Analysis

  • max time kernel
    111s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 21:51

General

  • Target

    http:///root/sample/2e81a909c25f32b3c531a75a3528eff74d2024b2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/2e81a909c25f32b3c531a75a3528eff74d2024b2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1068 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:564

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4FR08T4M.txt

          Filesize

          604B

          MD5

          5919927ec2ba852b1af199af595291e7

          SHA1

          5a78b847c605ea4c292346b7194c5cf2eb2c6760

          SHA256

          a4459f76cb6c59f4fc6d1d692f4a49db54b70125e39e7b6982c91e079191a083

          SHA512

          f53f7ca3c185c52c53f29902d68c413d96079682b4247d37086591888c73f35b9947f8eb8a6632f7e0f69556a954a0e6f68ba6dd5b005c2a96ae3f275db94e97