Analysis

  • max time kernel
    96s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2023, 13:59

General

  • Target

    http:///root/sample/93fe4987220dae1e0668da8424d153d5edfa4f39

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/93fe4987220dae1e0668da8424d153d5edfa4f39
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:868

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1CLC7H2R.txt

          Filesize

          607B

          MD5

          5b9f00803a93877c1fb004ec9eb2b90d

          SHA1

          a5e22d71de8ce7e587ccc8bef942bafaf1971c49

          SHA256

          903f18a74dd91c98a6650064a2664648a53efdc3a1520f3452ebbd5d01da93e4

          SHA512

          96a355e4c53d0916928811c1fb79ac8de2e963ea65f155bd7328aeceeb2fde7081221c1a4b04c892ac03b2327a154487f27489aecaa6f2302390d4f6b024c5e7