Analysis

  • max time kernel
    96s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2023, 01:41

General

  • Target

    http:///root/sample/e273ed4006351141814cf90df96d4c72e0bea019

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/e273ed4006351141814cf90df96d4c72e0bea019
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:288 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y3JRZ1FQ.txt

    Filesize

    605B

    MD5

    4082aa533216f362a9f217b16fac1d5e

    SHA1

    7c5bfb992d021d6040a92bf00243b248d7b2905a

    SHA256

    a8fab2c35ec61746e649e1790dbf74b064c9ca94c3329f9444967c8638b1ac2d

    SHA512

    594e59f5b65dbb9c9eec8a83382069c4e99cea9b65cb6220519839be9da6978baf7d654f0e15ff0eda2cb3f9eb7c28a056ee6f859aeb31027b61b9be08594a45