Analysis

  • max time kernel
    124s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 16:28

General

  • Target

    http:///root/sample/1043ffcbf19726da8b39d0a87f4fde9d4c04157b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/1043ffcbf19726da8b39d0a87f4fde9d4c04157b
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZG29LMJ2.txt

    Filesize

    608B

    MD5

    124a8823cfeea0b81567989bf58abf50

    SHA1

    ae7d8d5f4ec1c34f5fac3b33ed6aefd5e238a2e0

    SHA256

    96ae96c4d9ff133cf0bc52b12361297898d53e71e059a25be714e683ba1b7fb4

    SHA512

    eb66dd605d6fdfcdf5dc10783683df275054f2a046aec008fb02f8f9ed59aa28bf717a01881c03b26a516c1dae2ece0ef618a072e84f4470a82f91c52a084d33