Analysis

  • max time kernel
    89s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2023 20:26

General

  • Target

    http:///root/sample/659ddf5fb175579b0c112fa880f913a19db3a850

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/659ddf5fb175579b0c112fa880f913a19db3a850
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QBKOSCUV.txt

    Filesize

    608B

    MD5

    4a6aa8e52fe39bf9e1a0ee0e49f63bc3

    SHA1

    2f055f84174cae1b05c877ceb7bbad6250b65d98

    SHA256

    e184f27f1243c22a7ae3c75337a0d0e37d5d633753ed598984c37a7cf724e630

    SHA512

    422a1497d78c04808225c73d8a9cd20c22b2cfde7b86d2a7fa8942f43c89023b4a56046dfb9d3f154a0ed6f1ee7c92176d1cb613deea1c8b5570dfccf58d22a4