Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2024 06:05

General

  • Target

    帮助.lnk

  • Size

    725B

  • MD5

    645556eeb167d30eb4a1c88de86bff87

  • SHA1

    1f26e1f86d612982c7cbcb25be1eec91073c309f

  • SHA256

    3e773444a941266fc7b4edeb2169916314b113ba58382a5d490489edb7250bf9

  • SHA512

    b5c3db7cc107da7f5af6c92bc42575f3a4da76b608e3e655f2e27b2655593cb48cf967167dafbfca0479e85e2a10ee60510ee1deb5bfb4152769da92b008d3f0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\帮助.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://soft.yjhy.net/
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://soft.yjhy.net/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    550fcc148455d4f8bfe235ea46a1b1c5

    SHA1

    2437b7d7dd0e41edb2e6bebe8f8ec4d4033dff3f

    SHA256

    0c30b8bd0d32f4b8c9d7c91b8505eb110851c1fe227a552717e277163e63ed13

    SHA512

    2cf1e6ad7d06f370a1eba775e53bf7d5d84a4078aba78d69027eec46e110fde75dcf5203e8a3006076608fc2f87c144b23bdb062e43c190c5740ced485c07dc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5eafc3681de490fb3f53595de595dfe2

    SHA1

    c259350c936bb68f0dc056d4b17d5de834dce03d

    SHA256

    ecb714476f91bdba109e66d3ffe8ab02d57b18defbd11a40992ceaf3d887aae8

    SHA512

    e2fb93968cf0c9d64f37aef7a702ee8d4cce4f67897401f238f61056274f8833642834c8a16f45e328e21af297b0be4100e48e7d825ce2d96e802f739d9a7e67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1991f26b966a733574e7444df25dcd80

    SHA1

    a6bf806dbd3aa6e3547929b834dc14709c0dfacf

    SHA256

    f1ba0b85385e0b2d8bf6178d82bcde6a7de054e00792aeacf77445c5be5573aa

    SHA512

    7509d1bd60de3c891e38e3b260438231ac23ec321e1ce26e8bbb1a0e3f0332ad173b00b93592a9a7403e7eb5cdf023212d1d2f0b300b15af0eef034c98cc9e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b4eda6c70026f6fcc0908de90549eeb

    SHA1

    d2e939ab0f5be2053e25eac28a9f517d56c6bca8

    SHA256

    c5b0bb805099320ac00925e47aac68b18ec90cbe195a199ee116e2703f1d5a3f

    SHA512

    acb4a2606df0c97f9359672de57887de49ad05d41b22488320a7e74b775b67b10279b8d0bf688d034fbfbff15c10a135e52f949befd4797fbee23c893812ef58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8fca8b69275548053a5e60bcf21fc447

    SHA1

    264e9871b7d588ba84461dade8dfa9786f16e4a0

    SHA256

    ccbe8e7e30a573fb5904b80955c1ba441ec1577de570edcfe906b42774515def

    SHA512

    aefdf5d4a738e661bf9ca2eb09bd348e3d4f1f4e67b34fb3bdf89fb65a40e4716127464da34aa8cedd2ad6f4d5505d0be06f260d975be79dec6dd131b7954051

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b974860f9609ff3d494dae610531ddc

    SHA1

    1703b38b677d075fac3939cb2b23b9f0628451a3

    SHA256

    35579149a2f42b889a858fdf6a9a0ac4c21e82cc57295cbd8ed947baecbdf46c

    SHA512

    478183e64f52b9666b130d4d0c559b6e6ed32f179d7b521bda1b17fd2dd6ebb9328b84665be45962db1ddb92d292ca6b1690ca8aa50cb0cf0daf3d96d514ddaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb5c466d6651ca2c859ab4654440a3d8

    SHA1

    32666e4800de9b711973ec9d448e78814f6545ca

    SHA256

    6265958e6db9abbabf6831437fc81ba879fd05bdc8f31bbcd93ec1186af3dc2e

    SHA512

    95c6df277f42616f3944dd1e0903cbb6bd275e7c31b9ed4f86b8279df1df4b25ac1bb2a21d1837d8df2d5925108bce490b118aa5b73fb245398c73b07a11c674

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0bab9a8368a083ef3191099e80339b9

    SHA1

    4150e2d7db659b66c18e4dd9a154ecc018d2ca35

    SHA256

    d599796e2ea99cf0d6f50abd919faec5c76fe37be680df5f9b30427bd57f7d8d

    SHA512

    9763212f1d4996235c75aed189d081722ccc0e6e3dae65604c620aef273f7172dd089bd4432d827306cca5eb35dbbc00554f457d7b2989e2df6dfe77d8fff3c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86f6ba6c0b2b6f2cdd1d593376825712

    SHA1

    1f8e9cf069e7dac415cd933c4da1ba8ceeecdcd2

    SHA256

    46f27d6ab7d2d87b7c22c56aa91f3da46ae52fcab240d62036854915117e61a1

    SHA512

    21e94eab96b047e8f2c72542d0ad5638069a765de8176c597e8341a08958ca60061133bb72431d349848b23809a7b3be60075d820c8bff0148dd7c7b9bec4ea5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee23af9fe80de28b9fd21b81a1c740ea

    SHA1

    69fad1f2b4b3bbcee9eb98f03532274cd55b31d1

    SHA256

    d08fed9d0580eb58ef321118951598b873f2f6d81b033ecb1b086ee92d280d58

    SHA512

    d0f0044ee4f863b6c05f81a0c04de2635faa5d392deb79fb21425edcab06ecc300608d63b0b16d52811373dec9bf3e5e23fcd295d76eb7fa7888e2ff84d4ebb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6aedf91fe3b38f62828e5df01c267b2

    SHA1

    ff32c1b74f7bf94ae57356142ae5691327f81e96

    SHA256

    0381acd7ea07a13f31ef27f5d6a4adb254a09c87e713d35240d13267ee7628c1

    SHA512

    455016e83f36c09bd88a7769258db823fc68fe3eaa1ce4c2b65c31a970a0148d399fbeaf389c08c919d5cca2e74a8cd959f3c077487a71744da67da0958a78bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a385330e920a841145fb47aad9e52d93

    SHA1

    9e7bbfebc27d4280f0580cd5af5e0ac5d38a9102

    SHA256

    417d298af43f431830f1aef25ce5ece8db2d742036a8fdf738a08da1910d09ff

    SHA512

    be3244d62485f0bb313577b29f682046ddedf63a7da37beb86676978ca88b15f39beea25f6101264f0e010ae28f24592b2e13f8ff0444f6ef1cce719b5bff7fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fb3b67423ef571a768cd6f644fb311c

    SHA1

    5307af19943055c43bf469a87de2c7bf6d5f8ccf

    SHA256

    5c77f97c7c4771d3f352a0ace271a5602496018260687e9fd073fa8b8ad8979d

    SHA512

    8ffd159488ac4368f29343cbfebf7e24bdfe2ebcb48ac44b1b9463ffa3c6c47ea9bfe8fb9ff558ff889909c7c765bb35b87b005742ba2c0227c7d59b878fa601

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51a291d9473f063cf77db7127a657449

    SHA1

    3ece50e8c7b8a8ca20f274fe8d272b7860c1ce5e

    SHA256

    b4728e3ff5bb9e31923a1b8f8acf4d89bce74833738a9ea281d1d8da43e94ddf

    SHA512

    33d38ddb0b6878558318108d6c2ad61267ff57514708b9311a09802df0255dfabc85d5402814808d2b51cf33da6d2893ba94437c8ee7f69adf08c29c56097301

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d8cfa7fd471da5ce22471621a26bd0c

    SHA1

    68212f812d5bf5e4a64caa93ebc05f2260ce1e27

    SHA256

    6efd7feab687923025972074b01e10c9cbfec8d939165a0470d3f03d54707d6c

    SHA512

    d5fb863f0b008ad74938ab52ae1de5606f571d2d2bf61e7567f865ee092e1ef05d2d38279c2568b6a457a9c81222899e4acd6bcec3d31f832b34651b595e44ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c500d2a10b366bdbfcfc765e7ea9384b

    SHA1

    6be76b92f100ded0e088dc590d16c4db3227959c

    SHA256

    ca8ed6158d31421d7d277a6d9d4d3c5d7fb2f430029a7371e670548de4c5f432

    SHA512

    de073f0f66926b449b49f4379f6a291f122de9907c348890aa541593a8d521bcf114e94aa370fcfac15d4ec35e8d6851a0222938561573882686066933fc480e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4afc52b4343a9afdd1da600191ab19cc

    SHA1

    7ca1fd6df7c17b2aff435e396f593a1371c50670

    SHA256

    aaf87f715c067d0e37fe24186319466af065b6c0476592a58496407fac1ec774

    SHA512

    b45eec2f5cc9729aebcac677c65575732353ff7628cb8640782d5dcf82c659c7112217eafef8abc78c3b95b8699fd8b6e8e86e3e55893a90d41b3f1fcfb90f7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b81b39267498cf8626023e67d49f229e

    SHA1

    94c046e8e55207cfb5bb3f35a7368a8bfd0102e5

    SHA256

    b078ed39efe20b8aeaa3fb23e8d13ed4a54dc839e77817277bdca3a9aaf49920

    SHA512

    8a501c22204ef46ce6d3a68c2f6e4edebc72eb33a6712196ed37fdcd06c75221178c6c25f168ca4b19f4bfa72760f7c0b89a580b08d4c5ff38509331a50ba555

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7991922c4639b5b100373dbdd9c0a26a

    SHA1

    58ce67e4f9176f0fd7f25b3ae4a2da48f457e63f

    SHA256

    857e57ce323107433e136240bca5ed0a8ed29feb1fa6facd0abf8c82539f48a0

    SHA512

    09789285059f0c176b9e48e979a183795263ba751b507ff8adaeee78d4bf35203c8ee8b337cefc0599e46f98cb7802e892620ec3bebf51e371812492f2d20a87

  • C:\Users\Admin\AppData\Local\Temp\Cab45AA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar46D6.tmp

    Filesize

    69KB

    MD5

    59fcdb0fc2cf6361722e5d902d1ceb8c

    SHA1

    4087e01c1c0ae3803a6b170a14271f2a82f32dcf

    SHA256

    78d723c5bc3888eb8715eb431c0a73f6a339bb353d4cf99b5e494e00bd83130c

    SHA512

    819fe13ae3c71155bc33096510c3ff23dde48d4c17755a614ceb11087ae9c7077050dd34de6ef64d3f549378475a789b22658574504c79855553572f9216c1eb