Analysis

  • max time kernel
    116s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    26-04-2022 13:51

General

  • Target

    Admin panel v9.1.1/www/Configs/index.html

  • Size

    144B

  • MD5

    83667fe64dc25693d6a95183bd264d1e

  • SHA1

    c02f117b8ae2ad965a82b4f68604dea052c84ca5

  • SHA256

    d63a65cc2e7c4d99a80e905b159e38c27705ecc4a07b1d733bf5b1d3a4ebeed3

  • SHA512

    0e1267310ccdb40266819f44090254e609788718debed5b9f4f3cb682b3a2d46a7a28880bebf58f15c6848c8485eb9f7d30398c0a3de4cb5404aea60de33784f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Admin panel v9.1.1\www\Configs\index.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2044

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7DBBJHJO.txt
    Filesize

    603B

    MD5

    afd9c020766ab326fbdf54d5c2708c42

    SHA1

    b10caad89af20921784cdcc1ce34e7184c753067

    SHA256

    c08dd45351b11d7319ece3fde94ae31f15dd055b8649a540ddf09c93889bccfe

    SHA512

    c1d07fc990622a6168182f1e371f5e2377a2c020787651f50d4132d343cd5873b5b84ab9a45254c9ebfc78c03b6f1de2f74323154a54980cef045098a0c1e7e0