Analysis

  • max time kernel
    290s
  • max time network
    412s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 03:10

General

  • Target

    http:///root/sample/51e12ad5a2870bd29b54e510dfb7f534f76c8b81

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/51e12ad5a2870bd29b54e510dfb7f534f76c8b81
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SN0GYERY.txt

    Filesize

    594B

    MD5

    5a790d3689c04df745b7cb9cdb19c033

    SHA1

    ba2c94305f5c7055e56e506d5e872b4e04b2dd8e

    SHA256

    7d23e754f6af656dd28f502e4def0bd46c5df850a6036518218425de1a5317f5

    SHA512

    d4a6a660d2c6b6123e0968cbf25eb7c7df196c5ae28b6b3d2d1b9b06b9ad72480e1226de211c84fc8d90c846a9b7d5ed783bce73df9e0f5b8b79a76e287e6669