Analysis

  • max time kernel
    88s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 03:38

General

  • Target

    http:///root/sample/b3fcc0768b506c7b11815696b0523c696ee442b2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/b3fcc0768b506c7b11815696b0523c696ee442b2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y3JRZ1FQ.txt

    Filesize

    601B

    MD5

    83f9557dde1c0aaafe87841ef3e0fb41

    SHA1

    9a2167b9f2dcd727950b41f91ad840d60500237e

    SHA256

    9cef2e2a350a5fcefc85e96fa2e1e923f58ddfff3c4d0c3c8710818298efc0d4

    SHA512

    14fb7015320ef2c4c7abd69ddaa6bd90c425a6b9624ca3cc0ee7c08161e24a8dc3707299a0a5b2c465a95e1d46f3a2a54ccacafba31a4dec739a8b6fce20de76