Overview
overview
3Static
static
3mtkjw/HtmlView.dll
windows7-x64
1mtkjw/HtmlView.dll
windows10-2004-x64
1mtkjw/eAPI.dll
windows7-x64
1mtkjw/eAPI.dll
windows10-2004-x64
1mtkjw/iext.dll
windows7-x64
1mtkjw/iext.dll
windows10-2004-x64
1mtkjw/vclbase.dll
windows7-x64
1mtkjw/vclbase.dll
windows10-2004-x64
1mtkjw/必�...��.htm
windows7-x64
1mtkjw/必�...��.htm
windows10-2004-x64
1mtkjw/手�....0.exe
windows7-x64
1mtkjw/手�....0.exe
windows10-2004-x64
1Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
mtkjw/HtmlView.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
mtkjw/HtmlView.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
mtkjw/eAPI.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
mtkjw/eAPI.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
mtkjw/iext.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
mtkjw/iext.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
mtkjw/vclbase.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
mtkjw/vclbase.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
mtkjw/必看说明.htm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
mtkjw/必看说明.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
mtkjw/手机多功能定位监听终端系统R6.0.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
mtkjw/手机多功能定位监听终端系统R6.0.exe
Resource
win10v2004-20231222-en
General
-
Target
mtkjw/必看说明.htm
-
Size
5KB
-
MD5
9174884f5b12a55f6bb35ec48ec818ca
-
SHA1
4f8cd9922a00e0c6ca4ed1b1418d81069dc36d4c
-
SHA256
29feef00e78c042896602098ad1f51555185ddec83b107e1c606019270ad9d9f
-
SHA512
cf35ac9bf3e14f16b0fe23a6cdc70153da31fdd1ee1ce05af61dd7ba68042a0b5afb61b3ce6f5d0f89c5decda69eb49fa3b317ecaae3d16a97897690cbb41987
-
SSDEEP
96:eVgWlXZktTuDndkYWuokAbVXHISaQN1exgemaQNA5FaQNGmaQNNgA:eiiXFDzeXdxfx2Fx9xP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{969ECBD1-A287-11EE-8073-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409603255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000552040a1f2899814d0fc1103e5043e2b6acf9818f8eb05767896e7e3660a854c000000000e8000000002000020000000bd58c79719fc333cd3891a23662552692ed29633831f34ddae9f36d76662103d20000000f0766e924fb9faf540f70d6357512747bd31a71de239bfd7b88696324358c3ac400000002ae5de6e2841f8b5ff29dd94ba4ecc909f63f788b3b544636dcecbdacd2ab486e1a9d5350d6446cf1088092b027cd348a7999b4abc4f0e076a10ae28282151b7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80df31819436da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2156 2252 iexplore.exe 28 PID 2252 wrote to memory of 2156 2252 iexplore.exe 28 PID 2252 wrote to memory of 2156 2252 iexplore.exe 28 PID 2252 wrote to memory of 2156 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\mtkjw\必看说明.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3abef6612b6f86545ab63d6e720b274
SHA1e2263b9d7168ff079ce664f8e1dc509cfb24da3b
SHA256ac7b468c1a69e67175a0148a9a12478d798569a78ba5babb26014ad98f5e58a5
SHA51212e2ec1aa3267183214e135e201cfa2134787b529ad53184034937db7f6650abc4622f9b3ee82133d551f9de781f6d9b5d2863e68ea76fb82167800e762710aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4ce4b9a80e22fe4c72a2f7e5dee7b9
SHA1b601293fc354b8eb94873359232d8782f91a2abf
SHA256c05c3de0d6ca2cdfe2bb804e43ac6f25534ca9fce8bc00a8c2cfa9bdaa0b617f
SHA5126d5f075b32680ca4f2b57a753ab5a0f8e36725862f26dd01cdc38eb92c72c8702f5b254c851615b03aea1c28064a36b0cde19a69239ae0710234474a67f2365d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589bdaec947e54d2a5c64b4b90c235bff
SHA15fbb22c735c8fee773aaf898874ef027542e707d
SHA2568b7839b86812cadc1c7ca88eef5a390ee814e4fbea2a508306298ac02ffd22ac
SHA512913c6518fd0b0cb21108c7f0b5c833a39c10463f6b6bf20e3f4204f43e99c2cda1526f2bd21eb67378a53156e05aa52f08f2c817d689c56ed8d11232ecc42033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2cd9625ed508fb675e8a25f3eb2fbd8
SHA1cfc56c6dbe241064a3dbcd5d0f84247c8cfbdbe4
SHA2563d92c7423c4ddab3803ed14cfd954f3520a1b903ebde31f56532a4d3c07706b9
SHA51228283a5b6d1ea74964f050a4e5b9e48dc897e60e3404013b34051b12f9016b6a41184272e9e3f2af64acddf1ea98280805a3f88a90b6c723e772e18ea6339975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515720f7d11f9c68a7cd45c256aafe64d
SHA1eb31990de6fbca9ab3ae199355a597d8d81393c5
SHA2562f4a8dae06a7de0e18cd264ad31b465b5b42bd3d44b8ce3eb341ea232c5c9a70
SHA5126cebde8ae7fb67da029c97db7dc42da3f1f154b38817d74de8d0ab01b73c5ae0142c3f51a265bb7b8e5dc43f0cd72ed1ced63131a0100d7e0a6a32c106f6ed32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc936c9a303acd6e1c771fe36d2ad3c9
SHA18497cb6fd98ab1d0717ad00357aa196e96902210
SHA256110fd371b76c5b4a630c2bfe11b11b9fdb4c1ad048983dc7dc7682ba730e4c5a
SHA512bce893688a411063cb4e3293ba5339178ffb77ea8420f997901c8c92748d984e592b1d06ff85ae38739f7238701be837d5308cb06f5c776ece1056c73c09768d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d263c03e3bbca4f798b48927622c8c63
SHA15b88d7651c5b20f79d11a57a466875e6030082fb
SHA256f360dec30bcbb686604a9f81e677df51d3e752b9e91f3fa7af4eeb2eb7fc1c9f
SHA512c79482a613b50c6e72b4a794facf5d99da2b3e2989b987679a0945e7028ac7f7afc5559783712ce3019aedcfa4fa143573550c7cd2d86e78ef86ad1c268e7c27
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06