Analysis

  • max time kernel
    80s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 11:21

General

  • Target

    http:///root/sample/d7d273022a9e88d684b80346b2058dee8e964de2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/d7d273022a9e88d684b80346b2058dee8e964de2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1640

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T9JANOI9.txt

          Filesize

          606B

          MD5

          146964e7c65093735aad18097416790e

          SHA1

          1ae9614861bebdaca01b1edb94c1c95a9039f55e

          SHA256

          13919dbe8bc5114b94f6c4bfed09093d0d9d158a9ace17337b2ce8e3185eec09

          SHA512

          ed032e6efb5ace980ef2fe725bceaa32fc1414394ca1dac7e1cb814d06460dd28c45918f98a4b3085b515b890ced1107ce30aca1b059370d94b79cc5246ab82f