Analysis

  • max time kernel
    95s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 06:14

General

  • Target

    http:///root/sample/ff8905c277e894c15b6dc7113e7f7816dd47e6e9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/ff8905c277e894c15b6dc7113e7f7816dd47e6e9
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2008

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\U3W9NSUO.txt

          Filesize

          604B

          MD5

          d249e9a67907debb62a2f1d32a3ec71b

          SHA1

          4f11980a7aab6c599538db9c32a448fff4508a89

          SHA256

          0f8f7392e0418a8c425165be25df3f68d18f1926c51bbe69888e89b8317122e7

          SHA512

          24dce6ee2f15dcad2c308d19a71c43f048c5ce1ae4d01532892cca61beec3601f759bffb307754268d8f04e3dcc6dec1160114e91d37799ce038bcb355a4ccf1