Analysis

  • max time kernel
    93s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 12:15

General

  • Target

    http:///root/sample/12f13192ae5f194544552e68c6322ec03a3ed304

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/12f13192ae5f194544552e68c6322ec03a3ed304
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CEO4F0B6.txt

    Filesize

    608B

    MD5

    191175547afcf0782825f152cb316189

    SHA1

    1d01b16741741b1067d2d10f555a74ba4e49c0b9

    SHA256

    6c7d927e052692cf5d4ce2957d4aa8d9db5e8ae90994ec048c6ab17784b147cf

    SHA512

    b8d6b467c375f14131a1ae740873822a0c8ca804692b4576510327daedda7abbecf4c43a81dadcf352e60d0e24c6c16d82f227b61a9eca17d990fc48a3182e51