Overview
overview
7Static
static
7PhotoDream...md.lnk
windows7-x64
3PhotoDream...md.lnk
windows10-2004-x64
3PhotoDream...lp.chm
windows7-x64
1PhotoDream...lp.chm
windows10-2004-x64
1PhotoDream...ce.dll
windows7-x64
7PhotoDream...ce.dll
windows10-2004-x64
7PhotoDream_ha/iis.exe
windows7-x64
7PhotoDream_ha/iis.exe
windows10-2004-x64
7PhotoDream...e.html
windows7-x64
1PhotoDream...e.html
windows10-2004-x64
1PhotoDream...��.exe
windows7-x64
1PhotoDream...��.exe
windows10-2004-x64
1PhotoDream...��.exe
windows7-x64
1PhotoDream...��.exe
windows10-2004-x64
1Analysis
-
max time kernel
0s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:33
Behavioral task
behavioral1
Sample
PhotoDream_ha/@收藏!.cmd.lnk
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PhotoDream_ha/@收藏!.cmd.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
PhotoDream_ha/Help.chm
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
PhotoDream_ha/Help.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
PhotoDream_ha/appface.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
PhotoDream_ha/appface.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
PhotoDream_ha/iis.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
PhotoDream_ha/iis.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
PhotoDream_ha/sample/sample.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
PhotoDream_ha/sample/sample.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
PhotoDream_ha/soft2cn汉化说明.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
PhotoDream_ha/soft2cn汉化说明.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
PhotoDream_ha/智库绿化程序.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
PhotoDream_ha/智库绿化程序.exe
Resource
win10v2004-20231222-en
General
-
Target
PhotoDream_ha/sample/sample.html
-
Size
5KB
-
MD5
215be643e7d7bedf18bbdcbd6226152b
-
SHA1
9f7b5ec98cb21140914ede3e18f3de1ab7b7249c
-
SHA256
29268da4a4f88dac6383cb9367dad4bd903c2c5b1cb936c96bfe311b16855059
-
SHA512
9fdd7a47b46109bed0ce7582ec3212e997848e0c880f83ab81013f1c71af7f787883df9a2c593c0413dea733ab57357bbaf38d5f9f01e8d1e3115873112773ff
-
SSDEEP
96:PbIIThmSqRQ3vJ5ZGgfSIACJMuU2ibAjrwT3kHVQzebVyfuVG9WavAAj7KBd4zye:U4hmSqRQ3vJ5ZGgfSfCJfpibAjrwT3kw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69E93121-ABB0-11EE-A80E-FA7D6BB1EAA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2616 1656 iexplore.exe 16 PID 1656 wrote to memory of 2616 1656 iexplore.exe 16 PID 1656 wrote to memory of 2616 1656 iexplore.exe 16 PID 1656 wrote to memory of 2616 1656 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PhotoDream_ha\sample\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534c365a76162b5b5871d69a8e632edf7
SHA1125ef6ee301e43b6d5437de95d7a056d5171d37a
SHA2565bd2842840248f9839ba7f3230c356403b60c48dc024cc05f9a74099d7aa163d
SHA5127d5c230441c2bac41c80afd69278ed85325b69ac1c35d76cfe32e1e7686de11e02dcb484407f35492761bc3c19dfd7b43e1dde5ff6d45f0ee0b3dc3b3dfec828