Analysis

  • max time kernel
    127s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 18:47

General

  • Target

    http:///root/sample/12f13192ae5f194544552e68c6322ec03a3ed304

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/12f13192ae5f194544552e68c6322ec03a3ed304
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\22IXMZCF.txt

    Filesize

    607B

    MD5

    76624d910bad072fd8e2fc728273ae39

    SHA1

    455ebbd8a94f16ec7e1cbabf8ef90e88c16c8501

    SHA256

    0c52d354eeb1c387eb82a055cec145eaac3ae68417a853e2d962e2abee85f6fe

    SHA512

    73af62e806f8326b84b3360b8d02d018daeddbbcc10ffb2711d4da14321667a99fca2047cd0a881b5128473bee3b8f1da319ee11071d97415ea544789e22ef8e