Analysis

  • max time kernel
    94s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2023 07:12

General

  • Target

    http:///root/sample/1b211efe34345648a262c73905bfb153b41d3576

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/1b211efe34345648a262c73905bfb153b41d3576
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YTW9TJB3.txt

    Filesize

    607B

    MD5

    b904f04b00baa8fa5ea9e4892008f1d7

    SHA1

    ea6899f9d4eb4dfe38db142735db7db06397299c

    SHA256

    ec80b3b2312ac8e7b0c153700d410274aa8914f4eb39f7597f49db897f3540c9

    SHA512

    5f88c7b5edcee4b5f196fd660cd5babfa8b4e20c65c3157c810669926133e22b805c90efaf97fb53f64086209221c71e8a278c14b3d0aa81a277fbaf000f9e51