Analysis

  • max time kernel
    142s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 09:18

General

  • Target

    http:///root/sample/f2c3a9243d9ea3b1e06604119dcca18028de56ad

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/f2c3a9243d9ea3b1e06604119dcca18028de56ad
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A30JB4LO.txt

    Filesize

    600B

    MD5

    8034940e24cd7eb8c878f1e8b3c00c31

    SHA1

    b0b9aef68df73a3a0e49f7ecd103d36168cbf98c

    SHA256

    81f68b05f38d746e352220a3adffbe0bd865a521b74f8925c219a552e87fea0b

    SHA512

    f7a50dcd40548f4dfe0bf758ba7ac6efb495badc627849d233bb62d4ef4e353cf11fff359136b2f491c480eefa79c057d89aa917c627a395817d6c9b799751f7