Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
9da282c9d922c0b71b2164cf3d53ddd0N.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9da282c9d922c0b71b2164cf3d53ddd0N.html
Resource
win10v2004-20240709-en
General
-
Target
9da282c9d922c0b71b2164cf3d53ddd0N.html
-
Size
33KB
-
MD5
9da282c9d922c0b71b2164cf3d53ddd0
-
SHA1
09f190d45436120fb2e2979529acb67bea1d9fd1
-
SHA256
30bc8605866a0e0af27e2448e62930c1e9d9f112ebcb80964763da2208738a2f
-
SHA512
f0d6673d6e15e921b8a8ae133c4a6dc9c653a4fe3fff26bf5299c4b1072913203a12c06ab9a05e3511183e574ddf3536ce24e19d004c29fffbe6e9c986e7cdc4
-
SSDEEP
768:qI+v1G2+0MGi+vZGIikH2GRGXiOgOTGlGlGpPENDHS:F+v3+0U+v5ikHMiOgOxNDHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000003d872b7b34a3b00492ae3d38d90faf56fb676c6b78411ae8a7a1b06c25b4133f000000000e80000000020000200000004b4d43d5ba020820a99f38fcb682a2e7224404e8c56b69b1198ca1a05f4941d920000000c106a8d59651edcf01eb75f989fdb7315c798ce016ace12318784eca5768c3034000000058ff6c00e0aabd66bec6b45cb5ef96f575438f25df5d77c26f966f467619fcde22d670118c6ed6cf19548381f4eb7b0cd43d0bb45d4fba556582725823590400 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{795273B1-4BE7-11EF-884B-46FE39DD2993} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cd944ef4dfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428226169" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2788 3036 iexplore.exe 30 PID 3036 wrote to memory of 2788 3036 iexplore.exe 30 PID 3036 wrote to memory of 2788 3036 iexplore.exe 30 PID 3036 wrote to memory of 2788 3036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9da282c9d922c0b71b2164cf3d53ddd0N.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce37e39aee5d234c8288bcc47648767
SHA170f99defb259322fbd2191853b2ef866ee20524b
SHA256f1920090dff68ca33112339bed7dbeaa5684dc8e863e9f75a184465aae8fdb8e
SHA512417e0e060e111c279bbbccd75054e755721c5c61bf0c55965902ca89fadb8dee16264a7adc2cf370536fe82e393889e472aaa293d165ec00eb4fc84667957ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8971fcdc533f316948e6b266c601f8
SHA1f9a07a9d427d7ed0a54dcd6b2be53cc649180a98
SHA256f972510d8b9a06c95d4fbcef6917fac52ec9bd2093a7209dbc1ae406f92dd692
SHA51203ab75ff2dba4cf19bfd5a58156221af28236dd9d02db7b3bc4e7f0ebf009f59f40853a362c116a9481740734a7079518e83f3a40fec660cf7843e11081ed764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa5ecd716f96b7d1f11bfc657a9e404
SHA1745f371c19ffb31f96620122a531887c24a84ed2
SHA2560bf1ef177228401c7f976ffec12bf4163631b3695ab68d28ab457a28a44a8415
SHA512c245a4b8a5729a38a09e92d79944f4c56b7c66ea5b30e889c6413c9dd3f6cb74b0308a1aad88b0c22a0df7f72c788ef4f75b5780113c3b420c174345584ca9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a0da413213230f17a1e28e25522984
SHA102e71b418d2e45354b28283b221575a51692620e
SHA2569fca7b8f7b2b269f39e777e1d3e042fd3fee4fb2a7922e6dadd80fa2e06093dd
SHA512c941175a960f2a7cefc55386e2154a0bf82c028461dc338c3fc8cfa9f07472e65cedb42cb9c451289af9d32943cab24af907bd41fbecdce7f00d908124dd63ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c6ca6a98b8e9bb1ab648ff56a74cbe
SHA1fc1e6550a663f51c581211796ddcf8ff8a19a2ae
SHA2562385433aac25e2cdf0da89859612812ac533099cb509379d535c9b5752487bf9
SHA512a3ddf88dd020f83f170a832fa0160e8ab99dad1370709b9c4f8831d4b2444c27a112ca660095a6a39391e5d9c4ba1e37cf89c39fe1ca1beeac14bda4de32befa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55339fb9228191fd4d07e16829516836c
SHA1a90e52b6aa3c894adb6ae9e8aa01711e5429d470
SHA256c44430fcd8d3336e487365368cfb475733460c816f07713014f2d33cc4c57ec3
SHA512f003f0b9c5632b933362ca8d4e73f2981d2edd036c58189f22882a80334309651ee9dc719a81617a4a5aaae067c9593f6f06e5d7cb987b7e6f1b0c989603957a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ee5e1d0bfbf0dd11e9da6354836441
SHA1dfdb903ce12038ff96b1c302f9ace8c0aa85271f
SHA25648d16789cdb30f3491cf57b7db2560235594a6d48699be894ea1a5eb82e2f8dd
SHA5123c99e82bbaedc66db63ac1f48d723c837aecb1977ada9c94a24961eea47ce765f34a80450187b3b52d54af7855ba149815e8b21a5e71defe376cefd17b01e810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb09c46b0f8d5220c9a46ffb32734c9
SHA1bf13ec1b3f0ef174fe65de3e18cf2a7594e11b31
SHA25611fe4adcd1212cd28cbff3cd344e135d4a54464a789d6ca2b02956e9f3980119
SHA512ddf2c929120bbc836c0c689a270b9730303a0d0a201b204ea67900d0e9853336d2e667a0d0b21ce6878c8d3eb285bafbdacbb6214a9b7d2da0aed5cc4dd9fa45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c164beb76e1aa38b366379cdd9af5167
SHA176c4b26cc18f87f05191a481364cb8afe0889394
SHA25641cf0b6fd6251d1e3b1258de9eb7a6ccedaabf48f7171a63cc2847b5d6a02ea1
SHA512e0acedf0d0e690a43c2f6492454993b71c312cdb7dda13640480b2c7905d7b93c57812bdf7aaba89920e1bc488d7a14f359537ea929f5ef5bcb0d03efd0b5b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085d2a4fc4e59c06b7c92fadbb851d9e
SHA11bf077d5faf664ff778aedda58ead8456c2f505a
SHA2560e3c99cc34d16f05dceabfb4440d1750470138d35eb7e61bb719f0304101a08d
SHA51225fc27041cd55267cdc4c45ebfea84726de89292fd84b9bc971b32ce55c6e6aeba3246c5a5cc0a003dac30564cae7abad9ee65836e787b75439201b7f8cef3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b49e567cf99eefedc995bf77fbeca6
SHA1bc7f57b04a53f760c911ea7952dc7f91ccae264a
SHA2566b5e80f89db38afabe817ac7dcca28fd7768284622bff145847a4ed25ddef149
SHA512ba77b0af355156a90180470e0f7e3274d22c910896e9dbeec8d8c3d8f1fa1492d39837ce73669c6670439f62c298ae0a53e181d49c1c1039d42db8925840f944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a63c08c7e2aaae92822945632c78af5
SHA1026c41024fde53874eb4ee84f0ffc1da363e302f
SHA256dabc79ba3922eb259051137ac9743b9b144da797dafe0f43d27cd4225103fb95
SHA512465c71f036f9d864f4b03ede86352ff300d576c30b59742165fe2ce64ad43e80faa82ae5868bacacae55bdb6464e68b081e5f3ec5183cc9967b21f46ed1d67da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f976608051fd4b233cf3a996261aec43
SHA162376bf5bedf3637a8276d4674346576a6b31ec3
SHA2565f768e26ddde9cc279e80e3e0c4d387ff32d51755aa87dc6e5d5e0314f445ca6
SHA512b1195b8c4f5ea9d10d9a9f895046e04d31475f09aa91a50fb841d1e9401063dfd7fa5abf331f19d2338b6b0727bb7c840080ebe10fdccd5a48c81ed3fb318e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57492a2da973faf3e7f233e7c62156792
SHA132359614814566a3f86c64b1a89881f3b1e6ab98
SHA256b5dc2ee9dbd9c3dcaeb80983d05ef857da893d54b5ee6d5548b7316db3f31b00
SHA512356eee17226475b24be43ab3ac9cffacd2ff6a9381c865ccbc6c4d70f710483fd27b02929873d02843889c3cb258f125d1bbb0e59845e86761b068930d32638c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e03ecec4c6cd1111f984e8774e8a1f8
SHA13bc41f8cace4bd9f0dd7208b4a442285c8e04eb8
SHA256c6e57074993f38858571f981879b1f40fe2cfb961956f2b5c1475c0a6a368155
SHA51263c6473e123a8dbb4b0fde92d609fa39908823ec3dd4cc90d33e10a56761100c7962fd071f466a4806e04884dbe2c046a6503ddfe3cf4c5d613d98e83a429e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111e36189dcc5fcbfa4ef5a4796ebfd5
SHA103246fb2e4f10fe4a8001557bbccf302ffccf94f
SHA25631625d0b7a985c1600238e23c3b8c23e8add3234a13419cbed1e9d94cac6ffa9
SHA512ddbbb65e1a8c1918e5aefc2b81d51de7f6aedd009d875503c422dfa3a6a5202fa96e1af70e7f779957f600a37ac4942acf29e7260e7c8c8dd037e3c538dcc8d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917d8d201eccf00d8112e32a48270a3e
SHA1a9c3ea3d341f17189692436483c94ba13a5e269e
SHA256cb464868ba3f308b4eb37470e5f9d570881c33a0497180a2d328bf5daca09d0e
SHA512d9e8c823c097b19cc5e77eb2b34c84204f1ead451387b2c25d45aaf8b74ed3f49bb559f25c10180068986a95c02b0603826f197eeee154a78e5fc197a788288d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50afe1a2e1ca417f826043c646d40b800
SHA17dd4f2b26f4b10fac3bd9cbe3ab54779dd842ba5
SHA25608ee16f63f7209a0c1f8ef7b724c82dde6f6c062e54242a0f6c303bb3bccc0c4
SHA51292bd1818c8524c19cc5f433ba70f4f57475d7ccd59cf31e949717214e17e570e61ad2de3353ec6208f5bb590ccbb0db809eb5b26bf7fc6fd8f0333c857f524ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b