Analysis

  • max time kernel
    129s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 04:08

General

  • Target

    http:///root/sample/740d5de639cf2a661207ba276bf11ebf608ece6e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/740d5de639cf2a661207ba276bf11ebf608ece6e
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9IU2VKT3.txt

    Filesize

    604B

    MD5

    e7a4e7fc2e8e03bf86cc24fad48a6c21

    SHA1

    3a431e11c2abfae5af8c60fa5b4a17d7e2c08f46

    SHA256

    8a3319206714ae6831b4521f8970f38c16f71d29bae2f1158b89566d8efd521c

    SHA512

    18cd2201c396885784b908d8ab8d80b2fb29328768cf5ec38af8ed3a9f6145a0097f0c393ce10b0d9426fd52f537d5f8b4a1f959bcda586bc0f8f2bfb6c5657e