Analysis

  • max time kernel
    214s
  • max time network
    281s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 02:11

General

  • Target

    http:///root/sample/baecd5f4794b3c6b9d467e8a63277ad73cf7d742

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/baecd5f4794b3c6b9d467e8a63277ad73cf7d742
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:688 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CRSBCVRZ.txt

    Filesize

    603B

    MD5

    f98b1af99b0f4cf9f0af0b50b0d58aa8

    SHA1

    c9b63beb50996c358e122d6bba3169e5596d5c4f

    SHA256

    952a6f178204b6c8cf71b42c44b4bf864d84cc1c681d71a5a363a30144f47635

    SHA512

    f4ceff050e74bee344f7ec8ed0239cfac66698a9315b817463c5e5fd178574bb1f5b83e783680812e9d72974791ef964862369d1e18039c1867ea90496270814