Analysis

  • max time kernel
    100s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2023, 03:12

General

  • Target

    http:///root/sample/683a288343e00069c5455a90524517533f1f49e3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/683a288343e00069c5455a90524517533f1f49e3
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:820 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8LRHJQXA.txt

    Filesize

    605B

    MD5

    abfd48fbf93a3f9ac30eee12ceaae5ac

    SHA1

    df1fa3cc1c75889a3e2d60c0499ae7d5af32b708

    SHA256

    ad138d8ee3a22b45fe769651a679e34e81d5dec4d8cbb14e64c86a8b6fe18b02

    SHA512

    b2eb9c4dcf7b228afc56de1cf5d8b3536d0ab6b2b25a676801f2c3bd2120dd11b006b5c67f6cfaa9e2b2d8ac3f248e501b04cff5988de25acf003c0601dca8d4