Analysis
-
max time kernel
66s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
02d456797e42aaeb389c0dfc19e2e590N.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02d456797e42aaeb389c0dfc19e2e590N.html
Resource
win10v2004-20240730-en
General
-
Target
02d456797e42aaeb389c0dfc19e2e590N.html
-
Size
45KB
-
MD5
02d456797e42aaeb389c0dfc19e2e590
-
SHA1
cd44eefbd839a3e4a59055baabfac592c1c16b46
-
SHA256
bff6d56a89362a7ce6a9f15071aa5df55b0cdadbd8b27a7c970cc58c0a025cb5
-
SHA512
f0bf3da432fcd2b9c50c1ecbbfd146ddff63608e73d7d29523e29a630e0cda8b35ade897e6a1ee4b2236e8631b5118c4eb2969b9edda130349c0017ccdfae87e
-
SSDEEP
768:cQpposIQY86Vx1xLKSRrIxoQBXdX1O5MgJd6NqRVYJdwQxS:bHuz4/tTfwQxS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000005f9735af06cbd9efe18ac564bb999df1057a433579e983f966c7697282c663a0000000000e800000000200002000000071bdf5bc8eaa3cf2994cc6db1f2c674ae2186467439c9673bf7e9c10fddf6fc1200000004dd7a7da90666a3421525127b8f88051c2f3c2b78b97b4001f4478f680c5ca2140000000cf45d1c3a84425100065d35da9974cdb2ce15261882dbb880afe826d3c158de74e10773cc137bf3f9a015a0ef28f1b9664551afc0c9a5d9fe96e79b7237c40df iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ca732d54e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{551C8031-5047-11EF-AD79-76B5B9884319} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428707145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2336 2872 iexplore.exe 31 PID 2872 wrote to memory of 2336 2872 iexplore.exe 31 PID 2872 wrote to memory of 2336 2872 iexplore.exe 31 PID 2872 wrote to memory of 2336 2872 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02d456797e42aaeb389c0dfc19e2e590N.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a908c7f46ee19d35bf18e9a2c5b49873
SHA1ff28ae43e8f50892c9c8f4ac13583f16af4c16b4
SHA256b7f46d11d52abce182a4cfec7847062ae592cd7157aed4f6ec929aff94eba4fd
SHA5126a1745ff502a52c6c56a6744ec7a45cfd8b7a14adcf0f89459d4c5b67a74894f626ac7139054bc21cedda383c2cbeaa9d4fe8c534249a295bc5a099220ed631c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50df79d660a13448369605cb1a4a673da
SHA1cbe19223e9c36d0b8db1a8968714ccf73df67826
SHA256ea8d2b854bbc200350e5751488efd4e1c22d2ac046654c3b57c161f23a81b155
SHA51224e17b80af49a1cece48b33018a0e0323cae42ee8f5a0c4db6a209e28246a966924a4c0d57019073fcb49e05bc2b968e83a2e53d69dd5204857a7305eb78b50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55663f7920de06a3c703b638463409148
SHA1574df0e73560c7b9fe4ecd7e3022812a2cc7dc24
SHA256df768cddafaccad33c8f98f71e02ebe640ec87de7c756f93fbea2a41e112f0fc
SHA512a5f482731dc64a422ffb29aff29c7f1c305c7d0fb83cfb0afc43b6e08f8679210aec61864a2d8f0766f2e2bbcdef69d08e420952e94a3a2fb608238e33269074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53724327f460fb1a4de38f3fed69bd26b
SHA1752406a5f69dcf01865eb414953096e7e678e93f
SHA256ccbba2cf89b1857fccc0bf3bdd4869a3e0d6d883e0fc5b57c24da23d5eeb623c
SHA5120fbb60acec3f0afc29130b6267160356fa8b45c3337b5ba79030c4b9f322f482fb031e0b32b883711d25837c5265f2945b10de8e2ac41383e00a5c10a9d0ace9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507d142065c999b7b826f1f9c5e420a68
SHA14e83b04de00b97090d8d1c37d254e31454e5e6ce
SHA256ecf92cb59ccbffd122318d068bc2de6cb45c888a9204ea7f95d5dae378d7b814
SHA5121a723eaaabaeb215b4def8b01a363a3bc7e558741fec78b25dedaa907a54fdbbb2302627b59d61baf776e1cea451483fe35d44e46f100c1d122d6425a67f9f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a20086e92f95f5cb0696336004be075
SHA1daade44b9ab5ae7718a04712ca3e832cc5ebc8e5
SHA25685ceb602062ae014de275c129c1f763bd350479468abfc16576f482e98c082f4
SHA5129d1d1914d73cf4f9d3d436839dfc14f0334952c144b62a021f61e6e7346e68d301eaee535e8bc52b1d817b960dc1f70e1a587c74cec5090c2932ea7a7b812d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552ebe8a27914d5e9ed4762b2ae01b803
SHA1d3a5849ef53553d8633764e2463cf0315846d4fa
SHA256228c71c0b26473f60d5abd36d10a1d77e6fd4c70c4dca96489c26d7a6af6003f
SHA512e4f6fedcd4ec110284b0f9eec660ddf216c6b99e0b5ddb0ba5d0e676b2343c5dc06a63623fe293343277c3c389633da86d47ad391e75de02ce909f8f76d8e367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536edd51e27c87942610663e5f68f759c
SHA1a2a727b07787f6a248ca848bc6e115bfe02fd12f
SHA256b5bbd740c4d2c46c1c0c2e5ea7ccd9b0f804c3f086ba57455c6e949070673f92
SHA512454b3d730dd1a2a7fea91f2b969f2ed0cdcac0f5179f52be95115a411f37b03fede02fe4991c1bde668ef656cf30bd61c825095c0e642dccf37b33c3409b07ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50194996f1f2888f05909ab52365091f5
SHA15550214c8e3f0b86a9187c186e075439c1f180e9
SHA256c22b840f6bd33c407cbb76331d02a64e1d3d87672234661d0dfe9bb33f0ad576
SHA512a31ac7a0a49fac86d0d2d3ce8c63a5e04f146781473793dbae2c08f312cc7d32d90d483743058fccb7ef744d10a07d9715f68afaca599aa0cca86347a979cf74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588856f3be715e43367813a72389becec
SHA165db42bffd86fd547dfb97616d4b85e555c9ac15
SHA25657fcb24b1557617b8a8b81a0b8147f4bd2fa54357bfd7a831037c0ca4f2b88a5
SHA5122d92e6da724138326e5a01890d818d6040f53013e87cd0c9fda63a58b4d3ef0782a79f0aff45516ed3794fb0910a0857f9424d38be50a0931cc741ff040859ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f9572a0fde8ba00591b812c1c89b7448
SHA17455571af9562ca3367a91d23f96b7bb5344b8a7
SHA256f2e9e6bd4b0f4a91d4092fdd01c5bba637583b6cc4693fdc0166e272f9b1d395
SHA5124fac93b6852adb1574952fe93ab3311cdc2e47b9014a5a23033b572559606c57e9ca26cb743e56c54914a5fac3b85408b4d345f3a5161b5176bda7ec766f8d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f8cc226450699678ebe3200dee1d969
SHA170de044b4ce011f1d39bd29986ec8a90044b760e
SHA2568cde5f726af68b517879808a53e5bbdd21dc371d0adce51ef3fda33af7858812
SHA5121c4bed5241d01c13e98de57130c4285e163dc3793a1404dc634799862da5145bf78ff52872787e4c70e326ee207d731863d3fdbb32f91045c1a9e92b9d07ae45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ca2688f367f49dbb5b928bf85c32ce14
SHA1910334dc67926e60a3ce14f1f7202ecca14ced72
SHA2565dd3666125e642f1291b9afc5cdd8d6a149ef5a79b7b8d9a97221ae27be33bce
SHA512e58232ca832206856778348a72c28a54c9f4caaf04f61c02fe5389fd444f285756569d53bad6341c987db4a21cea1084631eab8d605eb95b4bc5e05eaab597b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c581ccdcd14ed77bf1f3100fc7bc318d
SHA144b4395ab6b5ace4655c7f73710b7ebff399e8aa
SHA25617a58f8c819a6dd8e5089604f89f335544b83bd3451721653c3da47a3c2a2a16
SHA512d4744242e9ab67ba911ce2156b3c81ceb07575fc553969cafa3940b33d8b7d33ab6881b361bd06d0b736b38776ee5a78f6ea0d1fac857daad1cecb85b2945817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4dc5d2444b98240fc4fa4802deb9543
SHA16b8ae8a2ec817ad286a88085bbc85e6f9ba11d46
SHA2563c350f4acb9952b5823cf3723df344083a40f3aaafeb58295ea7afaca62d2328
SHA51221e83a31e087cabfbe3b688ac011afd10d19f2eb32c8abef2404f1cce386fd127d8e7d2ea85c005d48863a7f39ae2a35df2285fd5135a1b0713335757e581dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e48e19537fcd34a53c6a7dde85d59a22
SHA1d75abc74726b7d66b936e2a6ed2df0e4f006d531
SHA256cbcb5645f3fc7b4f8675be42ba5f1fab72dfcccd1922a2cfd311a97bcef4b2be
SHA5126c1aa09603ca9e4a6188c2e1097e7fab8c33104e102ca6de502f620aa92e113b6e768ff003f3311adcad51772367946d096d329be26ca0e7f62caf83fc87ce2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD519be2d98a61877f96606759d0c549326
SHA12ef01beb6381acd32a37171b486ef6a6465ab640
SHA256992360b91b998d9a61d44d498897087ecaae95cf4592ab5c74188cad7e5fc1e4
SHA512195dd8015223d6bb735b79b1f645dba17caaf3b82fdc245711107689944b7ec881d99bd644587d24007e34da30649bee968e7c031d16dc14093579744cc34248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5343f946edc3392b5d3b2699dd76372d5
SHA15f92fc986e30d4ef85c2ee046ca9aedb7c90c97f
SHA2565d426c6da3fd341ac73cf859b1eb7e731200877aeb0435d1f4c6f4ec0758d4b2
SHA5125420be9d6a5227921d2b53b8faea7339374fd9a4709fb1f5ceb19039477264c7ff94961e7089179c575244680a1b0725719e9e8288fc3f66accf825368aeeb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD516dc54ac4557c1ac2528fe54a52e4b22
SHA112de04ebccfd037ce3e729e87e16b236b8f14a6e
SHA2565c5bb82b340fd6aff133609e13ee2c69561926e5c31582655a3cef6ca6ec6f87
SHA512c9147bd4927a5d3c8ff54403d6a16023fecc761d6b8beb55b2a7be529c4294bd43698516933b58fe4b2028edb86e76bd2c65878202cd4010ede49627e35e98ef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b