Analysis

  • max time kernel
    120s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    26/04/2022, 13:51

General

  • Target

    Admin panel v9.1.1/www/App/index.html

  • Size

    144B

  • MD5

    83667fe64dc25693d6a95183bd264d1e

  • SHA1

    c02f117b8ae2ad965a82b4f68604dea052c84ca5

  • SHA256

    d63a65cc2e7c4d99a80e905b159e38c27705ecc4a07b1d733bf5b1d3a4ebeed3

  • SHA512

    0e1267310ccdb40266819f44090254e609788718debed5b9f4f3cb682b3a2d46a7a28880bebf58f15c6848c8485eb9f7d30398c0a3de4cb5404aea60de33784f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Admin panel v9.1.1\www\App\index.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8Z4CLTJX.txt

    Filesize

    605B

    MD5

    90b08b6a051111973c832faa30687960

    SHA1

    04dea638aacf3a02c2b4e049973e4fe4cd93ce65

    SHA256

    01e9ac9468105591df009e8bcdebfc9d919dd69b980045a70fcc88707b0626c5

    SHA512

    4ef71e1d81347b3891ea2d6069203fedaaab11e8708b8115cf4afe5304fa1d50ab4497ae1d3641272c749a93b986379d8b705024be5feac199846236423454c5