Overview
overview
8Static
static
7QQ聊天�...��.exe
windows7-x64
8QQ聊天�...��.exe
windows10-2004-x64
7卸载.exe
windows7-x64
7卸载.exe
windows10-2004-x64
7在线升级.exe
windows7-x64
7在线升级.exe
windows10-2004-x64
7在线帮助.htm
windows7-x64
1在线帮助.htm
windows10-2004-x64
1帮助.chm
windows7-x64
1帮助.chm
windows10-2004-x64
1新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 21:40
Behavioral task
behavioral1
Sample
QQ聊天记录终结者.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
QQ聊天记录终结者.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
卸载.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
卸载.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
在线升级.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
在线升级.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
在线帮助.htm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
在线帮助.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
帮助.chm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
帮助.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
在线帮助.htm
-
Size
253B
-
MD5
09ca99497be8a000113af16dfb97be11
-
SHA1
b541e448590c8a40a1eaf9742c1016ab20a95a58
-
SHA256
f40840743524ce35b679e5538c4839455f45eab9d082207c8270b98f865c179d
-
SHA512
50fc84db9786b8469ed14afc31497c6bc911b06d3e464ed3a216d393d9655814b416bcfcacc5e6deb40fe645b67f11c0ad23713721c91106ffe5d28be5117d2b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000007f01d9371171113f7ca42dd37383036f637a94bb69fe7e358a0ac3966f970da9000000000e8000000002000020000000d19445df47da195b2c285476be4733e2eb2913712003a50da0584a23fb2318692000000037e60ac5a4fb3b317be341ccecfe442cb28879508db606e4375531fddd5513ac40000000d6dcc31210750c5f16fa276f581c67902f5ce32981a352893d7b672db36bfa1dddde5c8b0858e90c00dd0474cf0a65386ceafb2e2b62c2e848c8069be4ced14f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05b76baed3ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F657E2C1-A6E0-11EE-ACBB-46FAA8558A22} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410081435" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2012 1732 iexplore.exe 28 PID 1732 wrote to memory of 2012 1732 iexplore.exe 28 PID 1732 wrote to memory of 2012 1732 iexplore.exe 28 PID 1732 wrote to memory of 2012 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\在线帮助.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c84105db7f01b45e339e45b2b0cac005
SHA1b0cb52d5c6998fb07710ad0f605ea8b0bdf9b296
SHA256e15dd7fb6a038242e5cbccfacef51db651441c5e622a30f6c4eac04aab3236dc
SHA5125fc16d4029a1632585b9a7e031e7e5dcb761d172a0e26b21bf74d3fb4ce24289f938f8e3041b13af9cdf0dd570fad774e6ce2a945b68378a804e630163573fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9bf2689a07cb0ab0c0e4cd4d838742c
SHA133e257f153e549c955f317e2a78bd91e23cb6286
SHA256b6ecaf7a5627f31013000156bc1508733cf5f2080f48827780e9b65e71478a5d
SHA512c165dd66e8117b0474c743e09d9ab04e122c6804ec2c466c9f043df6216b2549217700acc7c568e7076b9b5f7419fba6ba21c4843d3f3a1d805b2a9d3b3b7006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d36edd198076ea0d0f827c46d4f70e54
SHA10e79dbf7ee8fc65be15fd2775625ab24fc465492
SHA256399c1415ad23ecdcdf222b3ab855d2d2f65228fdd020387a5fc6f9f5d9f59556
SHA5120b787d654437c3ff9fd87be045d90a8e70eac3a785e8392ce2ff2f82de00f2b0ffb40c30cf6785d8fb07cd111bca2f2c93925e6faa04d4de71b2532490e5c32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53469ac5f2183f4d2e850469a2fc75a70
SHA1c1e4a0a8b321446531b076c6b1b263f3a3de15ec
SHA25614fa91d30fffd890f81dedbadb2ef8652f1ae03399ce60ab845f512bbf91b0d5
SHA512f7a2a2966e671ebf733ce13ee403128afb0833613c434e6120b350efbb026300eb2f61aa93b69ebb0ee5ea0c8709aae421027528c7580cfc7be31fd584df7b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f6f38e8862382c660ad864ba4ecde0b
SHA1491c9e385372c8d4567905e590dd47e00ed236d1
SHA256af35ae98e03f0a8926695ffa9ff3192b80cc979db7b7b9750cad90801ce9328a
SHA512acb882d337be88beb34bc9d8fb6bb269f4072b88e2f9fd9d17771b9f2d3fb230765297351a1bcfb18f157a1c8c47bf114827152f09bc167377ff1074e2b45e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d52b993081b71a298c408854849b758
SHA160b782a251e0b20561a62ab2f7aad055074a17e6
SHA256b8a968a7bdd98195f922d2f7619e90d96ecd1a381cb1023ba4ac4096a7870182
SHA5129d7ef18b07236dce510b063788426a8defb86f69dba3ad0d6676252151236ed1c45e9a941696394de15ae3584666defbea64fbe063291ac2499765ec5a5f310f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f5f04c9a7a3b8abf4faea3c4c0f3efd
SHA1da0cce4c5fd09c7fe7b061287e5881e89b4a906c
SHA2566e140ff14c676caf19358e377a836cc5005a44730cf1f2191e9c8714d10fb109
SHA512c4bcd05369b0a60e57ee529bff22d770c998c5ac9cecd71e4691dd99dda832c491aa81901b613d25f58554979b4b6e3e3a59420d4bbf06fe67ec5cf512055bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c34b60b18a336b377e4e0fa1c7af795
SHA103d894ea404b5e04dea3ace7be1b28cde096f29d
SHA256d3c75bbffff8b173ba009da668dfdaf8bb48265b070afffd506851b527cc6073
SHA5129dfe2ab531cb40a39d8df974efd1faa47624e67921943ae8d7a1b2bc58d2e80317cee1d5797ef981fe64db9522060a0297eaa0daa2d3caf02284beab06c76ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3d8d30b14303ee049e21ef1162ec29
SHA1960d17303204f92d8ce1ec16a861fa42406b4c0d
SHA25695ee4a30c8d130137c4861a0cb45ec286656a3fdb803f66875b03a1c1a1b51fd
SHA512b62608a43555ce015c1672cf3c54ba0d30675ef6af94e307775d2941d7a8206b80d1d567a9460b06c6063b2d4cb7a1aee962b79f4299ce60d8292f84b6fe28ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e5676281c8a0f338a00aec5fd55248
SHA15919a8f4380cdafdd7245b7d5f39765c43146c99
SHA256dafa44bce1227293222052bcb694eeddf0c3af96d4595208ac5134f91f85a4ee
SHA51203df175e9a23617f7904e4a14ba22abf04b3a9ca8858334cf58158a58bf303b4041c4704904911614407de80b51b479b9a1807a3c726c6120be6fa10223212f4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06