Overview
overview
3Static
static
3CCProxy.exe
windows7-x64
3CCProxy.exe
windows10-2004-x64
3Language/C...GB.chm
windows7-x64
1Language/C...GB.chm
windows10-2004-x64
1Language/English.chm
windows7-x64
1Language/English.chm
windows10-2004-x64
1web/cn_accadd.htm
windows7-x64
3web/cn_accadd.htm
windows10-2004-x64
3web/cn_accheader.htm
windows7-x64
3web/cn_accheader.htm
windows10-2004-x64
3web/cn_acc...in.htm
windows7-x64
3web/cn_acc...in.htm
windows10-2004-x64
3web/cn_acc...er.htm
windows7-x64
3web/cn_acc...er.htm
windows10-2004-x64
3web/cn_index.html
windows7-x64
3web/cn_index.html
windows10-2004-x64
3web/cn_list.htm
windows7-x64
3web/cn_list.htm
windows10-2004-x64
3web/cn_log.htm
windows7-x64
3web/cn_log.htm
windows10-2004-x64
3web/en_accadd.htm
windows7-x64
3web/en_accadd.htm
windows10-2004-x64
3web/en_accheader.htm
windows7-x64
3web/en_accheader.htm
windows10-2004-x64
3web/en_acc...in.htm
windows7-x64
3web/en_acc...in.htm
windows10-2004-x64
3web/en_acc...er.htm
windows7-x64
3web/en_acc...er.htm
windows10-2004-x64
3web/en_index.html
windows7-x64
3web/en_index.html
windows10-2004-x64
3web/en_list.htm
windows7-x64
3web/en_list.htm
windows10-2004-x64
3Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
CCProxy.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
CCProxy.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Language/ChineseGB.chm
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Language/ChineseGB.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Language/English.chm
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Language/English.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
web/cn_accadd.htm
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
web/cn_accadd.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
web/cn_accheader.htm
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
web/cn_accheader.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
web/cn_acclistadmin.htm
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
web/cn_acclistadmin.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
web/cn_acclistuser.htm
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
web/cn_acclistuser.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
web/cn_index.html
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
web/cn_index.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
web/cn_list.htm
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
web/cn_list.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
web/cn_log.htm
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
web/cn_log.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
web/en_accadd.htm
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
web/en_accadd.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
web/en_accheader.htm
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
web/en_accheader.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
web/en_acclistadmin.htm
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
web/en_acclistadmin.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
web/en_acclistuser.htm
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
web/en_acclistuser.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
web/en_index.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
web/en_index.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
web/en_list.htm
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
web/en_list.htm
Resource
win10v2004-20240709-en
General
-
Target
web/en_acclistadmin.htm
-
Size
2KB
-
MD5
007b6c52af15101477126f3f93084b74
-
SHA1
03506ff74058f2b39149118636eadc445ae06ef4
-
SHA256
169adb6065e1acc7c32d8fd72f29d532ec9a691a5c71187d1c6352e34fe89953
-
SHA512
fc9fae64a66842817e06e8702188b5ad1449d7a82d265898a27f92af78ca27f20369afbff9558b8dced7352a402fa4b8becd64a83eb7e0521a765efc372fc010
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802758eeaadfda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19817831-4B9E-11EF-B137-6E739D7B0BBB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000056b27216274977667e4d61f1974ce615431903ad4cac0d0cef3a162e82bc75c8000000000e8000000002000020000000cfd3dfd9c4932427698d6e7bc1bf2ec46d25dc30caa491492c754211e522946c2000000074e163c685cbcc0b2d255d251c9215354a6af6bd048e965a374a72e41143ddd840000000fecb88ed3752a6e914766a09e3c500270c4401f1c6a3c0bf4d0262c433c7d4d1a85a04510a5b03690fa1cec50598023c65e3a00886d5d1f855fc725c32ff6f69 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428194657" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 296 iexplore.exe 296 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 296 wrote to memory of 2300 296 iexplore.exe 28 PID 296 wrote to memory of 2300 296 iexplore.exe 28 PID 296 wrote to memory of 2300 296 iexplore.exe 28 PID 296 wrote to memory of 2300 296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\web\en_acclistadmin.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566be8f09ba79845e5d2c81583337dfad
SHA12afcf855db1864aff8d215aaea1575332d9ccb46
SHA256046625d28afa1c3a2fdd95cfbf7ac5e799684d893491977de18ccdb9b221774f
SHA5129a04d01e0cd32e09e160b99623449ac251498a8ae37ca9a236f642fc6b2cc923aa64190537313b534fc1f60f1f92780f5581c38e05203779710a4b53d4dd81c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0808f64dfe4e07d2e92a916704300e
SHA178724b1472cd7ccc5c3ea58f633e5bbe41cca196
SHA256d745080d299364f665ccdcd884bb7ed1378f2975516b090110ba0bd7d89c00b5
SHA512ce51205e182b68e3387c2735c5f29f1df0bfc0268a08e7b175a16996364f000d70be01e5613fb66f742853d42fc81bc6023815fc0a7dee1f1ce80abe0fc8d49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abfc8fad7b827fdefe1f8cdf085da595
SHA14f6cc7b2c161fc54c7ffe467eec0a008bbb7e8f7
SHA25695588e95e5027d716db6c5ca4e10797e2945493706759d3e5bfe31f7ff7eb971
SHA51254221655b02a127dacd0189a18df8861c16c17641294f16e5fb9d98d2a06c941dd937e2062b2d721469e8ac230c0de7ee47d62440c30ed9861e68c8b403af60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbaf3aa63d8bbacc4305eaf5ff1cae03
SHA1a49852b699bcb5ee1bb923afe5aefe7d8d0529a2
SHA256ebbb60d337438a46c87e5faf23cc2d4d9979bdc8ec30d889504e5a9952687da0
SHA5122e3c98ec6f18988cd13ef42998a2312cd22b64267b2ee2cfdffdd24ac7803ce75de3b66e1445551b66945b0168513a2a2357d3e189d6e27f3296ea80be06b2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669ec2bbf4308a430324c2b81aacb6e4
SHA1ce04369d45dba6d8930d34a4594050ab73bb4621
SHA25644be1500c142c1754cea0d86fa92c279d56985597c51edd79c6a16941e90f377
SHA512354b833cc88e817c8ae495bf984d260dffa8054b5c9d0d69d36e22d9673b8607f8242d259e89423ce91ca8fdef651fa3de2e5088a5a7898b295878d6aa53fa1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355495827141ec5333e193d8d2d269e1
SHA1b2cf9051b15e4e29538c2c82f8cebfafc7cf21b8
SHA256e38e55db95d29d597e65f9f4f1265b51acb7bc868c429d485f137ddca1d77047
SHA512c061cb9587e97ea938187ba86b05dd0254f9e25dc19b916268b57c7f075f0fd852a10a02f040db68cb7b90c879459ff11d4d88eb2857ec50e5e7b1ba3402aa53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a7f23cde099236e8cb36faae00d9b8
SHA1b1f947e510553a3cd4aa64844cf75d1728fadfcc
SHA2568ce610d39ed70b8b775dc0fdc0ec9aacac36f66adb39c4e36434851a01855319
SHA512f8d2d58746d19e4f05be3ac22f7bb10635d7a3705974424453850ede5a145723d69e9c661da8bdf83174f3b2389902c7cb1d9c30d5a1f14cc3ffa5c21139c55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aced438983b9e1c4b0f9427ab537e36c
SHA1fb084659574e292d6441e730a0fc8aeb2cb4a2db
SHA256c711e0575edbbcd2a3d0bb2d5215ef3beeffae38484bc9dd4439eb5042460b41
SHA51273eb903bbc0d51dc034986fbbe274be0f69d751d6b996a15f833d0364f737afa4f327d8a7ba9a6ceaf9bab1a7119eb386d28211be472180acb1487d758dfe909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53494650025a445ca7d25e6a0891e73e8
SHA1a3f4f2650bccf87f647a2fd57b74d2a0b85840ee
SHA2562e99576422197460a3f25711d52c6710ec1f30fff24f728061ea7ea1d89f7388
SHA5121f7b4b702a3ac12a2a3687df347e1b905bf1bfc0367c5ca4346c33cbde08dfd36012c7d0136f0af919a994ae493d8ddb17efe922309939e2ec47e1d4ffd26faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d35eeb3c58ed2f99141d976f2f3b39
SHA1824bb7d8320b077f2cfeae1195c35579c7e3bd90
SHA256c1e89b535b2e7b8030d18c681b8ecbe3cdbebb8d6ec008acc5ec8e35564b3479
SHA512b40bb6b82d93034e317cd3bb376cad8a2587556bb128331ed9362ff4ab85661a12489e93d7077d0fcc482484b65069cbe691f33186aa0022163790bd96034431
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b