Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
082f13567e33d6ab4c48812326be7844
-
SHA1
5220373d141ca40cadd7a9eea0e99f2529edf254
-
SHA256
07ad4e6a7ed8b1e6b499e9b36c6647155eda23f0e567bd21eea6a0b3c34fb957
-
SHA512
2ae087f725c529f3fd650a0aa62f22904571c5dfc25ff4390572537a994b92de20158f2d121783cafc8ab7883b9bb7bb07cfc794402c473c184856290368fe4f
-
SSDEEP
384:6pU8Tspa1ocy4V4lbGat7vhpNCo8j61S2m0Y3Y06Ib3/fu1xCejiw:6u8B1ocy4WEaxJpNz8+3Y3Y06O3XgxPF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E604DE41-53ED-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000062bb8134358f224e71774f06532f5d6fbbafd08cf27287a1b954504797710518000000000e8000000002000020000000361c42973691123a618f22f103f64cf90154c45b206c4969e675738272e636fc20000000a64847a72e58fd1848128b89fed29636df5831318afd53e1135fd148e8a90d1f40000000dad819b3e7ff05d8adba305af3a84368999648abd6de0718e72b310a91a810ee39d6559fbbd916ed00ee9cf69eb95492965c61bc3cfd27e80ffae5ab6c1ec5a6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07a83bafae7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429108538" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2320 2968 iexplore.exe 30 PID 2968 wrote to memory of 2320 2968 iexplore.exe 30 PID 2968 wrote to memory of 2320 2968 iexplore.exe 30 PID 2968 wrote to memory of 2320 2968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cca812b63e02287eca4ab9beceed375
SHA1d6a7f02abf742e6286f8ba6d70fdd2fb7bc18511
SHA2564d183db3d642e787cf94223e86e8e486377970f18e05e3546178144feafa69b5
SHA51261f5f28dbc664621b88ba0a2a129c438ca430c3148ec6901b632d5821c138f48ae7d9b8c290d8cd2578a0a438799281bfeabcbf32e2a1bf078c838813d10a95d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ca1dd799f1b3c3d183eafa812fdeda
SHA13540fad8f2c68893e01594373b97f998af447e57
SHA256f9db4bc6f774cfbd30b5ae41fb96968057f41f0ecd2fc1c6344e2c08a45ec2e5
SHA512b471a947872a1a0c171021088fca26288c0cfd8eeb3d54685e4c7ab32a48ecf66a244df31d4f7ecabeb6ab89a4753bb449b23e01a9aefd29ee2247d3c093e735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbea8cd7dcf9cdbf22777ffe973e4f89
SHA1af2eaadacfb993d476be1c8c4b2bfe4698e5339a
SHA25663d5427d663806493bb76d380087e53663e6d64428a44b9a94e2d93a1c08c2ec
SHA5124c90457c08075159d1433f2cba93fdbdd055c31fc32111f8a9501f65c6461eb36e74ed393dc570ec7911578d9173617d1ada7fe3d2eb6da02d1b0a678bc2ceff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595296fc074d5ce8814d0f4d090d050de
SHA11d3211d7eb8730a97e0663c0b5dedcd2f007a356
SHA25660c8109449c440facf1b8a501c693603ba162790f429367ca6fe1a706f7e5184
SHA51249acef9406e6d561d2b817769227de51bd83a79ec33793d18ef27447a72bef0650618e767c03ad14f8fbad0f252e82be9aa805e6d2a8014aa1bd3e3a0255b39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa24a29badaf78baec94a3318ebb3d15
SHA1b8e06750996f490581fa177282740af4b0034b88
SHA2567b7e45da794a4bbc8552480205090b4eef05f8614e7182eb0ff5a6b92833059f
SHA512a6edba26d13fcd5adc9f0bd44aa8da08ce80e763de91f9f35059a1d0ad5b2d096d8c518ce564b67db90411eb55cb591863468315e0b0501f95ad85712a6c9c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e6aeaa490b1d33225820699cc9978b
SHA17187074e2916f35a556fc6c35ce746e304afbafe
SHA256d2d613c97ab1f64b992f43752a7a7843828ea12ee398864c7d8333b558d6e505
SHA51293bb3ebd0a4f6272572a17a04edc0037d65563d10f2c5f213fc5c729c95a1fad38affb3334b1cf7984f1d5dc60775772491b1b074ef87189cde2ac3565afb488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa2ae972ea05bb99030e901a9e29b81
SHA15a7b302eef2a1c5f77fdb9e8a880ebbabd4eceb0
SHA2560f917ee9cac2c58f15a01e682b580d85cc7b0be4835fa946ef5c47ffaef451bc
SHA512ba6d31b9f991442a048a113225531ff06ab86142f024b9cf285e9e61628e78003a799977c8afddfd92f2d1707803c4d9a5c941b10e07584dd95d309676c4728b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b0ee4972569cc3d9d2830b8e26568f
SHA1b0ecd1af3a8d8fb3737ceeca015eac131708982b
SHA256208313751f602f70d161f6a8c47cbe849b12fd20252df01ced49dd8a87d36381
SHA51285709ae298907b11cc384e61f74edf4b1b6b485d7c46c993cbd3fd7a387c6fe90f4d43dc4b1ce3fac5e70dae04247d7196f15cbfa04ee6930d4d8b459e145103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4cfa0746eeb14912f3b853002d17ebc
SHA15c4f283373396aa8ab30c431b57dc5bf868b69db
SHA25672b4a364611b1b00ec9e2f5dc30828c3ecd8577647f8444d57fa805dab5a53d6
SHA5123f05b64d399a60b152201c7ce07aaeee4a1ab7ae8999f58705642a5e4248068276cb3745c3d0b89e99f6d5287a45c220d1e7515c0a738ba2a43bd25059a87ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea05d5d7dcf95be311f64fc0278cc388
SHA127e10def2ab21282bdd420061bb0c1e4d9c7daaa
SHA256861dab66b76e3137b9a5b186c84114042382c125f73150346e39a35bdfcf3dc9
SHA512e5fd72d12b062f61f6506f30d7bc87c9eb7854bde59098ff2c6ca37a8121d702530667ae65453464864955fe7a7f2df96542a63be8d2cfc107fa3303e7736e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58795653e9bbe62aec316a68e857cbc56
SHA110238ebc3ada2ab810c50ecfa3adab61d117cc51
SHA256787ee01692c1459f838ddbe1ef87d4129326f1a0038b582785f9305a3d928bc8
SHA5123a53d47ba17fe6805d9b80eb960aca7b4b6c81617970940bb0a23292cc480e627404bb0ad5245824761675b4b6d45aa93b076b08c35d1ff7cdcaa0743b459e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56fb613fb4cc839fd3f0ee5394118ce
SHA134ae3a5336b648b5a83a1358b370d699a9496c09
SHA25636f3a2e75f936f9e5a070f499b8b93bfa8dbcfe718a0015b8ed9064a3089af9a
SHA512c89791eeba464a2111dbf1f52c3f46a87b747125127133c51fd8ad17bdab41efe77e04709b523198e110863ae6a5dac2fc8cc8f97131648c6df374a3192fc3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff777e37d5e387cdabb61590c55de9cd
SHA155a0f53b1c111cdc4232d7c123fa7e48d4af7636
SHA256dbcfc48bd15f621ffcb3f700635ce73dff5bf4a572bb90f735009c639a03227c
SHA5124ab8ec9d6e5f87353e476feeed66f179b3a5cb573fca7ab43beb3a021d6655251d0203d71641235fe567ebcd229433415ff7e9ff8ea275c541c7445efa7b0505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4233df976d8ce67e7638e9350102d2
SHA1750dcc56ced307a5fb11d165747b947c52b2839d
SHA256baf7f193c3e7c1acda00bd5064ddd555acf87615778664a676d6f12177db51b7
SHA512996ac57cadbdcf4e69311f7f4d6a67892fce4f3fbb57b620f7a319261cf35af6899816ad78076d82070c0c4f506b127c717c0cd326678e9a64f00866641c9f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc692e1e30f49bbfe2ea1c4d91b89bd1
SHA1a3a865af36a03794a853a042eea92098320ea219
SHA256bc9fd8520c0516d0ccd70dbc5fe178a7dc13b2092220142986df6c327a387e34
SHA51213cbc56a8cc863c2e899a906d281e088c29aecae9306ffcd806750b5900d9622ad50ea27812ef79738c3ebe9f7b665496f14cda19134e0352cc6db6726ae982a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce931896c33acd60880318bb426b57b
SHA1b34a3c6b6e64216265a5d85d51cdd22edcdbba30
SHA256cc40a0fc529bff0ea7279933608601845093d6ac4cc7888cd99407766ebce2dd
SHA5121e143d240c0629134e169b35192ad2612b94a30bde2ed23e9e4583b83666d471d35383cd5fbb83b72bf9e6801c922b72ebb7ac9f1d4cb4a6248bae10396f4bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e293cae23650b8d6b6262b5dd76d7a3
SHA15e265f1823b98002602d94f4b39703d3254deb1d
SHA25698407b53f7088864f85b3b9151cd26aa94e93382faa2be42762eecbfd0a7150e
SHA51224a41222ccfb49d73bdc9133d7d211e36891908820073ab03a5b377659eb5caae964ecbb173c46e1106032fb4455f99e5ab189d9ca644f5b58f4c539019902a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314abd81b8d220cb49f3891b5a869117
SHA1dbf20e4e1c094b1f688f5822da77a16c70672aee
SHA2566f116876415e04ec55931652b7ad86b7e95b1eaae7abd7d313c615c5e4944aaa
SHA5125b0f02eaa9070da022925f6d023554b8522b39f212f03c53cfdf74f4d6004cd1b15a9ade56b4b577d21edb8ad5914bec07fdc1dfc13914a08152feb7b5ae6b67
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b