Analysis

  • max time kernel
    100s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 23:15

General

  • Target

    http:///root/sample/1ffa0cf09aead3434205969f25cc6028a67b8cef

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/1ffa0cf09aead3434205969f25cc6028a67b8cef
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z0P2DZ2J.txt

    Filesize

    607B

    MD5

    0e72b553b1f708b4ef4175bfb6a51f84

    SHA1

    1df9370e186d9cb12539f8baf871f1b0a1acd577

    SHA256

    b2519a7f16cfb668948acc9bf17f875eb94fff9e795871e039b451f9cc4c9399

    SHA512

    fa3198fee815395787241baed5e995c6236824993ba21dab1e5d8e92c13c26d4567e2aab344efac2e6674c8566bbf8f1cf5abf18ca24ee9a5bc83376293f7320