7dfa20e82846d
SHA25670ce0b500a248e5f3f78840d4639a552126908c17617d6fb5d35dff2d4f2c646
SHA512e91c683d9c9c26b493432ecfef396bad6e81a3fbae3d195e3ff8207f3485bd20fb61f7577e8093edd6d6f13486cb66ff910637c71c5bbd302e5f59456787f0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ec0ee7783d3439b8e662441442743f9c
SHA1033320d22d267e8c8e523759b4bac6adb65401c8
SHA256aadb9fefa0ba55cd1ac708dd538becc34e2c83e6b7be16b52df6a9f670dfbbd4
SHA5128ca58430da48a1db49656f78022b1df45efa39168cbdb7998d6c1a98b7c6b09f73fff860b7a0ac4a1f4701e3b347396c5daf6cd83707816aa1a2688f73515d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e9524a4d012cc9c3d2df73d2acfa2b80
SHA1c169172e0a82662ca9e9f311d68339614d9c7366
SHA25611f8088a3e0d5f70f721675e428bd6d6f5493818acf22c2691dcf7f36065995d
SHA51268e08561c71d4b4638d8d822a3ddafe1789f56096302d185e1e6fda9c0867662a84d07469225d498ba031cf796647819791660de3892d85115bc07d235f98caa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G2PDLNCH.txtFilesize
601B
MD59eef431a1dfe0cf993faa2101f88607c
SHA1becdabd33ccac84222a46813f0878191c9f2b78d
SHA256e244768962f87a099aba7e85b4e6b3252787635ca5ecbbe434ac76d68a237c17
SHA5125487e6b1919ddc9dc8baa56605d874d39cdc56b6e3964ec922a9f67c8967951ea438e07e1c0042d8d21da43c25b8453633c79acf7f77eaae85c2b009fea7369d