Analysis

  • max time kernel
    103s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 05:45

General

  • Target

    http:///root/sample/5eead43f3670619b01f2b03845ee58a485ce3053

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/5eead43f3670619b01f2b03845ee58a485ce3053
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZDKT486H.txt

    Filesize

    608B

    MD5

    b88bfe74843fa529c6a79b61c7564dad

    SHA1

    2992e4425bbdb851742b32d43b78933d3d78fb17

    SHA256

    2a1e32e51629288d288ea5886a4443e5f2f21da096093b986e55d3de4584b31a

    SHA512

    d760322911c0ca7b0874ae79f75e129f423d148fd5fb72df3f466f3fc2db32ab0d1f4a1484d72088f3dd9deebf25e08b9d8094071704beaf59b060f3df6fe563