Analysis

  • max time kernel
    108s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 10:05

General

  • Target

    http:///root/sample/52307a67e71aeb2e2b33d3b61d8333b418e26957

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/52307a67e71aeb2e2b33d3b61d8333b418e26957
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:740

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0XVKM49Q.txt

          Filesize

          608B

          MD5

          f151a58e82646284cd674e445095d325

          SHA1

          f13bbb407252d94cacf8ddf6cf430d5552e6552b

          SHA256

          e0e65586a84d96236c8693c4c160cb70a68507fa7a62129bdabe357cce5e29dc

          SHA512

          6aa7d4abf7279491b6028079f7124ecbc6bf92fc66de9d7e1e11dc6a97f3691dbc5fae456c60241c9e73be2f735d3da66e5a1e3530b65c6a9b2b6c152a4b4410