Analysis

  • max time kernel
    90s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 02:20

General

  • Target

    iiswall/help/安装手册.htm

  • Size

    9KB

  • MD5

    81dce7c8d777d59979a34229543d5f49

  • SHA1

    330ef17b01496500c607f329d3abce062f061e5f

  • SHA256

    1e4db4144846e88f9b4dc3b472bc786c8a928a78d74203781f28dbf5ac5a40d2

  • SHA512

    fa49a798034785cc957f4e752b165992ae1e29429cb916fb3dc5d09027afffc07059bfcd543c101ccc99eb2261799c68d460f21a48dc12f0525e30ae4db1b739

  • SSDEEP

    96:IBaoJggwRsSwGgRg3ChGRgWUs8JYWp9Uy2d38IC2JaR4tR4X8C8V8hP8ld48GdVJ:brZ09gNcMTueNFhaM9++Xg8q+lFg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\iiswall\help\安装手册.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    cb99b6d5040641081530ef8f6049f1aa

    SHA1

    3fa9e3148cbee0e561da3787919043483ee5e5c0

    SHA256

    3e1607026f332ae19539f0621c8b18c820245d196febf8bf258253667ebc94d8

    SHA512

    13cdc5995fa4741d474c00491ea55b26101a88ee3495327950249e8bef1e16de29f46d0c1ffef3682eac0e041f0b06545d51ef8152a33606f0e13fe35e6a1d83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    a839ddd06abef9095431b0150ff530a3

    SHA1

    c4d5be45b3eb0b7bb015f70ce31a131ad604d37b

    SHA256

    9632bc747cb66cbc887fd00fcc5a42ec7400fd08405571aecbd867d4ebe875c4

    SHA512

    d2e4670da705bbea88e8a3be2a0cae310e25ca17b936adf4b30803f7a043ab098a6edc0954edc95c3e887a0f13c794c8b9fc2c09c9ae913df95f10f32be35e28

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee