Analysis

  • max time kernel
    113s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 14:44

General

  • Target

    http:///root/sample/381e0355acf667ee7358d1b9b236720a99a67317

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/381e0355acf667ee7358d1b9b236720a99a67317
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:280
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:280 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CTMUIIDM.txt

    Filesize

    604B

    MD5

    b3da9f89d4294383e36c38127a4f4b10

    SHA1

    940a825dd04f4ba733e5cc0a67b5b4609b5de45b

    SHA256

    51298150f6607335390b37eb446790d7bbaee3e8330241e23a7fcf0d9a7ff63d

    SHA512

    1c77101c19f7605656712c75f5e34ec98c727947d7cff97f64f455105f60f88fbf2b9f0eddcba96767bfc2b0a52278ecc6875ddb404e045f3a364f8b5c5406c9