Analysis

  • max time kernel
    104s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 12:07

General

  • Target

    http:///root/sample/d3a8e9985ff3bc4da4dc10d7d941bf57a739ba04

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/d3a8e9985ff3bc4da4dc10d7d941bf57a739ba04
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\37WVJT6F.txt

    Filesize

    602B

    MD5

    ca3a0a0c95677df9df8027a516795de9

    SHA1

    c7b3a8f28ee7d7431369545aa22daf3ab52ce97b

    SHA256

    7dad4dad7ea77e3c7b70c091f036e1bcf51982ddb9d29eb9315a147bb7f2d3ec

    SHA512

    8d804c34c7b40c08ce6b5fb5f131547be2dd3d8df2ef3e81209118d364db439afb3530b0f43f6c79bf7320cb752e3523f8b877be6df3d563f13fe874dd92a701