Analysis

  • max time kernel
    73s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 22:55

General

  • Target

    http:///root/sample/ba1ae3807a3333acab7f9e3f77517847e355a67c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/ba1ae3807a3333acab7f9e3f77517847e355a67c
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A4V3AVJ1.txt

    Filesize

    608B

    MD5

    678691810e2c64214e23207823685e04

    SHA1

    f1b3616b2503a0b7e1ef0ff980c6ad4cfe57100a

    SHA256

    8789edd6de365fb6bc2cefaf29d2c696d3673b40ff2723bac4b5d8fc6d6d357d

    SHA512

    b117edd6b304f53dec88680430d6a403a6dd6269fd2aa3a42357b4141ff857de9db9d816eb17d75a53083adf20bf20508ed5d47555c0ba832bffdd179fc52ddb