Analysis

  • max time kernel
    129s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 04:22

General

  • Target

    http:///root/sample/53ff8cf0332a623bf5c7d3278b2d47e4825cb5e1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/53ff8cf0332a623bf5c7d3278b2d47e4825cb5e1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZF5KTUWX.txt

    Filesize

    601B

    MD5

    feb08738a9ca2065a24b4da6e55190b1

    SHA1

    99c9068b1f39a2449bc5dcdc32c762d11770351c

    SHA256

    b8bd80907869cec47c97a04897d538e3820ab96a9fca33a63343057b852ba99d

    SHA512

    7fbdcbe33c6cf96b980406407e667e1bf6c15dfb963c21a3fc13f020296dd69cbdf74e0d2964130a7927b6085c540afa5cdac818bbf32e4af6aad476f3cdb115