Analysis

  • max time kernel
    67s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2023, 21:41

General

  • Target

    https://www.google.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.google.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:668

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b14f4ff3de0c669d32fac8ee0f40045b

          SHA1

          009535542cf5fe146887071dc174fbe9460dc861

          SHA256

          efc11bcf3712ca62fe78af7ae31d7748dea295ab16464d1440f5594bc6ba3aab

          SHA512

          c2edb8fde3e3b0b1d2d7be36543c1ed6cd7a1cfa66b807b4efdcb88ff4b6f804d4b328947e1c6624f304b0151ae8e94d87199e6b75d9a72200da2bc10a7550ec

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

          Filesize

          5KB

          MD5

          25f8dd2aa60cffccce642167fd811e87

          SHA1

          ed7cd149922c3b956b28c587fed1ac054b27543d

          SHA256

          805bbdb01c7bc3662918bcfc3a168501678d583c2ce93d526fe37cb5cc3b8370

          SHA512

          c36a805b1b319bc898c40837ebc47992977904aabe85a7bd77cc3176839543c407ab0aab8805903a75545b72d5e912bd873026d3640127ce748df522e6ae9e22

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8LV6IJRG.txt

          Filesize

          608B

          MD5

          2647537c00302f41252711d09a0d6b92

          SHA1

          228e1ca5c93e751c644fc67c40179aeb7dd7d5cf

          SHA256

          6f11d89c4128aadb09bff82e89f523f161cb3b61d51fc0142ca61235284b34a4

          SHA512

          3795eed75c46c81c06b25fcef5fafdad9fc37bd07a4d9c16270bc7668dca153553b124cabafbfb5136be09bcb4dcbeb5a0fde4cc61f2a3f8e739836e84ec099a