Analysis

  • max time kernel
    99s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 01:32

General

  • Target

    http:///root/sample/ee9beeb2f55fbc567c7d95698436027ea78e189e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/ee9beeb2f55fbc567c7d95698436027ea78e189e
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\U8PN6F9W.txt

    Filesize

    602B

    MD5

    8f72e64e6dffdeea5a1e33818cfcd00b

    SHA1

    8650f8a8929c1b47c4e87d29646b18cc5fce3adb

    SHA256

    df574884cf9f27f9a3c63b46072d36bf8d5156910eb893a5892db162ba0104b8

    SHA512

    5f133ae70e20dc0295b9c75ea7236511f126be996a351f0c78f346f216809d9489fe7fc47df406dc04b1fd0b7a89bdb3e82746b125ee02cffd1d41764ca9be15