Analysis

  • max time kernel
    108s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 05:43

General

  • Target

    http:///root/sample/8e217874c695ee7429befe3645ce4472f31718a9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/8e217874c695ee7429befe3645ce4472f31718a9
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AAF3UAAJ.txt

    Filesize

    606B

    MD5

    5dc5cf630ff74532c55f6650c105b523

    SHA1

    c49c37c3cca1477f6d49d276594c8a3c9ff2bd85

    SHA256

    01fde01b24bb251a8bf225356324956f629bd173bfc6a35b7cc18f6a53e42fee

    SHA512

    6147fb8b18a0e7d0446507242f2a0e1670d7940a5b7e6dfc97ac9f7e94f27ac061f675d157433d0fbf805ed9d9a534bd0f0f1cbb838575c264f074b9bd78b74d