Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
下载更多教程.url
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
下载更多教程.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
解压密码.htm
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
解压密码.htm
Resource
win10v2004-20240226-en
General
-
Target
解压密码.htm
-
Size
104B
-
MD5
45ee9e459a334004af019da7bea33447
-
SHA1
27681031731a88f213686820d8a68b73a5475e0f
-
SHA256
3ccd7437a8ea9a8ad424f5b11fcae4b323ff29b21a1fead5c042477c36b3ad3e
-
SHA512
475ba7b31a5e6f3daebdd7ebac95593af5dbe38eb050a01105235b87324c0495722e402b59b790fe86f71548142511de9e783fb24a392df943041fc40280ee6c
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE64A1D1-189E-11EF-BA3C-D684AC6A5058} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587529" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ffe6d2abacda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000e485967ab79a889d22c1f95ad0ca67c22da2d593d5bb33dfd0d6402848b753b000000000e8000000002000020000000f3961e886219d7ecae1a251dd5f6081460e30f1337859edb8316abe64226717b200000008d1d6b20701bd86c9bf8df2e2472258979b889c85a90c89d54a1cfc08d560532400000007f324d00c72f188389c5242a8b7d3749e1cdb42f7ed5a0edd604a557fc9ab752e9fe9ff486891c952c595f72605991482a32d8fa53523bec2c1496ede7b55b50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1276 iexplore.exe 1276 iexplore.exe 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1276 wrote to memory of 1380 1276 iexplore.exe IEXPLORE.EXE PID 1276 wrote to memory of 1380 1276 iexplore.exe IEXPLORE.EXE PID 1276 wrote to memory of 1380 1276 iexplore.exe IEXPLORE.EXE PID 1276 wrote to memory of 1380 1276 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\解压密码.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ac06354c0ffe6129881363c04494d92
SHA17eaac49374e64fa37e14599ca31caabc8640df7d
SHA256392de9f570ddedfd941cfd712266a4a6dd4991f44492caca3323411655624abc
SHA5126e5d0932f9dab7b7ed11aa74a248a4e436bb6996dbba8c1dcbf101e773230760999a015ff637e9747742fa1d8c1c0c212ee991665c03d0c17843d6d0dbbcd8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56239af9e44e2f296611f92adc5b3aec0
SHA1696d1d155ad01f4ed18d6ed818c2233abf5519f2
SHA256fdcefef71ffac677f61fbf226b928cdfc00cab42c6ffb55d0676b457ad1c1f3c
SHA512c6377dcd0e43a8026c02520e7c6445ee5de41d0bb34d274964d8a191b068e8676daad26c4ffa89fb9c5ac8cb025012987e4d6c84f2823bb4036efd9b828b9a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51938f085a16253d47548e0d7799deb4a
SHA11c9f0f30ac51313fd8c938cee59655a4c99b9bd6
SHA25650782dbd6a6b460c80676de69316a7a4522f5b08da4d045bb6cf1ae2363d20e9
SHA5120c01017ceb41ecea206cfd371b38ea382f63eac64f0de27964c945dd2f0ea688c769b420ca5beceb2dc6b98034b54cec8cb737bc8576f5b33576da8d14748648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563a7e5e53e58bb7965dc486a815df7ab
SHA1d9323a105a550dc3b6c3b7d3c1e502f8dd0aa183
SHA256746b7e46f6e70d8c784b97bae0f48de815b8e33fb48f6dceb34041dc6d449f6e
SHA512d9ecb3a9b5807d613531166da27198cee8db2de531fdec2f8288f816b993e578d52cff1bcacf73019ac6eb10e0772b5554b1281f88b2212d64362d3e87263da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6265656374ac8161a80719a5eea48f7
SHA101361a22bfb28729f8d99caf06fff174bd08da07
SHA25678033c261fe2505c814c791976e94d07bb30af1125b479924a2b339d01c57236
SHA512ab834d0b5d0aef681fe7b447ddcacc4aa53436bc19ede16673418cd0b3b66fa1c21cab18cc20504e62d1e9d6e0e704a713a16c831e09bd36fb5f5d7bf356ca6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65a1f466cd0e0b4a362eef60e519d60
SHA1ee733ed0fc989d5096b53f97e0d59f2cc70d22ba
SHA2568c7049ecf77abe55407c74c3d306729e0c4535b931d4d7245ee76125d87bab82
SHA51277f44ccc0540cad92b2e4ed32b9826387e2abbbfb6fd1ea0840455302162a8d04b7861c821357c5b774e1250a320ef62cbb5c95e14586d8b613e6646a00ad467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9a13ab1fc84db1691b8feff64ad7db
SHA14f4644521447107da2f86e0a2c09f528101b9f95
SHA25673cd863304acac03ca9c7e71ff61db2bca9d8ec9ecd8ba1a3704471946d7e305
SHA512bfacaa9cf0647e874e575bc212318777369e2d1bd65b0557d7f362dd3f3d4d31f68fa95c5ae6017a841246a5720c15d557c4c699f96c3bc1b2a980d27a21ae7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d666ca49473fbc876f88857a81fc86d0
SHA1fdd99122053b0a71fe77c80e4cdd9cee419d0d6a
SHA2566542e4c209df58ba9118a4480cbacfa6b87b908f52761a8f9279c641df97ee54
SHA512a251bdcdd9b9ffa2bc3980ac1637f47688a84751042a5b05fa4270c5062dc9659e6ff3953a63fb0b7fa552a4b8fa996ec15e85bcdfe550380a7a06123afdab6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015b48fd2c68b936c4bc8a8d8ca5e0ab
SHA162aeaced363920f2fc89ce05492162451fc70b85
SHA256005aea8e14d7b0c2de1b2d90416026546c168672a85d7d7eb477b2b06a729e39
SHA5127be8ede894aaf0c205f0d0713d4b2137dc0d9a5aa13495123be3c3c4e851683b695f6643bdde40362666bbd817bcc9243bde7d2ff722128f1017ca8228198a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545b9e8657ab7c062ed8a0eb8a2b06494
SHA15222fd6358bcfdcb5511395f7a9d54b98518870b
SHA2569b66880efeb80a6274748cccd4f86a5e051f177483636326c001510e10ab5104
SHA5127cb2f272c62e54eeb76523c4cd1e9ed501a33ebcb7e3246468b83502563cbdd43dfba1abda50e52c3a6041c4c5913ad5999380730a5a2e6a230a49a52fb99b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad08b5c5f5310faebe08a53abbab6a45
SHA1865f19e44fad4ce4f20a062c6a8c0c0c041badf4
SHA25693f5af0db9b54c56b55e83d0e89385cb57f668730ff3a085130c58ccf9c365e9
SHA5121c9271fa6b07039a9864c53d85651c7b44dd49cbb1b8b52651b2a55b1dbe397190eb1d10f7ae48191b2938142d3817a1eb34ed4cc827982de909e0899377842c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b8dd2200313f3e6ab5a3d21203d3afb
SHA1ea1f143bc2d5c095d0ad5c7642fb9623af40f068
SHA256a216a97ec6bc2274690bc81c95c158155d24091ce3cea25624a337674dc180c4
SHA5122165ba9be683cfafc1d2967a7a44f47ccd8b68722cefa236ae7aad81a8610c2540bd75fe68e9450290abcba1c9ba1474a2569270de949e84ccc004ac52b96f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541acfab389567f49c30e28e309d53e7b
SHA151b7f4c1d8aeb97a020d88f5a6a570c27450ac35
SHA2561711df36c1dc145ad18a2c60c82e4826c444e2f980fdaa5aa35ed81d3637c038
SHA512818cf9ef5a35cea01076d501561cd5112e4a565047160da441f9ef6c1039a302c6d4d8bac251f4e9fa365b0cfef42e80e692c4eb690e5ab2a8d224fc9ee60397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a076dc504bb40ee8ec8e183e5a39c172
SHA1107aeac2657416b83fc2f7703bf50854523b06ce
SHA2566a6d3026020b60389dd7fb8e3ba5b7a1ff9a7007a6d4ba7055dd9155ad24a8a5
SHA5125ea5cdc3a3a4ea950b6d8f25c6063f86bd83d8dfe1989062937f789eb1f842a5032b0ae73c185b1102dbd84db103209de7940ca8adc60de705847f21697f8c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2f434053e334c9a771d6b53a4b008c
SHA1165dc02be21294ba0ea05e9a889c4e02b5a9f96a
SHA2565b920c3960d7a2426dbade14a497e62ec74a885d29af251f3aba0c9f2d4eea32
SHA512dce8beaab6272330281f27f26eea42b684c51592ede8d5d27d3028443860f7f629e7f788b8e6cad5e05d4df2a15e450bd4d05bb47559f05d4679d1be6f3877f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538ec8afa2d2d0bbc2b7b10a8039cf910
SHA11c9e3e11b2398817348ed5c9bf8a0a8063d733f9
SHA2565ddfc74e76ed6881710a7932255a4b33466af6ece200c60066747ab3fe44e00f
SHA5125cfffaf76aece27abda5133dc56b4245b94126dc262d80b64b2a78741ef463aab7d9d2448b8f1eb29317cdc45257ec3d1465597b76539ecacba8c1a44676ac71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561df354edec7f45109c41250560b8a49
SHA1b2b0c024c300e30c6076635bcdb5faae8368132a
SHA25693be7168c056c089ecc8196f4a8745e58e606a44fccadd460d4283d16309a363
SHA51273e7b19d4600466f51b1fbc0a6731b00ef66bfaf9f01990fe89037b9a83da50f19dc79f5704b04aa2a6410227dd1ed5d7c5fc462f62d33cb612a7dee827b7b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946a81aa7250dcd894349b126b9629b1
SHA1f1fd8a45167a3d9e4da456ee4f1a937c23c4b3e8
SHA2562ecb9cabef2147cf520ac2dd00119e6c137dfd8dbc6edc0b3df3748f6bb0ab8f
SHA512ac3771391945050be7d3352778b2854a3147ee3125414dad930f2b40b6037d0748aafc3ce369fcae6990233ff634b7452e308261565d43ccd6af0ce44eb7acc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e12a63c516f79a19ba97eb6a6f3324a
SHA153a5405d17aa3683e87fcde33a3fbb638f2716e0
SHA256e3c4fbb2f555e390138e8230ee5521854d6978bfe3d4fec2be8f0c674e390be5
SHA5127aa493bcd33de227077751359d0b265ace6be06827f6880e803ea43297d15c1bff57c785742857b3416ee0f8474c40a04e4b54530c32bf73714197e3b4363e8b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a