Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 05:39

General

  • Target

    http:///root/sample/f4858b733799ce33c566e03be8eeb2b6326a181d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/f4858b733799ce33c566e03be8eeb2b6326a181d
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:960 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2W4SKHQL.txt

    Filesize

    605B

    MD5

    972d104ba90efa8837dcfb31490e4ba3

    SHA1

    3563ca9781a8e97b63c4b21e7b9f93048837bc5e

    SHA256

    af820dbbcac9f18106ff5891f7a4ebbbbea85038b0504e4251b90293e0fc4d4a

    SHA512

    05274a5259290633199ae5080b93edd79bf08cbbf66f566384bd52fa3887c2241419a580dceee774f4c7e89e0b77f5c94b0de0a239a5eaa4e989f283dfd93d4e