Analysis

  • max time kernel
    84s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 09:18

General

  • Target

    http:///root/sample/e4ab651403e493ac11fa2c63a5598dda744b92b2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/e4ab651403e493ac11fa2c63a5598dda744b92b2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1648

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KWBKUJXB.txt

          Filesize

          601B

          MD5

          ca298a4958dc0b812ac25ac9db4f5797

          SHA1

          d1e4988d0bdb773c621c7a54761abdbb6987d5a8

          SHA256

          b8ffc5032d60a768dcaec95423675c8864e4a9a059e2966a19bcc4834c12dd90

          SHA512

          688e962d787c7dd063ddf04d35d88c740c8f6adb3d46adca08904fe15376cccc4fe2772b29261a18dc4795d7b7412fa122e0cfb1adde4a66365f3c88a5fe0dae