Analysis
-
max time kernel
67s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
340622.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
340622.html
Resource
win10v2004-20240802-en
General
-
Target
340622.html
-
Size
15KB
-
MD5
5b00f0c4e5587672c7d6b91007122395
-
SHA1
66e364cc6725bf30eaffbc9b5e8b364142f64a43
-
SHA256
d6f4e627f66cdcece61ed61f99cbb43c7bdb0760a7d851e4ec72c42010467700
-
SHA512
a1c990c9d0b764e7b662875c506a5126c91dd150a7a8ff001df5afb45fecf7297ee96ff49b68a028e828a20db8f1e9cce659125d0a9b8c18d0256f31386daafb
-
SSDEEP
192:PNxyShvK9moqTJkNrv23NA2nnqvD/S2H25+iF5CBAGPy0N:yShi9boJkNzYAsMS+a4F5N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428825750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b3d44f68e5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B53AD91-515B-11EF-BB30-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004e734781cdee7259f859cf1382070d31a97be1781d01c4dbf01a37da35664ae8000000000e8000000002000020000000c8aacff3788c4067218aa1dac5082dbd41c569b683d320d5fb817a5ec5ec4a2b20000000d50a94ea5d456b9fb5252549038002b86b50fd6442d232a47b7ed59bc52574734000000021956b0ecf29247c4acd224e69979e71424b197898bf70feb2ddc06025d65fa9bf44461adca8d56586a7874a3d8a872b80486a90d1bf8b566c67713527c38790 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2276 2960 iexplore.exe 28 PID 2960 wrote to memory of 2276 2960 iexplore.exe 28 PID 2960 wrote to memory of 2276 2960 iexplore.exe 28 PID 2960 wrote to memory of 2276 2960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\340622.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d91ea8ddb93751387422759d3603a1
SHA1db65da2efabe3d54acce7cf9320a6f5bb56956c1
SHA2560bc03be20b36673320135e0921d11da54d0c2c9aed467f3bed7893d9b3153cc9
SHA512840f7f3a9b928dbb36189b53461d95560a89d224693b74640e6672b3d9f8db39334b1527b75fb6e20f741b2fccffdf8eae4ae248c7749abab2f681078fc68f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4216930f4f2e3087867f0a825ff12e
SHA10a4bc15b6bd6f7151520c80e6b6146a97eedec3b
SHA25686f50392ea3f1964d32f100dde15432b4a40949758198a2e7a52f736b7a9d433
SHA5129d71e47ac04f75710f6e8b9104a7eaebd5b0d5d5d826b0d4b2c61cf2766ec1106f1567ec4877bf37477e7c08655dae5649588f8d3d30e82d02b5e42db3a240f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845f2dfac941280fa341b8515623692f
SHA1f246e7090a5cc432bd9f09a694a4dc0737c26464
SHA256357943dc4c094e5a3c60116508ab4b18835bbe5ff86efdd9ee958dfdca113566
SHA51222e6139a8aedd541b15de8f91b257470a32ef2ebe0596d974fe8e32e685825af543a4d794fc3140fbae9faf9b9fc98207a45f720521a12d8ccd934f5a1bbb8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9558765a8fe0b7a3d533a642b0c295f
SHA1d3d1b5350bc8b9c8905898072f401837f3cc8e53
SHA25682cadd7d1fed01d1f0e32eac0404406039aaadf519b75c7f95c4835427d17425
SHA512d9f0d162331cfaf25eab28a9abac0f65d05bd61a6e6844c3058a73a97f2109f1d0d476c638b4bd24f584b9f18cb3100a4e72dac79a3f9c719e73ba26fccc9fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e2951c15ffbc8a3b88702c8d1f952c
SHA1bfdef4c49b1c77aff384d14bf482a7dbf67eecc4
SHA25678e6b739314f9ce511c9fa492d0520c703ee174ccf5de19533a1e7e21b0c54e6
SHA512beb2583d1a6ad397d9616036d81a64f65b0d90637cfa50cfa75a12346f221b22e3c91b7783e30ea5eee65aaa78a4736284e2964b08e567944f70b609acb1fcc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a1130f65d65e508899be19656b2018
SHA1c9ca77b3682f94b88a0b6d5844642c645695bc32
SHA25669bf95d122d92c6d4f45f050eec36f2d9328c3b6fafefdbcc15d8467d1834d75
SHA512288a6632190cd8d4ed33f2fa26fc55350f8fe880ecce4bc622887bef2f59e44594ed67c6a3a54389147e7d8aa6d92d9cd3765aec848bf69b1863f2888dd2cb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe344b957705531693c4a33d8e57c5a
SHA1470dbd01878ecb982fb5c3e474c12de77b869175
SHA25638235e2399c24831fc5f46b124bbe906fd06f1672a459d7eb3be000fb37c743c
SHA512fd60e33f116064b59d8b3925d5c0880f056bcd655a5b8dddc1059b27b206b609df68f23f0fd3bee70575dffb209911f5cc26b0e896a223e1196353b79bb52b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55120d8cf4064869d4190f0b79e7fe4b0
SHA1f7757f7e03d3a19cc271c21babb8ae25e3ba623b
SHA256c9f780b279a75e21f4550e75423cb80be9280eadaf8af3a2acd6f7f8a647d8f9
SHA512d57ebabb143901412e70d8b35fca34f5fc405bb5d54434f4366799316a786b49e4e21e112adeb832147b7c05f491e677f3df05979f439cb182caa4f833dba00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc2e882b10e27fbc6f146ada3ed0c53
SHA130438eb036972218d4cb61ea025fc9b1307bcd67
SHA25683d9ecff40fd91d0c58b014a349ca966cc20bcc5caa873512f8ca7c0130a3c79
SHA5126b1aaba623f57570a02ae8181c52620bbbf9ca39689bb45e14aa8efe22b922837e83defc7b78ad8b6fe834ca7abd6c957d0c90c53a1e43f3b996ece461d48775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df47fd7657d8dcfbfcc2a6c552b22c66
SHA10810e187816fe75ac4345e3d657ddfd146672168
SHA256cdbfef522ab89f9a6d9965b0fb64723be17f5700dd4567d01d8ce46eeed7d3d7
SHA512a7d12f39c83239aa130e7029f65521397ba138b616a09b4520f9da7e1225cba76d456e9ba98c31dfd2d12f49b5956683c2c7ffe20772ba8e6b2b41754df976e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e43458e27eb47dbd613bb3fd66780c2
SHA10f23f9c4dd7d62d0e51e08255bb65812e430c6bd
SHA2561b0ea20f81c95d35e2056a4f9d3e4774d53bf9cc105d76a3a63719eabce00cf9
SHA512e79ceaf611e317f02ebc39417976269f9cd9225d1bbe7c89b5a9899e7fe699e75ae3d83886bfe4430d0e2e0eecd5a1a3530c58e29522fcb1b0c7a609da8289f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e28588c3d773399a186b8fc526d12e
SHA14eadcb8a74d302b9e359f6bdc57f99bc03cea9cf
SHA25690551e87dad5e9b67a388af1caf63d73151ccf58db2b778db94c832a2077c0a4
SHA512df376ea26ad74158e3fad9665e001cacb02aad69297c50725b27d4f8ac955f84b0818a27173cd89c33cd3408016f724de442dfa8594c6dba926a7bef6e88fcd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9cd098b366b26cb24280b85c08908e
SHA1ea767d6fa35268da6a260be84d976148cd58ab04
SHA25692e6c8396c323664654b82cac18151062106a6d46516d20c22ca7f59e1f25203
SHA5122b8a84683e8921e6977920634a6467ca2430533270f3b12e6c408d006f69ab6bb88fa6c89036b0ed1738f3999678d210c16d65e7fb0b9f2b56cf028534bb9162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56596c84d7901cb08da262ea1b1b3a16d
SHA16ee69d1ee1d3eeba5e892539dab868b13379516b
SHA2562f151a21f6284dd466785522fd582eb202fc79a124c5e3c83fb0fd2658501600
SHA5120dc374155db50b58fdd46a3559dde34888ca79f6bd835c160e3d01da995ab137b2a321767944a6bdf6719802c763438b58a7ecf14388e0224a71d48db8ccf011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e36ee9e0f684c8521499e22df437b07
SHA1b82c6ec7d96f611f9923e2545aff464d9556ff87
SHA25649415077de14c971717c1bf3b9541b542e347c116cffd23c98e24812ed499bab
SHA512a241052cb8412d592112a1220b8fbc7a1a58beb1987f7d31d0cd724a4b78e816daf4a13bdb7bf90eab917adb1cd3e72d2556c676ea8b01646fe181229e624509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebbaa01a5515995ae5b6f1c00340496
SHA1bb3af3d88d5996c9fa5865a4816be9e46d0b8699
SHA256c78db5864e85d4fcb5a48b32dce0d87a805a455ca19d2aa5cd0415d4a69b58af
SHA512ad694655c71436a136e4d0386a69170f34763be9f826daf0decc6e410212e5a5d4c1ee6bad36a27269143549862436ec4919de4941299c1f798ac8135e904c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82fcdf64c58d270295053201c946e5b
SHA159c0096964b6778c9f909c0970ae7893fdd99da5
SHA2561673d788a1aada3cb994073c04760cdc8a19e82275d33ff2edb368b33b606c40
SHA512b44ab65930341f24a96d4e3894f1eee2084af2a479ad145a8e19eeb642a508160d1d2693b2a6e9e80b602e6255f76083ecafedfe4bd0d30515db61124a467771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fc4889ec7e44f491d2cb7ce3eb5046
SHA1aeb3655d9fc69080abb2c45a000afabc72d4c3a0
SHA2567cab60d31181339beb4298983eac42caa9bb56cd0647c869e065f55f3da86e09
SHA512ac32f4a45e691376782651a075f631b6bef77b01d401eafc2428f2a79efddc269f994c8464db031a2a8aafa3bdd5e61cd886fa391de742f534a586c75dded5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babc0d7bfd7e3db77cadb8fd7de8c08c
SHA196b2c317a917deff21352a8737666277b4d6224c
SHA25614df7b4170d5b918e00780df795899a27774045dee6d39b3e90e18db96116991
SHA5129f503341efe00db76f6bcec1a5cb850eec517f45ca316cdb16ed914f6ea956ff54252c0b60ba0cd19dc8545ff0dbad7bf6f2c86dadf3e79b76b97e2fbd47cd0c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b