Analysis

  • max time kernel
    253s
  • max time network
    350s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2023 18:09

General

  • Target

    http:///root/sample/8fee6efd0da6938ad8fdceabd04604093c29effb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/8fee6efd0da6938ad8fdceabd04604093c29effb
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OB20JGO6.txt

    Filesize

    604B

    MD5

    81a05d20919e25565c5e74f5e8c5e99c

    SHA1

    540e9bb4b45b20ee87d9fef9a8ba2448ab2554cc

    SHA256

    ce8cc828fe6314aea2bb09a196c2f9d5c389cefa13759728c3a7d76b847d693c

    SHA512

    a43550cba671fe46bf6bbca0fce3e393691de26d52fc5adfc1df0dd33ef1963fdc189c9d53cd862dc0e345746fc686cdfbf46701bc28be5e20c7124ea1a4bebc