Overview
overview
7Static
static
3Images/新...��.url
windows7-x64
1Images/新...��.url
windows10-2004-x64
1RkSrv.exe
windows7-x64
3RkSrv.exe
windows10-2004-x64
3hrk.dll
windows7-x64
1hrk.dll
windows10-2004-x64
1irk.dll
windows7-x64
1irk.dll
windows10-2004-x64
1jpg.exe
windows7-x64
3jpg.exe
windows10-2004-x64
7使用帮助.html
windows7-x64
1使用帮助.html
windows10-2004-x64
1键盘屏�...10.exe
windows7-x64
1键盘屏�...10.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
Images/新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Images/新云软件.url
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
RkSrv.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
RkSrv.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
hrk.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
hrk.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
irk.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
irk.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
jpg.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
jpg.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
使用帮助.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
使用帮助.html
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
键盘屏幕全能记录2010.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
键盘屏幕全能记录2010.exe
Resource
win10v2004-20240221-en
General
-
Target
使用帮助.html
-
Size
8KB
-
MD5
70b9a1d209b3bf2536dc91c6accf3d13
-
SHA1
41aef6f617e7e6a8a9be30f9e55669909f9c4d46
-
SHA256
8757516fc55d7da58772fcafeb1bb33c25adcee0fbaebd0d74d3b53b74189d98
-
SHA512
1407d4651db36279699aa84a3678b4a9b4a187aad852b75764bf45d945e44856173d352fc40ba553aeb5e486c7fce395ce65218738d60f958f682f61a46d2b8b
-
SSDEEP
192:1iuQAI4XATSuDv9l3yH82LsjC4p32LVpKTiglFZ:1iuQl4XATSuD9l3qICs2LVEiglL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05e07dc0c67da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414932625" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{078DBBF1-D300-11EE-A564-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a941545d9ebe68f47798650613cafecd890624e12fea35032feada1fcc24b319000000000e8000000002000020000000174f8e3c80644098bf47cc00863718a5777b5efb5c2003bd2453079f1d16ec6b20000000c46f248ee943939faccd841e490902002e6640f8beb6f221be002b3cd59ac5804000000094dda409f498a55099aff996aea5ddd24d7ef15db44961842985c79088dd0db9e2f6912fb8c86cfa4f760d120aedabc557e5f14a39b716c01492508d3a3cea3a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2468 2188 iexplore.exe 28 PID 2188 wrote to memory of 2468 2188 iexplore.exe 28 PID 2188 wrote to memory of 2468 2188 iexplore.exe 28 PID 2188 wrote to memory of 2468 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\使用帮助.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5732598da9c360f51f1fa03399403a
SHA1dc0f7c82c560ea352f84bf8283fe151a89b940d1
SHA2563c8b1688dc511a7945c40efc9b51a984532267cd73dadb07da4be542a47dd3f0
SHA512749830e0b98bc0adf346f62aa7e6c2c1f10a2df62d8f998feff92b2eddd9511998f42e85bd28a3ddcc1ef40afc625d7cbf6564c338c1c6228060fa8496a4bb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5749980e123a036c0804223d1423eff63
SHA10ad69398be45fb3955773ef4c24e7f57aa5f55b2
SHA2560099dd03d2235ee1fa7c3294ff97c76d72fc0b68d3eed4e556f2f681fe29bb66
SHA5124c55708001a45735767f55f298a319a911622a19ffe6dc3198c0b2c13be70af925a76903e47d278308f4c503bf2207235f2d1acfe8b9bc0d9a803945642ec089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ae0fa25f554667f2ca36581b5e2afea
SHA1dc968ff2c64e5b26994e35a2c7d63beca0bd994d
SHA256812df719bf3cdda69c0c134ed65f5c2ec7ce1bedec0b558270ef31f3398106c6
SHA512df8acc23e2be4b31bc82cc88d299fc8b4b352dd85b3d25309c87decf7efa3b163162b89eba520b1104063aa51e9adf8965c2b68c86254a29e1f8321472114a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bae1455fd1f205402ad94e8c9900653b
SHA1e30e207a538c3d9603413550891f67793daeeb88
SHA256147bf4f8e156452b8881a9280861c60e92320619e264bd182b329621d64c4561
SHA5120da5aa2bc47309789652184fd39de8fb0fc91368cd3c0b4e09b22932d94d60c6d1f08940fca3f87abe7a157c0acf913f9dd3f52af06520e654a3190d8997c956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5980482e6766bc033a02cbb3731e54fe0
SHA1bd2a1d0c4d58340439e76be490e874ec2a324824
SHA2564549b00bab66b4daaa495e24f07094db573561004edf98f7855af34e6e54f35d
SHA512840dbd0b4af698261b746b77685191f0a147f80fd1d910a7f44f557effcce8f862db7caf32eba1072ff3b079908bb7d86dd8928564c2cf7f471930b4c369630f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583ddff2e3f18822877df38d334a91ac3
SHA1828b7d81d4fb902b49ecb0e65d09f44ccaa897ea
SHA256f223cb35042bdf179af24a95f1adb30632c1c2da3a0dfcdd4bbfd9dd4c14f0b1
SHA512eba4759c408139fa724204550bb908c6e1e7f4810553991df39f3b83375bc6905da11a72cc9504d195d818f056b8692057dfa073c36a8d5b4023ee3e175f998c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ff0c9cebf5deef558540e8104a8074
SHA15593932817e860c7b0a1936594fb81999d89fcbd
SHA256e7f903a05a697465700df8e326078804990d21f1f1d13f9b3ea99d2bd5b69b4d
SHA51269feb51720971397b4c6ac726b5082962033a35539d54f1d30c866b1fa3e2cf32abfdf29e47fabc33cf91665ff99c6194837230bdb8fc642dc5dd5fe0c226c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557b567b499dba38b260e5cdb4e6f1155
SHA151472727cac8ef549ad1ed87c687aee8a2126658
SHA256f734effba2845a7dc86b88b3ccb5bf0d867e353c726668dc7374d022d4accfbf
SHA5128bb082b23ccb6fc08cdf6271b5080a23b501822b95f1bded3890f6a9a5169570f73cd6d1d4634ee758c52947a764a322a8af909b511025b5e283e061aaee848a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598de47000db5811dae36a40db30cca06
SHA1c657caaf805c1e31119fafb0540bfedff32bdaa7
SHA256daa60393f2e3d665023bc85313bea1a33a2a20d0545871e22b7ff685f34e7882
SHA512e96b9f93326571e42a5426e8f74370598d16f66b701b6712ea85ea5816209e838f2af140be5462f02ba0ab2eaf29870b7f49db0b23c58e70c061f02e8e376e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57134d7670e796d78ee958e046091c6fa
SHA196312b2b61e227dddf283a86847961cf652ad508
SHA256eeae941fa59f5952d5529f12b9670f57202f57227b302daacc38b85253aa02e4
SHA5121e4da24b77067ab7856fa50330acafee45c622399f33b3a882768f7127910d06761a48b8e90e6d206418ef15977bdf0c9dcd029bd41a38328a08fe5fbe49211f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de2f19e23ec5368a8354a5defabe4772
SHA11c1e9d267425cc8fe815d13aad56cd1ad0ed401b
SHA2566840a629d7d9c8d1a80441094daaf018f20aa73725323bba900f9df11b0e21ce
SHA51296befa0c0620c7d609f11aadb7ab45e53e2a3a83719a7ece7ca8bad42a540dfb323a7e6f151aaa1434436a6d393e177d2e28d31a6db8845ee551585d243fb72e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06