Analysis

  • max time kernel
    82s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 08:11

General

  • Target

    http:///root/sample/c8e99a233d916e2f6e267b41a7a8b0e4350ad7a4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/c8e99a233d916e2f6e267b41a7a8b0e4350ad7a4
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CJALLI0L.txt

    Filesize

    603B

    MD5

    d1aec29196eb2b55e86a52c161fea4d8

    SHA1

    f2134032d3e1ef022703291b13f568159567be8c

    SHA256

    9d7a7c6f0cce95c82a9923a8db95d6fb02c1c0fa74273574645adbc6912d0e01

    SHA512

    c70c05f5e39ac45d679859d0d46b0da0d8599b8f13e0927b519df6f71f8731c8084b4d6bfff1bf783dee1ea4992ca77f4a9500dacc269d2d00c9516d5a723b6b