Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 13:03

General

  • Target

    http:///root/sample/9bd1063e36aa7d646d2da1a4a0444199b04db438

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/9bd1063e36aa7d646d2da1a4a0444199b04db438
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LBUIQY23.txt

    Filesize

    608B

    MD5

    6d3469b0ee33819245a2ed9bd858091c

    SHA1

    1b4b93eafbd32068948c68a28e129e941c5ee1d1

    SHA256

    eb7ed0372868d8a3c65a7f57ad3161a8c0d7c11d57517e82079bddad64fdc9a4

    SHA512

    c8dcac1ba7d7bfe67efb87da7203202023d8fea5796e47dfb07e5435260e37c1238cf20c40c6431222f072121fb946b0f731ff7c58eb0d08e7e986024a5bb96c