Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
0P7Aimsw5FhWvjtkITkuZwmOvQInMajLMvAlHGad.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0P7Aimsw5FhWvjtkITkuZwmOvQInMajLMvAlHGad.html
Resource
win10v2004-20240709-en
General
-
Target
0P7Aimsw5FhWvjtkITkuZwmOvQInMajLMvAlHGad.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428238392" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE4ECFD1-4C03-11EF-A669-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300869c310e0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000b79300e7b89def9accdec8d9e5a5f1f01391d1de4cffe74ed3548670dc398be8000000000e8000000002000020000000cfe0e15668a90828fc093ff0d75ba20f888e985d9235c3270316df42fae2ab5920000000de3e21b85a1caf2f4078fa69ab520f40d2ae6fa29b75a7b8ca2d7fcffe4472ac4000000018115d3abd4428a5b9340bf958e13eaf84f33e54397dd5182a351dc740d4f0ed6ae0930e70bfdcdd5f35d4e4b162f852ed0f7f2b0b000923a3ad8a6ec98be96c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2840 iexplore.exe 2840 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2840 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2840 wrote to memory of 2728 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 2728 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 2728 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 2728 2840 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0P7Aimsw5FhWvjtkITkuZwmOvQInMajLMvAlHGad.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD528e905425306ffa486e0ba83361fbce4
SHA187cab61f1ca165d8b6b5802e7f79d1323c87394b
SHA256a57a487f5190cb797171f7303e3cb1c62c539f4d894ca04ba0dea71b164bb9b5
SHA512859a648ce05ee170aa0ac0b5a80dc8e48cd7f679babbd9d1a9e5c05927c9a0dc876ff22be7ac17b3baa635f30da6cd9f1caac1300b44bf5800d7cdec0c8d0dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e5495bf5092e41a65db4caa9100f4a33
SHA1269dabaa6d361fcba4021af8d3c58ddb0dd0e696
SHA25683cf7bea618212cbbc5b620d466db311d08a648a1f43e22a55f01b8dc59e643f
SHA512b1864c945d906b39b66837aa54d52caa660c84be15cb04596d69c32e7d706d8786fc5860afa335c17ce736d06f960ae8d56c445eb8d3d98b2e1231a2a22c0fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56cc939471528fdae62ba18b33062fe17
SHA1229bbe20fc54b9c531fb03ddb088a3a3ec16a8a9
SHA256e40f9efd082fc12534fb56c52d36f6466472e96cda6168a68c0109405506f201
SHA512ba357704047154c9de6d50423f010227e8f421a4a9f2a79695916e52fe27256217b68aeafbb2a3c11089c691f05556918e7bc0efc4cfc488f8a87caec451e9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD564334d7dc8ec0955ea6d51ec08861373
SHA19d5cfc59e03f91175390386ef86a58f75c9fe12c
SHA2560898f67e99f399ba092696b9d95ba52d43ffc064df6bfc738a557b0e4efaf937
SHA51287d2a4a909d6a776363d148705e209f8e99127058fe10986f2565a7b7e7deab5b02d2df70f5dd97325102ec310d9cd121554454d67fb63287d9e8337fe3a7d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51fdb8b80e9c2c199fbca6c82b09f960e
SHA10cc9bf3cb7299502ebb838890e00a26fb4757644
SHA256e1498e44b4c641ab876072d4e3ddbf63093bf4432786cb48a639a72ead43fd5d
SHA51200cbbd10b2e2320001b373240467d89afd7b1572f3fad6a78c1bf74a7957e84cea02b5f5fe3e97174c492301a0edc6e7f42bc4d4e88ef0f3a8785e025f86fd24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a5fc3f05b6fd83faaa152126137441bd
SHA10c9fed4ea4d36173fc700b844d6a54d144bac9ca
SHA256231b9749366f650918974e90cfa87b83ae060e547c3a0560d052df660aa12b1f
SHA512d5b6063a4a3d0e974943db6cdb821a72ac9956523ea4103161975a17697eec920afbc972a74972ea57e05cf822f2aa295e1ee6cef1dad7f4df75f209d15519f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58e5f909d98bb7948c50633fa50a9c841
SHA1f5882463f5b1ae468c6473f1862a6f95e7c78ee7
SHA2562d49f1c19244b1e09fa213693133ca89985d5abb9bb1a5980d09cb23d385e67b
SHA512489d3c141c5b3dec876b43ce94343bade76e0f39aab67f211b767ba3fb604ad8a94da288e86dfe86c71f79496c7d270b06396e2ff4983a04fb0e5887bdc6d287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD558199c4de9db02be064dda86b7b66c24
SHA11dde1d0947d6a018b3145b26727b84a22ac9c660
SHA25698c81b4b87f93143f2062980798f1aed37efb70a7fc77618a065da7a108ffb1e
SHA51296f73a020aebbd6078c4f9c1f3e4a47d9db8a644c71deb73207fcb65c48489a577816188a2223798424775b02652f3d7156d814417abfed898c2d07c7aa441c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5be7deeeb105cf8c0c524c73d44d2f4c4
SHA102823ddb7b7d18c067660327949be07add7ce46f
SHA25696f883b6f3d0ebc6cd95e57fcce4aecada7aed29e7b068c310a87978795cc0fd
SHA51216f7f1063060cf16ae7f5697dada5161cc4318d30893d793d6d288e1ca133c3d2070aab602cab5d0e0fb2ac199641856cb92316c3394f2acf8d7a393edb66e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bacce8c56ba19491f214172fe5926c99
SHA1a3f4ce3caf5a2dcffc7e37b26b6797d64489d3e5
SHA256d8a26a7eb2c0576574e90c206100a66136fd20d9f36d2335ea529465190f0818
SHA5129bfb0fd316e6de07eec36749318fabfc056c6c548bf14b822cb4b1929eb02d9c0672675353f37fae8fa881a1188cf43b178468331b49f36a3212e2162593da03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f4ed49e1cae44f60c4271b425f0980a4
SHA1b909c6f9d89d39915a8ecfe18af0b025278e5728
SHA256aa855e6f1ebc9368d3d6e589c7eee07bbc4d09d36fc42712cd13af8c9ff39279
SHA51275d34804230c50b016a35a51cb2071fb7d9f7b421be6a9462d00bdb57283179a3b874257f2ca49cf660abc7c26f30dbe50e964153b42746122b92494baf3cfe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55c5783b08368480a5f07d8d1e060ed18
SHA1c96ce725b9036eba92d7f8bdbc1b424b5935df29
SHA256898f2e7f657c54e9a4ca24ac76fc645d32f2185ca7943494c39148ec47fd65a6
SHA5129f9bb13ea1ec25176e55513569a67a001414a6c8471359249565efe533d688ebcd46da3c1fb216a2b776ea16ec9487cb39063af0bba8c57035502f39fd05426d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b9131c711b203fbaaed0b62ea61b8d39
SHA15fad23d0b03817febfcc70a3b007301bb10b1c48
SHA256504aa9998d46da180f9a92f697beec9d2f0c83fa3c4f668ff636622357e160d0
SHA5129e636c3b25e525c28e0041b59976cb27178b58f827f510850e46784d63c158349901867c0b0fd4100ff5907b525539dece142aca36ed58d537a7604878e30f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56ec6e0d144732e017ba0520cc24a7c03
SHA1bf066fa4b6c3a043d66e6c451d15a9c7c46d3273
SHA256ec9161bfaa09d519a71fbcdb7b134fe7cd6478fdd02926ec29a23711639f4eec
SHA512e48a16fcf75ec48fc5d70dcfd7ef4759b1bc5753c20d541afcc4fcedf8208e76a74d23771f6fd50507e4d40fba148ae20b059ce53288034c04f6e5aae7702c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e31968178c67aeb99ada652e44ba361c
SHA1171647167a1cf77e02b597b4f8be18dc4697f76e
SHA256c1d8a04203062641da5ad5e2e3c0e9faba9aca6bab8dedeaca6c78722b96f6ea
SHA51212725ba8bf5c1507526dc1f33f2c841b04a73aa85b87a30a751475514c3b5c52b3c01ae97c088d900a1e4d8990bdac8c158c51b6c4ff14a077ae551db40dba6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b7f092e307f3461ff49976813aedf19f
SHA129b4f483f4505d8fdf5dfcca4f6462d64eb33444
SHA25631ac4c356505840cfb34791b4521296a474ea8fa8bfbd2261af9d2d6be90c38e
SHA5121e5644828f5aa3d05c35c9cea080d437c0a624a6f29b8c71e0f369ed73321a5419504769030e380c3329ed2018ede19ecaf18174e66961e0897537c3d5b3c88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD589011e764fc897eafba2008c9352b536
SHA1fc586a28e3e754720b3ec8d30457ac4e6b502e84
SHA256dfab1aff359e8b903b3157f4be17b0e4507376ac2369b51fc858eee20385b6aa
SHA512c62a2d435f44bde35558a34fac202df07bdb566706bd8010beaaafdcce2dbbd36749ac47fe1e920fa5bbe65188a44f33ac64039c8000dc17e0cb051910531d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD575ff7b5830118ac5a0a79c2deddfe2b5
SHA1a8436770afd9ae2a05c8dab5fc68279d8c128433
SHA256020b917cd10df14fb9139acebdd9e08f72553780bb551ae7a15270c9912a0119
SHA51224ba9beab1e8c2ecce4c4892aa210915cc27f527ab3c4e068b7188b0204764d50ba132a3ba21c82f80b6a98af6c299136fb268d12926579367b3bd1b61ae9674
-
C:\Users\Admin\AppData\Local\Temp\Cab8ECB.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar9063.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b