Analysis

  • max time kernel
    105s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 22:48

General

  • Target

    http:///root/sample/b0452311b7dd161d28d9faf848ca77e884be0088

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/b0452311b7dd161d28d9faf848ca77e884be0088
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:996 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XGWYN2AY.txt

    Filesize

    603B

    MD5

    9ea8227cf5840092fb645a1d5c82b983

    SHA1

    e2aeda1e679b0b50870e5d93333a970f8b9a87b8

    SHA256

    5a080fd67687add20a78fa92fd8a0f1995abe8d2608e5eb83d183d5021edd321

    SHA512

    340329d7c227434d8af0284378b7c27e7cfccf0f3b0c7ee7d0cd85ccb95e3e71b1695a67be4575e81da4d0be39630f954860735fa89b83e68817c59434663dfd