Analysis

  • max time kernel
    117s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2023 09:14

General

  • Target

    http:///root/sample/fbd1236363da973301cb176eb52282a474cce429

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/fbd1236363da973301cb176eb52282a474cce429
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EPCJDRRE.txt

    Filesize

    604B

    MD5

    2d9edf0ca9259eb9d9f8e101792db744

    SHA1

    a4c68cbbdf5991c8257b866973e7c8614f78bb83

    SHA256

    96c703d865d6184f05e56380b6e0e7977dd3cf9ee1ba0c805b86dd0ca1742351

    SHA512

    ba8b7018b5171d3dec486fa407f349eb2345f34bf7aa3b869489cdc0bd9d029ceb83458a71999f6ddeaf8bfd21ab6049bba241346b8ed5a99b759c1ba5169b09