Analysis

  • max time kernel
    109s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 09:10

General

  • Target

    http:///root/sample/4de4bab0c384dc7d04aeab0f2b181a8feab9861d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/4de4bab0c384dc7d04aeab0f2b181a8feab9861d
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2LXRONM2.txt

    Filesize

    605B

    MD5

    a1778966653d16dbb39aa8341dae37f7

    SHA1

    814f773d7c82309bdd920d19c818be627649c215

    SHA256

    4757cd940f87797c62d248e3a86ce1869774b7e622f8682e7a3ca484bb37c26c

    SHA512

    9473d3c472920da1321691894a134c4b2b1241d771d9ad93d66f61470333064cda1b10857173ac016056ac803a7fb4488b81a47042cfbdd8b56b2b57cf52b6ba