Analysis

  • max time kernel
    84s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 20:16

General

  • Target

    http:///root/sample/37054128ce2e59b16d9f546bd610cf515f6a7980

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/37054128ce2e59b16d9f546bd610cf515f6a7980
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:616

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2I9TU7FO.txt

          Filesize

          601B

          MD5

          df4c29f9dcdf13c020f8cd2c6e7dac44

          SHA1

          1f8e3968313a4c934eb7b606126d2594f3c4bcf3

          SHA256

          fa49b0faf1c4d90d9c96ad10bb5b7ad6b35744f88c71b4aab4533624ef6f5480

          SHA512

          6466e7714b59ce2ce1b3f552a83d3b691f62d38278086e4ff42e69bd911260b095352e1dd62f853de1bfa58a35a323ef2b317e82f227e55cd3a0454a0070a023