Analysis

  • max time kernel
    97s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 00:38

General

  • Target

    http:///root/sample/32886c1e5b95254b2b82506f44b30210507eb114

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/32886c1e5b95254b2b82506f44b30210507eb114
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:968 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZRFK0ERM.txt

    Filesize

    593B

    MD5

    cfc34d274757fa94aadd2d4b752322b8

    SHA1

    0c15635d1f309ca57e10529cf0367ff6d25899c5

    SHA256

    0e6aa373411f0bda8d10d86bc93664b913a78e35e1aa2c4988bec785204fd997

    SHA512

    a724ac6f2e510ba206604c1128ca5462607948e6fe451ccf9e56e046b8bd9adc4d1af73fd882a48d45cc6d447d82d1cad789bc29c04038d435e920a1e45c60de