Analysis

  • max time kernel
    231s
  • max time network
    377s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 21:51

General

  • Target

    http:///root/sample/fb77553ce44032cefcf02ed16ac01b09176bedae

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/fb77553ce44032cefcf02ed16ac01b09176bedae
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NIIUFJ0A.txt

    Filesize

    608B

    MD5

    d9595dcc82d9bdbe7a63e5264c082a1c

    SHA1

    182e9c24869e0e3eadc8550b6f38cc0aae723f1c

    SHA256

    fb638f1c4042f7be7dae2d80e33330b0cbd4071757bbdfff5b8c80a3c8dfe5be

    SHA512

    7ac814a68a3d1b41833c0d0ff9032692c494a03efcf35d4d6904d252c96dcb872e512d3a5f10ab467edc88fe3f9a5b41dbdd0855ea2d26880defaa4b4638f817