Analysis
-
max time kernel
1559s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
87e320fd966f2631865c0323afa85bee
-
SHA1
28c9b34fd40726154b40037ae6bb1cca692554df
-
SHA256
8c437db97f616482dcc8defd9a44867d4ec61d0bfb405232760b2ec48e437f0b
-
SHA512
67332442e917b6398b95ec280ccd1ce9eb4d06f33e58c749ad0d7dcb7884c7070a987c6dfcf5398a742f9093aabcc519569b0d2a111f78b10b6088151daae2ba
-
SSDEEP
384:c/ICspa1ocy4/4lbGaD7vhpNEHIy2s1S2m0Y3Y06Ib3FfNa1xCejiw:z01ocy4AEanJpN5yV3Y3Y06O3VmxPiw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1052b850fde7da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000e9da51496be529bcbbf6cff790414b8181053032cd74732e8fbf18283d8e9d40000000000e8000000002000020000000796cca2c3c922e0ee498cfea6ab90f5cb3f38b70c8c7308e9ad0f0cb1901111c20000000d767a2aac2b6f312e6d38443774c9515dbd8281842963330e54b77a8ec52d8f140000000e77d85c78fa7b0b810ceeb2050f4f6df4d8efb0912fefe7ebb9e7fdf2208a06a5e5fa62d7d4a1ebb139fff89cc670235e49ee69471a6c330d2f7ae77b8a6352d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429109649" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C324B31-53F0-11EF-BF62-DA960850E1DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2064 2436 iexplore.exe 30 PID 2436 wrote to memory of 2064 2436 iexplore.exe 30 PID 2436 wrote to memory of 2064 2436 iexplore.exe 30 PID 2436 wrote to memory of 2064 2436 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b94ed0c5cb420a0eac28df533f923a5f
SHA1b05486a38f56a3f3298e2e8bee757baa3fe486b9
SHA256565d8d07528ece374484775460e00ff18de7ba0fc40d18476d1a25ff8ec3b695
SHA51225b1ee61929b471dec9c6cba29c30b7ee88e467db54f2fbdcf933908bc1eb67dab4d9cd83b1d89445227d1137150997daef4aa9b08fd8fcfc56be5d8ab45957b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b990e42c729a03d2c9aacd9ef3a748
SHA1a5da23d682ff156513ec5b316ebc4a0ace7b2eee
SHA256dcff14ebcd71f9db6594977ae4bb0e61023af08be83436585934975d9cf505d3
SHA5126de4b1a95abe86912291a70ffe83dc74b71058f67c9158fbb64ee15cf34f0be84ef5530dde06ea63fb6f463782987d65653fb4e6c639df482f49abda82db1741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa299bc4473f83e476120f0a57ede4d5
SHA1494c514da0d6e836459ef64a6da4337029064d9a
SHA256e53656b2716af7f3ad5214f420dc127e3bcc90f801f869ea8d2a3a058a8b28d0
SHA5127e1e3d8a7bfa46924d0c6fc39406e71d17312f1aae543de2c4b323b2c46a524820301a47b5ea508f50a91c0900a662bdcaf5706027354040cc271346fefa9873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521875f25568bffdf1fb1fa2b5b559610
SHA1acebf1c659acba8411d2a98ff37e8c6f650b46ef
SHA256d22c723d1b9a5baa6b369ec64f9e6c448344ff8b232c7c65203ac73241b7e1c5
SHA512db1c25ca833d7cf09b1119afd9f7b8322cd618c0360f5fd98fc3dec9a52e81a9d5ae8916bd4dcdf60c433f05186b149321d05a60a9e3cc6ef5ed26f15f1b3a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f50f66d6402c81f66b62fe69f44092b
SHA185907358c4e1f465f04f8acc4e421363d7135900
SHA25625b141fdbc2586a79eb2111eb9ab8d177230d77b1f998dc72c3d53682df4ecd8
SHA5120155bb24ea6f82ad1f2b9e0d764225c740f7d438ae04946bf84ce3bfee9c48e440022d5c17c4883a65728cb8047c4c67118337474b7fe35c8cdfaeb6df0ee117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9011d3402c692532907970126e7804
SHA1330fd9fbf3e5d02e286eeaaf3fa13660c49065d5
SHA256e648bdce0b3fcf63bd86afffdcbbd1628e325ade6276f50c4f00a1facdac8147
SHA51262c7953e5d6f5ab6d54b9399ec1de3d6835b5d62f89c384380e242490371684dcc79e4b31a9ac1cd4d3343b876e0c1542787fbf107a8776053ad12bd42fa365a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502aff019b45d08a694b60376b0fb4471
SHA1ac30ae85f5053d6797e99169e8438f6df4bb4564
SHA25671be680d3bf0fc3d9ef64652ffa8a10abe718e63414ec7520a9cd3a3faba32e4
SHA5125044b8008ceb077b0e1e8896f7f97680c7277b1887055a41289f3c7cb84b384e8416dfcab5517a8d5fbfd6d7df66f2d308b4d21fd2e9e7b1634186cdbdb64589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50710063ed18d9122affa2d93515319cf
SHA111ee7691cb64716f2d1e806e6f6278b5860d5d65
SHA256d9414a4cf7ce07a2f16c51a429ceaa3e71f0bee7e7a189435802a73fbd8a142b
SHA51252f3756b5fb28c7ffab0c5ed237563022b5ec4207ba999a519cca78aa65f1818ab42ebd3c9fd04be308821078e63844f4aa3ef94f4fa0d447bd34ef22ae9cc5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2dbebcae0783ba12417b4cf6522c6c
SHA19f160ab0f80ec60bde06d98d26a6138808b40d01
SHA25672f5793e35e7eae3a07bb1b8cd0e06c61c85e91fee517ec9cf832b8c6cbd66ce
SHA51261ec1bc128b0f5b3cf118d20ae98d2119debc61b29790cfedc9bee72aec289b2098aea24737877b0947c61365142698719b16fc3dbee90c501467b9eb5d2b931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff554463e6d24a75bc862ccae2b109e3
SHA1546cb197eacf4f8284bcfb9252b6301c98227772
SHA25685be6a5b14945c90530e476bb244862080a7a3e353a8c0ce7932cd527b546e1e
SHA512509bdd64ce3a013a124d8e35af0bc37c1017a9ecb78271ae2b33276b4cbe93610a8749668999406d89ffe41b72a5d10d5dbc7fb93579ecca4f1ad3d340bd7a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9f9988dc12679148c775cb92ce7765
SHA1c68434cf956f51bc03f2a40bcd1805e1f3f84b56
SHA256b0c4b2dd1f5b44cb13cd1ca845223f7b6e661e95bbf387d1cfedcd398ce55921
SHA512f8229d7c7ae85e0c92b834063ab1c73daea3bc8bd68b74ae52d6674fef343e149ccc460a0c115a1e91c31f7330a8ed27c3301a7050adb2b6fec910ab130ee2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec335b8e6064e2594fc0b7deaaa1c81
SHA1aa40bc1e67d8f578194d072cfa8806e091653e5f
SHA256e75a6e4528037745fbae12e9bfe8e7d4fed669156767fd87ceec785a29b49160
SHA51259787a2f0fe9f3c4a48eb46ca53939ee4dea2ab95baa57f850edcded11acdb684ebadd421bd60e976951d791dcf876210b6440b1a1b461e44eed264ced426eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b832cb2cade7988add5b00f3133b5c2
SHA1b8cb3d7b7b6cd6ab69ada75c85976e641c56846d
SHA2569dce65be9cb34fe63eeb002fdfbdd59bfa4d1491d2ae7076f51dfa07b3d00d62
SHA51232e65a1aa25c13ea1ef4d07354073f42bb898764580deb6bc3bbfc1a01463c33a5d81e349e4270803167239086aebb796d7434ee45ab298114d7d2357f3a33a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b333c7e5be7badd5c9efa94ced27c2bc
SHA170357d523f2c2d5cfd876c6d21956af534276cf1
SHA256880407d81e4709edc4ba4b845d1d5e733a458c02d4bc6bb86e63dfb4b7b29c09
SHA51293b2e381affcd777a3e100bc36a73bdc639c4d72dbcaeee80ec5d7d7c31bf4410f085be3f988d76f269bda154eb5608ff52f44d2bb28d1c66a21972268f0102d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051cd3372c6a566c38fcc96054c3c739
SHA1d5730a1a986e819c63046a60f9f4e333aa04bd36
SHA2565ec27f2489d7d912496646c9743f6959f278371bd4cafa7fe7039a8798d6ba9e
SHA512a8414586b85283fb8fbe7ea52bedd69ad124bd1e181704a7ffcc0c276bec602b5499769c2c5a2f7e511c97bfe45d84cc910b119f210f3418c8e75b6dd9ebd207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531bc3ab09a56bdae6ed02243d4ea2ba2
SHA101ba7e2dedf6299257d444d3f25f10c31ad45363
SHA256e7c77bf330386c3d0fa41354bffc6e1653476c649cad5c9889369fb88875445b
SHA51287666f1b228fd4b78892abd09e6dd367fe79fc83c242b7f185f43f7e878eb8ddcf48291d1e78173f13eb4a47513b7c7c5f1507b014290533d706981dbb744908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d663a2af59026ba321e7e3aa0537395d
SHA1bf9da2fb7028d94ce584a666755fbcf34875f647
SHA256cfaaba3829b74d633a15f99f8baca03912b83baceb5357062564b8000e93c251
SHA512c454f72ca6a396a0e152260d486422c12488dca109e249a360c7687e7ce5b5b6822081a3c3a7f567727873e4fd64ec08e9379b39f171d94ef999f4cfeaab285d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52edb23a6caf9c4904a4cdf71e0535fec
SHA167f404e74c49cc0af4e53bd224bd6abd71518267
SHA256dc83a0fa7e5600cf68267c4fd45b54371e85af11a8a2639e1a764b9ca8886559
SHA512583e60a89c825f1998e1b30dfc0899c250e8e723fed277931ec754f7a006e58565a03195596dd22f77bf64c817e2d9880a9f64cdac6c1b6af465a3431c397c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f17f37a2e12b46013187adf58f6fcc1
SHA1c88bbeee39a913f6382362a0db7a28927e65a828
SHA256e30cca7d8c6b0de593e7d5089e456b9e5d51abe1b3fadbe0f4fb8cba5849b3f9
SHA512e13f3eda4b1cb1c901912e0f5170b8a5157a4332f335ddd481b87bbb8200b53f70d96cdea1d363bd98d422e8032bb334e133bb74724aee49c98e59be838e67e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b