Analysis

  • max time kernel
    97s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2022 23:03

General

  • Target

    unmarketable/awed.gif

  • Size

    28KB

  • MD5

    59a948af4a0630f230f6637a72318934

  • SHA1

    41154c5636aeab819120fa0c4095fecfbe8340f9

  • SHA256

    2ecdf5921662f523fe96ad01e35058ef2f2c2e3e4b25e725029be6f78afe1005

  • SHA512

    524c992a73256269ae81e0632d7f56db7c12fa505f13e7bd2233085896e357d40369c9e9042996ea1128715ba18b82c971530af8047e109e4e23486541abd939

  • SSDEEP

    768:xpXKilN/5DxZae4GK3hhUS+eI3TA+/Edpvd:ui1nae4hRhUS+eIcGEdb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\unmarketable\awed.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J10XUFOJ.txt

    Filesize

    600B

    MD5

    794f1f353581580f96c54c10553a5391

    SHA1

    9f43c112bb1e14fe8b081dca094be1ae1fde67f5

    SHA256

    a940588bf3c054ba69cbb653cdf6d6306b43f460b56f1a318392af6ffb739185

    SHA512

    10c6fa9ad9661a3c50671e5e8b702e42c05dd5360c58d3c9ea36bd610c0f713aa1d40902c6df4a3f795b080116a4bee68dee6765e5acf6c9287b0c386d6a4e98