Analysis

  • max time kernel
    96s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2023 23:36

General

  • Target

    http:///root/sample/e15cd514e3b7e9e65aecb61e5591d3e456e54e73

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/e15cd514e3b7e9e65aecb61e5591d3e456e54e73
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\U28PN4R9.txt

    Filesize

    608B

    MD5

    52452f7a40b2ec9033d18c05d4f15e13

    SHA1

    a1945e65491b41c05f73768db4f41f885f12fcce

    SHA256

    96a3ef26fd70b171a2f6d5a33a69409b93fe4a182401ee8db180e2a0c5911683

    SHA512

    b722a86387eae054b126b24ddab839e3579abd79245e2ec05fe28532e6ed7f5e3e64c2a84472887246fcda78ad5e9d7c2474dae73f2aa80a56ab87a3c6c79cce