Resubmissions
05/08/2024, 20:22
240805-y5s8ms1djf 305/08/2024, 20:10
240805-yxt5za1bjc 305/08/2024, 20:09
240805-yw4b9a1aqh 505/08/2024, 20:06
240805-yvjapaxajm 505/08/2024, 20:04
240805-ytpq3s1alf 305/08/2024, 20:04
240805-ytcfra1akf 3Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
500KB
-
MD5
335ff821908dc962406f501c43d6403d
-
SHA1
213a3923ef50323f2d5f350e4ad97c886b3d1221
-
SHA256
047e62c2d5a8082722a48bfcfbe5ed53d71a20c11da36113c614800a8a925bfe
-
SHA512
63c4ba8da79a1cdc913c813d193f0cda64455e29fd5a4a9617d6898d95eefa383045917e8af6c940b7e7e6e76c28c9f6d14c72ebbdb25ba431188b59606bf933
-
SSDEEP
6144:nRURedReXReWReZRegReEReuRedReVReubo:nuRiRyRnRCRBRpR9ReR0Rnbo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF0990D1-5365-11EF-9629-7667FF076EE4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3024 2356 iexplore.exe 30 PID 2356 wrote to memory of 3024 2356 iexplore.exe 30 PID 2356 wrote to memory of 3024 2356 iexplore.exe 30 PID 2356 wrote to memory of 3024 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e47977e1cc57ad83ffaa5f4683fff96b
SHA1826a8fedd8c304005f9d223d389916b93e000a19
SHA25646e6bdfd52c0c2d007ca420c2f6440c63c81f2c18cb7f8e4ca0b500e4adcbe36
SHA512b6fc9318e2034a217d26384a673c290bba5d436978a022e3d3e49d58832790705a2588b90b901961498f0486ad9ed99ddfc95e3b66154aad63996083617b3164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552
Filesize471B
MD59e6cf26ba88811007de9168e6d127827
SHA17eec05df6a32cf1f1e31c0ddf5a87464f1b06c62
SHA256d47265f953f3b6c92ef5af5db368c07fc19d48f38eab8b62dc8f893e62dbfcf4
SHA5129279c7bf12fba7e8f6695413f3d73d16839a5dfdaa9ffd992adfa89cc01641bf49c917a6a0ba87359d4413b5997ad9cde50f97a4b9650ac110ecfc5330ee4043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5d6d91ebc1d1bccfe0b9641052a8c2c18
SHA182d1f17d81bd71cc39152e028cbc5216a70270e7
SHA256e6dde528ece0bf210f5b32bc0ca76545450017593f4004f83095b20206cdb440
SHA512abf334914d8699356e980692e944eb3a40250ee6d72e4c55364d544a7c9c48cc5faef741cc28d5c39b511797cfa2d8b7cde343e7e04acbd42620d3af9a816e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD58b37c879c434e701a46d3d1eddab3ae0
SHA1b92aa393fd82ef40f97338767506839fa86c6fa6
SHA256e6a15cb0279a2fc3d58bade6248e2239665f8209d279fc83d98e9ca5d9e1df72
SHA51285c961fae57671b36ac3968ef38bd12fc2c53e80ce29daa37b29f45cdfb4e28d009eddeea9fb378fba55018219aef7442a9159f73944973eec26b7f301585c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552
Filesize406B
MD541d578539e2c0781bc583209b61a63ad
SHA1ff192e26a7a6abc3a9bf3346dbc917ff5d448523
SHA25644d377f23ccb643df0e85429e06ee6d30e6c00ba38db8d4ae36a0c51b509188a
SHA512a28b73e8df582b9c05d49630f28347f1780fdfb79a4a22e629bfba55a8be3e50393a6f7f20ba0548c216765125477dabfac5b78189bf4d27cce257595baf925f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552
Filesize406B
MD5702b6979b02f3c4e63d80dcaebef2bb9
SHA10292c78e8eed55a520d413de73a8efebc77152ee
SHA256de5664dd0a86da82751473dad32623bb0ad48454bb907563a935bdc951d541dc
SHA512532f652cef8c5cba08e2ab19ea8fcf4b7a5bbfdb9c08fa8c9149b56a64f2cdc03cfcf33b926a33ffd15fbbcf4213f6d1ba09b3b5d0bdc3009c280ed96e730691