Resubmissions

02/02/2023, 12:45

230202-py79jsac6v 1

02/02/2023, 12:25

230202-pltwdsab8z 1

02/02/2023, 12:11

230202-pcth9sgb47 1

02/02/2023, 08:17

230202-j6qftahd9y 1

Analysis

  • max time kernel
    143s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2023, 12:45

General

  • Target

    http://202cc.8170zt.cn/xudp

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://202cc.8170zt.cn/xudp
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VO4GCHXS.txt

    Filesize

    604B

    MD5

    dbc0dffa7d7a671783322186963d68c9

    SHA1

    0e693edc714cfdc849d03892af91d5afc01b6f5e

    SHA256

    85b819d0d4808d3067f54b4ac4e3f7fa2b8f596be29a8688cfade55aeed780c5

    SHA512

    e50938a101a778170ae7411bd35dbd34642e39818d86eddecea4e4a879c6bcd419b9b612f34f0d5c175ffa43d7b7bcd8a05684705fcf2d83e2e1c15aa7cbf621