Analysis

  • max time kernel
    74s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 16:43

General

  • Target

    http:///root/sample/92b7dbd90ee57005dc8c83ceded53506b3420405

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/92b7dbd90ee57005dc8c83ceded53506b3420405
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1112 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C40FF0DA.txt

    Filesize

    607B

    MD5

    98cdf4d21c30ca9aed0eff22fb634394

    SHA1

    0839cc20681252c6e3970e539fe89f4ae9446df3

    SHA256

    e820d27dfdf30e431c849c34680d0d3c22b9eb7491b7d2bcda32d1981dba7622

    SHA512

    3565581c9757e25fbb40ca633026808878011941950afee4fa995eb7bb37edaba3bd8450a48dda6a3be2e7529dfb005f236d2f8851085abc1f800dcaf5c261ee