Analysis

  • max time kernel
    228s
  • max time network
    356s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 10:27

General

  • Target

    http:///root/sample/431d792ec4531deb3ee89f0d479a81b0b47f2ae5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/431d792ec4531deb3ee89f0d479a81b0b47f2ae5
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1480 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SWAASIVJ.txt

    Filesize

    608B

    MD5

    15891df2853e7b6f42b1ec062af3095d

    SHA1

    3d7c0d01b64daa20fbe5c22d2abf7ea4c3b7ae76

    SHA256

    cc53e5c7da242b53f7cae5033475eec1fdaf217bb131e5d5c6291839a1af61c8

    SHA512

    00e4ea7e6c8c9b42de56106bc391bfa26aff7f6d2bba0906e6d9121ed26b720348235ccc8f49b66ea79109b8d63509f578f27094dd346d2e9f87c468f8675723