Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 06:26
Behavioral task
behavioral1
Sample
Hybackup6.0.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Hybackup6.0.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
hyhelp/howdo.htm
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
hyhelp/howdo.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
hyhelp/postbuy.doc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
hyhelp/postbuy.doc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
我们的主页.url
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
我们的主页.url
Resource
win10v2004-20231215-en
General
-
Target
hyhelp/howdo.htm
-
Size
3KB
-
MD5
7ecfcea9db032da912ad1cc1ff43a5bd
-
SHA1
81d65e278e3e1a3a96401d3c13cb53ee31679567
-
SHA256
b04ac5caf38c00b9333ae97aed744a925ceefe60eb52322aac9f31175635522f
-
SHA512
81d8729bf3c93593692adb35ef33e136873fdb80031f80fe87fbdf2cdc5bba555f572dbb0ba50eb2a9ee49fc44d667ade2ad7c2309fd31ce3945dffcd8e30ac0
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000cac2819c1338c7e3fcbfa2c1afc718f7798c5c953036f9edb06d75130353b769000000000e80000000020000200000001dcf8a2eb8bcc9fee188d2cb7778f911f99f1e59c716b28cc45304ea80eed04a20000000d2b18e989a9181caa2997e038cb1fb7763071d746589159e75c35ca074dde77e400000004c6bdc4d797cfdc21219c8fa456fde74769aab7ece44cd1fa37fe60ad10aefad63b683517c04e3ac40439da8d0c85508adc0972fd4c1e7bd3a5bd4ff52404cc8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD860751-E682-11EE-A3B3-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417077868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807207a28f7ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 808 iexplore.exe 808 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 808 wrote to memory of 2120 808 iexplore.exe IEXPLORE.EXE PID 808 wrote to memory of 2120 808 iexplore.exe IEXPLORE.EXE PID 808 wrote to memory of 2120 808 iexplore.exe IEXPLORE.EXE PID 808 wrote to memory of 2120 808 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\hyhelp\howdo.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d8bc5b9d111dcebbc3c3f80550df2f98
SHA1be29b9ac43d6c50a7d4c7ce9145ce45beaf8c04e
SHA2565861e03b50d3fc966098415bb41385084aba949efeca669c001d6a6eae03bb6c
SHA512ef1b32b46f14c98ab3b2178c63395fab4b7dcc9279f2ff2fbac040919a48ee3a3853bdb2aa348b36d29bb8019458bf58ffea0abfddcb55b17435a687f001e797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59efea2782216baeeb4f789899c5daaa5
SHA1a59072aa9b4eda57f1ef0430c58895ca0fc1934c
SHA256d75a7aad3086544241db40f6317717d9e3982bc73f20ae49c75a58329fdf9f75
SHA512936981db956d570e5de464987ef7ca8e5a29ee6880c1118a073fabb19876b4ec92b520f45f124a66461b41037298e565afa4917923984c86e9cc845473e6e60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b2dbb713163a4e14d4c9eba433509e87
SHA1a63dd1502f4c0d2934695c6e4b63a3c190000995
SHA256a695de91c2e348354a079e48a39de25542fbdd1fb6af4c39468dc56664d9044a
SHA5128e2603ef68bb59a70ba6fc21ecbb1f3dde4c93734edc7947693c994eeb0f8c0a7ae1bc78f65235edc3c398f4b8985adf6ce0e275d3f009da8e789d8eeb505dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD561f6aa9dc553806372e311465f9c5323
SHA11e201cf4f8a4b2a6815d92353f0ca02a222cd73c
SHA2562977675a6380de10464a3e36d2a2182e5d90c01471ffa9bedda777ac90fc44ba
SHA5125beec1aa94009338a9d33c1d82ded1e590cab29c5654731b6366cf3c9841ecfacb24c439f6e29047cf47142b872cac34a462576d2b855c0242fb352dcd0521fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e89e44104968e3cc4756bfef50c57e84
SHA1dbb7498bc5e185a6fadec3147def855f9242bdbc
SHA256dd1b6da0bd6d6b1d537d59cc586fd16d2698995f591134494bf27e54919ad633
SHA512ff23cc6ad8e79f8d1dda032153e04db72caad86f58ad86a1ce69fd3b790e1854d5668efac956e4e6025ccef9b1b68b936aa29a07f60c91496d33710a63708d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD516170fd30f36d75b67f24e59cdf9f704
SHA16a727230bca71b0a60163ecf64a496be1864eba8
SHA256f9af8d3353eba843dfd83219bb22025e9de94cd931ce424ddf37531c4087e1ea
SHA512c8f30c4842d21c059ad9953bc2cddafa86e0e559b0478f0e93c992a4c5f983fbc55aaf59fa49f8955442c72741b7c739baaf3813aded9b2c9a247956fbdd6e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e68914796203bcf992526dc343783c37
SHA11f476216015f930644c75a8092fd285e2963e1df
SHA256ea6cc277f67bc0817343a0e1bb53c5a9f3e32df508d8c76909e32db49ca2bd55
SHA512d2a462f235ddcd50bcb5a060e760ce77374b70b48b82babe475c8194b487d9c44685b7445f56e9d395886ae857585176821d9724809448841bdee6a74b39245a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cac58df3d6d8896ca604aac16485a932
SHA1240d209e366b75ed414834a7f9ebfda4970bbb76
SHA25601129fe4cf1af207249ab4a042c5fab3d4e897a5143d52467b248a46807f4239
SHA5123cc2e3514d82abd443518530798309cbe21aee234fcdb021f010d0cf2c1d93d9df05212d7757db3f56eebe32102d1a8a886610c7494925dce903815a9a97e429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aa68ffa01f9679c52dcfad15a86c2632
SHA195769f4e825029be882aaeb31ba24d78462bd7d2
SHA25668608a28019548b51554e2f1ea045beee763fe39fcfb81373cd5cf53a2bffcd2
SHA5126748ddaf0e6db75d1ff689be769f8357a54091dacd3037fa0d885e2d8c000c7c189c7ac4738ffddc5c4049ac727020e4bfbbadfa8978bd5c68d0e62c6c17c5cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5023b3c79fca63b894d654d3c632b8fbb
SHA10ee1d694c789b4b33c5abf695779e57acfff3d83
SHA25628cfb76cccdfe9d0c654beb7d18eebc92336b2e2034668373c599398740e46c5
SHA5123a61e7f22e8d5566b1febee488fb26ef3009a58cd4ab009dd11aa639f0b605fbe085efcba29fc897574fbda4a8213b6d6611312fc0f4dde56aa95a24abb10fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57c80cf438b6e9343283a6f3fd95529af
SHA1942d8fdb0d85dc3eaa6ef8dc3aa302e8cbbfcd9e
SHA256e0dbc605002b0d446b1b86edbea6aa5729f6a1a231a194ef88a2dde0e74be239
SHA512ce1cf25ae6637c09ccea02a640d6be17d3aef22d149841952a327ec2934b934dc257f2341feb900506c49d682c70db13daf1f31ec13a83304e4dd49006b5a9ab
-
C:\Users\Admin\AppData\Local\Temp\Cab3112.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar33D7.tmpFilesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63