Analysis
-
max time kernel
20s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 03:31
Behavioral task
behavioral1
Sample
gensmnq/gensmnq_ttrar/gens.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
gensmnq/gensmnq_ttrar/gens.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
gensmnq/gensmnq_ttrar/kailleraclient.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
gensmnq/gensmnq_ttrar/kailleraclient.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
更多下载.html
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
更多下载.html
Resource
win10v2004-20231215-en
General
-
Target
更多下载.html
-
Size
410B
-
MD5
7bb7ae902ffeb8c37fe00b88fe68c1e7
-
SHA1
c839f12d71b57aafbdbd7bca481e9438e8801579
-
SHA256
8d518dfe520c4464fe9fd28724ae8d9700ab0a6e5a648f9be8a85a526b095c87
-
SHA512
46ccd91f2d826b19b272c1440b5f8ef7c96261e0ed8cc40d064a0ddc547400e8c35831280999ab37fb7df2a525c8c88d1d5f3e36161b0b633249c7f226b66803
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EE4A19EF-AF68-11EE-8024-CAE9171F1CAB} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1272 iexplore.exe 1272 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1272 wrote to memory of 3740 1272 iexplore.exe 91 PID 1272 wrote to memory of 3740 1272 iexplore.exe 91 PID 1272 wrote to memory of 3740 1272 iexplore.exe 91
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\更多下载.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:17410 /prefetch:22⤵PID:3740
-