Analysis

  • max time kernel
    94s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 02:21

General

  • Target

    http:///root/sample/a7e2f23466fcea8b29a267469298098b9e588a97

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/a7e2f23466fcea8b29a267469298098b9e588a97
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EDENJSFZ.txt

    Filesize

    607B

    MD5

    1ed7c43897562d9919b766402393c0f9

    SHA1

    0337b4e240b4aeaa278a02ea12ac24b4ead12335

    SHA256

    810cacfdb954dd225367eeaf631562d1d6ad368276bd1d58ee5c7b7d4a3bbaa9

    SHA512

    97206d5bd31146952424ef190145c0d08f4178e1978a29b9aff2acda5bedb9796ba830ecdda2384acd1860c3f4687dba032cb041bccbd9e89a0bac0edeed16a7