Analysis

  • max time kernel
    215s
  • max time network
    338s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2023 03:17

General

  • Target

    http:///root/sample/2dcee2d06c5bf9bfcd49296a626489729f5102a4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/2dcee2d06c5bf9bfcd49296a626489729f5102a4
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TS2BLUF5.txt

    Filesize

    604B

    MD5

    30e503be18b345f5d47d1c68e9ee7f16

    SHA1

    cebe35e891f32817f926302206e4127ca9be2e1d

    SHA256

    2398e5a7910c0af0304cbcd41abb74a0e33efaa8bf65941292cea3173ad54098

    SHA512

    b3a7a7859d5f8cfd254e1894b71dc2b9e68e68cd04ae7312b6407f7377801a8d61bb32894be09b05de108ed53be67726a7f360a07d3f9c01ee6078fe21fcda60