Analysis

  • max time kernel
    135s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 23:51

General

  • Target

    http:///root/sample/3eb524945300b2db2507164f53c995d7021feacd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/3eb524945300b2db2507164f53c995d7021feacd
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:592

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WJLQVSY2.txt

          Filesize

          605B

          MD5

          51e8ed5e429cfcf15c5de976619c6813

          SHA1

          24d96cc0d6afaa0c06bd63a70051aea48f2e2db5

          SHA256

          3381d63f1b1677e48b0e9c08376aa1af0df035cfd9c35a44fbe5931ab61bc9fc

          SHA512

          0bc85a9258e63e7e0b09b5b5de9b4c72431f9752a3da3ce14c0b01a4993ff7d40acbd3feb36cf3acfc66e4834d3487f87f02a362aa91ef595b3c5abdb223ab2f