Analysis

  • max time kernel
    91s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 22:35

General

  • Target

    http:///root/sample/0adca3e0dc81b9d51cdc187fa84c8e50160b9302

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/0adca3e0dc81b9d51cdc187fa84c8e50160b9302
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7KE36LCY.txt

    Filesize

    604B

    MD5

    b6d0ca9a64679cd7c2d3c695b211aee6

    SHA1

    8c2d93e5e70ad46b663aa07d61e4a8773b60ec09

    SHA256

    e03cf279c9109202ae286c629cfe20bd2e3ec2e76a34b5dc2d39766a194a62d2

    SHA512

    b3df7045d5b329d3526986b6c62a215c3df2591415231c5bdc59b211fe072cc27c4bbd6ca3cc6f4cc4bbc0dcd5c1089e1d24b529b9dc99d2278860e1c3c0974b