Analysis

  • max time kernel
    88s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 22:27

General

  • Target

    http:///root/sample/843993e7ffc065a6c1c2af041539d8348a478684

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/843993e7ffc065a6c1c2af041539d8348a478684
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4DENQCDM.txt

    Filesize

    608B

    MD5

    4890ec50152bb7cbbcf906642443e9c7

    SHA1

    e94adaeca60558b3e7a7129f3e6fd681015a40d4

    SHA256

    015f6219367a6ac2e7a70621e6e2d15f420f7523d5ce8b4a6b167b62ea03bd29

    SHA512

    b260a61d5d1085a632f9767f1ddab69f257f3f5ed037e99c525f3c67fc871d4180ce8c7007c80b1a45f286c0f99385db4e8bfb2636e7e5191f8f646a5ff604a2