Analysis

  • max time kernel
    94s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 23:27

General

  • Target

    http:///root/sample/35569bffdf7d01780b34b5d021f9279499006dc4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/35569bffdf7d01780b34b5d021f9279499006dc4
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6P4F9NL0.txt

    Filesize

    594B

    MD5

    752ce40afe516a8eaebe3081e4036dfa

    SHA1

    0be149e94fa70f6a0a75063297955963d70bda9a

    SHA256

    a0107245a9c894836d947782f9b85d2e245226115e376ef13e62b39fe2a06333

    SHA512

    3e9cb58107edaa9d66850e7a83f8046558c8ca5cc7894b2d19e73bd576e7223f149e963cf36ecbd924bd0f8755c8ca5c1629c40dc72bed643c5ca4fe1edae799