Overview
overview
3Static
static
1热血江�...��.url
windows7-x64
1热血江�...��.url
windows10-2004-x64
1热血江�...�.js
windows7-x64
3热血江�...�.js
windows10-2004-x64
3热血江�...��.htm
windows7-x64
1热血江�...��.htm
windows10-2004-x64
1热血江�...��.htm
windows7-x64
1热血江�...��.htm
windows10-2004-x64
1热血江�...��.htm
windows7-x64
1热血江�...��.htm
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
热血江湖全功能小精灵 V18.4/新云软件.url
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
热血江湖全功能小精灵 V18.4/新云软件.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.js
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.htm
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.htm
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.htm
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.htm
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.htm
Resource
win10v2004-20240226-en
General
-
Target
热血江湖全功能小精灵 V18.4/热血江湖官方对按键精灵的看法/热血江湖-警惕�.htm
-
Size
11KB
-
MD5
036db95d534483625b56d885a3cba275
-
SHA1
490572f9231d4f91da224c7ac598260a970bd5fb
-
SHA256
942a2f3ebae10e345cce80425f50a3a9bf71ced020b7466853b4caac5be7f8bf
-
SHA512
9163cdd49982898a300c5fa25d8f8802fba396cf5612115d83bef57db6f7d6a4cafc2e4e180be46bd3c31efef529203a6660fe7bb64a4d416881b8ded9375ebb
-
SSDEEP
192:g621fs6ZIveGKKaqqBj0Hi3nW0w0PzB7l2I/PFlxfcJ10gA4SCy6Bh6oH6a26LV:o/1DKaqqBj0CG0w0rB5Xbxfy0g+u
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B82AB3D1-345A-11EF-8EEA-EE2F313809B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425636839" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1364 iexplore.exe 1364 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2844 1364 iexplore.exe 28 PID 1364 wrote to memory of 2844 1364 iexplore.exe 28 PID 1364 wrote to memory of 2844 1364 iexplore.exe 28 PID 1364 wrote to memory of 2844 1364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\热血江湖全功能小精灵 V18.4\热血江湖官方对按键精灵的看法\热血江湖-警惕�.htm"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57d04f0329514e48b2dbe4f6e47af54c8
SHA1788a742168911b241198fa759ba79108888f1863
SHA256f9b0cbb491c56ac6d7e49624b0759e622298c46b178c711f9e1bea04a4bdcbaf
SHA512bf72a8b602a542c104cf68a1966137e338db98b28591208462b498fbdd09e6ee349636c1bb9817a7e0f27ce2367014364c332c1daf0755b34de6fe37291e2250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f77c96a49a5284f9f1164ae2da9b978
SHA1fcfee9a0a2f5b4eb9cdc0a9d974e5857dc8c56c2
SHA256da193f3b6cae8171ec52f7d594ecc4c8dcfd2c4e26e220a68cad940be8e049e3
SHA512c66fb867b2b0e91c2e5a10d365ff8074494fa4b852c3989e2439d60811d3e788219c5121c98d359183d475a1a15a90c6e29f0ff1744677685e671f6d73f47ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c16dfb6567c68829e9fe77aab3eca94c
SHA1f0aadde3c14ab8d3a91f611e8b912d010976efad
SHA256afd347606709d616201922961cd907d20c3404d7ec99e8c882601d8d2d2f6392
SHA5129454324a8ecfade97f74bef9f63f66e3b23e8b1722dbd9a3e48cd8f39be2b7efdb3477ec031177c8932aebf8c052c13b82134a21c3a14f063f1d6850bc3c8dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ebc150ecdab622e63f79dcedc710c39
SHA15618dd2ce09d9ba313570f3e350afff7f68de6f0
SHA256d053b65134f755152da57f6481cdbe1ab6f7a528f716fd643e49386cff275287
SHA51261c338c6fe74f13de6d5db8f1ec645c853448396f3f937e834eb1ec6152b051f9cbe5a6c3888645b4b945fe7d885896d4b3885b8d737f1f38ea8e0522e969909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceecb8606ad33665ba7ce563998936a3
SHA117d9ef8762089f0e0c35d8a1371e63a294af7d8c
SHA256db19f9259aa568165719f08b967a73f8567bb6ef4dafa3acb7cb12d8579babe3
SHA5126aa20cfdaf3461601c0fd53239ba5bd9220124b3afb0c37c84d267e3f36ceea5375cbe0e2b147357ae42b837edba3f81327e1f49dbe49e38c85870dde643bd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30bada6821b9a28d49062dd277383ae
SHA143105f6584947bce0da3946d35279911231b285a
SHA256e81492680220b596ec877c6908954957a899dd0c265df37d32c430e580b05f78
SHA512e78e51838a8323f3f83c88a864b67215490d3cf290f2eb5253d9538884324d1084517b444bc8ea74fe6a7888653385272377b8caff6e6bc929fc38ebd8953f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287c9bd18122a645bf83bd26392c78aa
SHA116dd98b91fe0e1b5308fc4b0d3af92763635471e
SHA2565f294ce7e37896978ec72668bd9b3219c12da5852bcc1d4b23d912d8c5c596c6
SHA51261cd5ec03eabb6a47c0f8e92fb2d907b1f78f4559604eca6a02e22387269dfeae391bddf977c78ede2d720573f15a46091f8803bc528361a83a77bdf591103e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a31fe56ea080b065502c505a32d80c5
SHA1dd92db9474a5e66872e014fca4ff6ac78ca2b30e
SHA25633ab3f1320772295093c61483089e868c01222c9d4a5b41a834dbfd105acbda3
SHA5128c000d769bbfe1276e6e6f4e00b60c46a6439280c8f2c2aa4a95b9bd9bbdf26adaf8c3bc774eb79aee98452702d366b77308cc3cd966a4a10d54fe086cd25f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe20a49568dc9423819e5d4b907db87
SHA1373019ca80c97bc06e495bce973e70aa421a8f40
SHA25612ee12092c0c23cb79279e380c71f0ce37f7bb5a09554661dc1dbf4e342f86dd
SHA512c53161dff02cb90798f1841590348292db372a1bbcf624059741021bf35717418893f6ee364cf935b868d386a89609aaaad1c2d0fdeff63e0ca86662583ceaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ad3a1fac85709e1b2a2941acced121
SHA155b06d61fe3752c8c077e2e6d0ce2135a4e996d5
SHA256b4af0876989819d2ef16aca275ea8648096497599397cb61d02fb5154556a7be
SHA5129cc3f0aa0997d9c077bb87f7ce70654dfc2929a15e8a9df03411c0504b0a16811657ef8a8dd7cf569d40bdd9c4ac459f99dc0428dfab97dd15cccba2848cca98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5517fe726daf292a6e76f908fc98a526a
SHA1f8be43b2960536d921caba34e683ebdca140f801
SHA256f0454c5c8c7a45c3f8c2d768dc6d4502c9013549048b83c2450599d434d94a99
SHA512493dbc84d3a383efcb0930c22523dad2c2bb3e98171b32f26baeca72b56825429c8d0904692e6ec512817d07a98d0878a2bfb8d303492b8e1617a768d2d85e32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b