Analysis

  • max time kernel
    102s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2023 10:49

General

  • Target

    http:///root/sample/52cc0be4cd7a786c62f86899fcdc7b65137a2b78

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/52cc0be4cd7a786c62f86899fcdc7b65137a2b78
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\00BZ4ERZ.txt

    Filesize

    605B

    MD5

    a9c0327166de191043f206d3d3019853

    SHA1

    bc115dd165c8fd84044f1bb5e0486b099fdfd0ed

    SHA256

    4ada05f8b700e99145c1083a77951d8d67f70367e474f6b92876abb0930f3629

    SHA512

    745289dd3900dfc2dafc8cf8ce22c7270f65209cf72f4783770d141e7d1e00205af6ccec1878ec24c1da1222119b4ea42a5d536bedf7673524649c7cb5272a2c