Analysis

  • max time kernel
    145s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 17:32

General

  • Target

    http:///root/sample/abb92274d64a21744acb0325feeacf9ae3920d43

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/abb92274d64a21744acb0325feeacf9ae3920d43
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PZLCAFB9.txt

    Filesize

    604B

    MD5

    24b0602f8bca04f947c430b3f6701d04

    SHA1

    84203f98a286f4c9e0618956d3ff3a0de0578393

    SHA256

    e912a603656f231aa160aee5d347659bf0ed1ea0af0419c77fe4919f70e56fae

    SHA512

    db5da4579552b7f98ddde7bfabea79fc335ace8461ebee773244cf6ee800d5aa2548fede156ce61483b3fa9c3440798a2dcd53ee3873a7d450276196dc1dc8da