Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 04:13

General

  • Target

    admin/kindeditor/plugins/image/image.html

  • Size

    7KB

  • MD5

    3dcb1ddfebd8b3769ec8e62c5c33a454

  • SHA1

    daebb51b0383ac4dccbe093cd10af1427188a3e9

  • SHA256

    dba13a8ba367124f6bc51a55ce124fe6b816b103ecae1e3199a202306093df4c

  • SHA512

    ac7b0e71b62e20009f2a8e2d5f38a67aa4919fe913ca846a8eb86405dbfa4b2982b4dd8655940c7bbf7375e9a8a368ed83fe7cdceb34dbc410d9e398f5c385e1

  • SSDEEP

    192:OIUjFD+NzYj88+7gwC09uLyBQ4rTzLsL6K2c:M+888+7gwC0kyBQ4rTzQL6K2c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\admin\kindeditor\plugins\image\image.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c16ac120b5c6283ae328d6ee4e2fbe53

    SHA1

    88034b37ad0a31cd84ac87a31445e84e4483883b

    SHA256

    071c5e2ed0b77c12b3dfa23a061263bb724365129e65558bd44ffc084bc6fce6

    SHA512

    c40f6d7f05f51b87238518fd4886628dd2b31e24339094099679ed76d17f19c094577a077494ba865071f06cfa2207a0a4062531afe1af31e0677caf1907e616

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9d61736dc6a7a0a0d96d7fa15d8e45b

    SHA1

    540abb5c30e84dd18df5dc6cd73d451a7a46e84f

    SHA256

    0b04618a04149b9bb00c8b890ce5834a339667a27cd9b2c4dc269c9f0c8d5a76

    SHA512

    f44e65c39ac65b7ff7c319de6940aa1df920015906fb7328298a66582d36a437d2996442f97db3265a2c842e7a9374dc7624067e8ae15d5096d68f3e4dc474c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1a65a9866ef224e8d379d51df75316c7

    SHA1

    7d34f0933ba2d9ce6b10a59581b606ffac2359fe

    SHA256

    e8c002deec76839b68a3912d4521008e33c0423b35946b1084f6d49c1ac1e397

    SHA512

    196c932d1e24da4511c6a0bdb5b35abad7a1f581ffe1f3c08c5c5328c38475308993b55bd64eb6e9126aab830d019ea72e5dbbaca02948d1b987fe9d58e557b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91d5b25d65693cbbf75d91218ff3a9f7

    SHA1

    9dacf59f75b856d38ce1bb5a6a85f6e765f27d42

    SHA256

    7648b73273cf19b73d8e18ea07c8317cf855fc1612045015aed0ca63cf1642d5

    SHA512

    e719580314982086a86b3ffd0660a721012172ddbba80c572299b221a4c4976ca906c32ff6839963755433bc14ee0ff68864ae6c9e00a793d6351a7dbb9cb0b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    900de4b5ed18a3aadbddd619bcce0163

    SHA1

    013419e5813f5f489322147916c5430a0fcc8623

    SHA256

    1ade3aaa390bb1b2453bbe911ec0dd2dc819dd7b937f95d51f9de78ee4e48810

    SHA512

    5bc5a552a448555c5dc5edc966ad915e8be93af789fe81bc9cbb9e7b5ed0ba448cf66d3bea84a7633cb275301a2fbed35347168430d9655d6b8d8e19813945d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa842e46d7d83b9fdd78990e8f474af6

    SHA1

    e8b6d61dea129cf3b76de5048475d4b6591aaf76

    SHA256

    06130c1ab6c2d3648bae2bd11c3535c16e970c4c86bd1bb9ab5b51a95e0f9bc2

    SHA512

    c999c7f414e0700c03167096b9d0fc7c39315585a3c193d0c35fe5741b33ac99997860819d584c1fb34c13c76714c8c4d787ad2accca80488ebf8262a2bfbfa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ba8d59c81188d559c93bce72c063182

    SHA1

    6b6c339e235bf400c1d614a6a15d5b36d27f1d0b

    SHA256

    86bfecd9e5bc71ad64938865f67e429bea3f301596de20fcbbf4089abe6125e5

    SHA512

    01adb188e82e5b97304c419047223bac6627d616baa34d06403cc9761255b6d7bd4ea03cc83a12922aabcc4ec9eb9249e70c579a22509b53971bce2ef8f0ba16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1db180b81821a445cb2dc49c3be05758

    SHA1

    322904765085079306117b0d366b49e28fa9f7c2

    SHA256

    331c865dbbb74de25303e6d4f422bea7981a819a9260222bdac8d21b13da20f4

    SHA512

    94a99bffc3b679a043d10f34c9ef71a18ca9a26cad41e37ed03c957e3f585a41cd6242d8e498b95086ecf8c440f0c67cf8025630882aef2bb9e3f2a266f5880d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5296fce7e91da328095b68c4df38d80d

    SHA1

    b80b3997d11ff7e0608a87dc2076c8fe27ff6ef1

    SHA256

    8635f2b6c4bddaf6a6bfe80b7a6d71a4db39b0e8c732f854052f5483f6c0d049

    SHA512

    27d6df42fd9e117f205949883fc7b3d7dba90df1f0443233b58b138f5a9061b27758562ad159c2a2ed04fd9d592ca0f454a926b51357d24fd355ace8e25e4af7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78f85a505fbb090d59ced826b0549952

    SHA1

    cd1ee96120bec67ddcf0e4a0da0ea04cae0cd945

    SHA256

    ce1cf8add9e169760872a342c262eaf7bf5ade60a964d34d44c554c2886d7b45

    SHA512

    d69c50c7869c8c1b2dca696e5f5e111c5e962be03b31495b4fbc49d4c9b35be3265dfaa9b958aacb8dd620d87c5ce9d1cc84068a9bc52638b827576209ed8b68

  • C:\Users\Admin\AppData\Local\Temp\CabB82B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB84D.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06