Analysis

  • max time kernel
    100s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 01:54

General

  • Target

    http:///root/sample/4aedb0b10807bad82564023d67d420adbb77b741

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/4aedb0b10807bad82564023d67d420adbb77b741
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1144 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:992

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NZ7X07WE.txt

          Filesize

          601B

          MD5

          0a92f68681407854c0284c09a7c228b6

          SHA1

          768eec141eb5b98918f971a5ef0b8c2c8a12c0de

          SHA256

          91d3cce7b3a9313f17f415846dc6935b72900197086d33f5a338712d36e8f632

          SHA512

          8bbd119eb2113625cf189ec56635c11ab23cc03c542c1b8cbf69f16c0f0f3c24fa272cd59c20ebfded2fb0b6076f88f4a9e03edcd56a41d5621afd72bcce8483