Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
ToDownload.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ToDownload.html
Resource
win10v2004-20240802-en
General
-
Target
ToDownload.html
-
Size
102KB
-
MD5
e0bbc2cda109a86148e7dda03aea1cee
-
SHA1
feabbb43f5bd5c17667c6dbb8430b9f3614d3299
-
SHA256
16e60c77182b06e7f26b4826bb5bc764b6a007f71622dcdc8b0ec9e0b22a1dd2
-
SHA512
3a304cf17f0e9a3136a827fd5dae26ae3dcdd89d915a18c915279228493da545578de70ac130dd1ce4fd5f0680053b2c7c3dd54c445481341ed4c946009855c8
-
SSDEEP
384:B0OIVXw+wasiEHoEFBntZCccchpW6ihpWFvaGWi6vGAOYT/BjCC6gU:B0ptwa5uBntZCccOyGWjGmU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429165397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49329781-5472-11EF-8BC1-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000931c34c68bfdfe7e0e8fb359d6f6fc4f506524f272e7d39b8243921c62954c7c000000000e8000000002000020000000322313d1dd085df36ecee43da6bc9923d7f1cf91a2d4780cff823fd97911f79320000000988b1e293c10fb2837fa29628e4029833926fba83bbc511984829b35b49a5dd5400000007f7cae2f416a647509bd6491cea72016b8c1f49a6bb76c829585f3c14264c9b9c15ef9cbb125fb06861c2438d41bb9a6af5e7a2e26a9b2831d8ffc9c245c4fc2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0fdb91d7fe8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2712 1940 iexplore.exe 30 PID 1940 wrote to memory of 2712 1940 iexplore.exe 30 PID 1940 wrote to memory of 2712 1940 iexplore.exe 30 PID 1940 wrote to memory of 2712 1940 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ToDownload.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0583695cb647f39a12b6a74afd13f2
SHA19838c2000a12bc9355608773994f46352ed9b65d
SHA256ceb829afa50f42e4e9f2ecdf34c0a794993e8fc48cbce0a78cf44b88b343dc71
SHA512accee70b8e170a636ac868780d9ce0a4417b14793b6a19bc83cd2273077edfb1db52b09eea340b4f7bce66824a7caee201e8475e9e0dd4ede6fe65547d4311cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a3086ce8aea84c4293ca82a9e86fef
SHA14465da82c6a47fb97e35b134eb0c8e3375c35b33
SHA25664618db08025938bab65b49258722656da70ee1cb3395aabc1f589b00e8ec8a3
SHA512a8a357ec055e62e3ea75c9f9d8c07848831f02e8f9815d9a860779163339fd83f946e109222793e3d8dfd9befe4e0ca556c593336c401d3f2e5b53082df4fae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d717ca5038354e441b6e0c4a550527fb
SHA18dd0360c1fee9d9a634947d8378a3dbe50e06251
SHA256bcaee8a7ac19553ca568faff2c7cff6ee33fc4d80b0b295c604a0d25d413745c
SHA512cf6f577b25b9e4a567d7933c7b7d3870a5bb81e9b6dde3fba3044c8e417b41054d9a3d28d5367c5168b93aa4bc0ce753c83ed0f85ef7b43ba76639095abdf852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93e58bb6c978f94472b9f011414cdf5
SHA1e3cdc06147a7a7a906a37c9c7b4e57509cd82f67
SHA25620b0a027415e003d7bbd0514258a871ab84ce16e82d42b53e393955c131f5a6b
SHA5121a672c15f995665f6a0f520c4fd662201ea96a5b83ceb168051e3f986da9ac592d1ffc020af93a9eda9992a0067babb776a7944a5ea435b011f9a23a97f08662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a87c5846dd12960b9f9023f55d0d59
SHA184ee9c90f5daedb6c5bbaeb7042436cfc65d054c
SHA2564bf2e112e99a427a545786c22db05ff4d7f64258a8438b16c98aa924c9e6b11f
SHA512bc782ebb4ebf31b625d2427f486c3437d0f3dab519e6894fdb922f5776630edaa4c1c925dcde2a21a8ea85159158da049f3e71d15f87f766008c93427c11830a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd27c869e75a20861501f08409791424
SHA11ee93ceff1e144bc9f619f2a350eb1ec9aa3c2dd
SHA256486b1fe4ae49c156b5a95011e98e8c402f6b81022a882d1698acc99e0e95462f
SHA512561b00d1b6ed203ce5937c5dbb5718a129dd6a6bad4371c985ec2c90816ce30e04cdc57c82044e935ab82b54d9027cfa890d71e955d13654f58712b1c99cb737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2328b30e714f17fde933b366e54cb10
SHA17e5e2c0c92dd757891af7cacd99d3d8ad3a5cd3c
SHA256b7302e1fbf997f0c8ce499f5f503d8f37a97a8e58eae24ef055246e517378390
SHA512f22ee5a8d2bd18e9e1b895ccea00c72a26ff82ff9f9be22cf33569665f2f9b942edcc3f9ed9283c0ac382d633a0de48ac2448a1e8424a1a5a78dbdfc6b165c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510cb924fdec86ea9b846196c0bfa8a4c
SHA15781d948ae99b784b4a02008225fb466c1317f05
SHA25618ec09cfdcb7a5fa7e96a8b73a1a742bbdec0f08318d32472a5721d188c6b904
SHA512b9c256212c5e09c88c7d764c54c4456a155114344217a18172a2a73152f2d4af1c6edf1b4afb4957415571afba196032335764356da5f88788b092a74e2bd6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ec417a490f6ffd8e2bb39513faf7e1
SHA11cf5345244bc1bd30b8ddc5c573cbd2b6ef5594a
SHA2564332573145fbe0c2ab3797757537bad959a1e55f82e9b7075dd3fe6fb753d05f
SHA512aa4f62c339735b88f5a10feb1f1886fbea682a07743e4f29e0eed1d0147577641581ab930c51d950b06004273cae78f6a86495ea94e4cedfc935056afe015312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123263edd0e2bb57b6776327cae8e47d
SHA1582173c95c78e6ccb9643f02a293f65236bcae82
SHA2564ef3b301675beca359c93ae538eefd4e86b086dc51fe23a51582502e51f877a9
SHA512e62378323bd0415526a757b5fa68d9f6ad8729240c9e61b0f1c0afe43f3488cfc959c9ec6eadf9d8ca30679a9ceb707ae714ea4b8d580c36edd2853fda223151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50274e097ac821de9a6a9653456f0a87e
SHA174ce16f9cdafd13f4988c37493edf422e45a8b47
SHA2563e6c799e8d2921decb70ea97e7853dcafdae0c974402f41e0057cced7f2279b5
SHA512bef4ba4f83009dcfe3f4bd576083e028915d4d58df4566da27efbff5b271070eee00d424d694912fe759b850c92e991b4e5bd8a61af01edcab0998bb15fb7636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5720a876c7ede74a180456dac89502792
SHA1fa20be399f81083cebb317ca9b842c9a62cec1a2
SHA2561207bdcbd1ac851e1f071e3ba98124475aa6ceb3df79716cfcdd12cc1a5ad5cb
SHA512ee04f5cc0ec5c470fbaaa8cc539aecc7bbdf258d17c954ed6f86de35c14b58b907bf10b6fb068b5d07e403764828dc5596d846def64e5af2566dab02dd03eeaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a69c632ea95aab2d9ae8f8f2757bcf
SHA11fa71ba8c2ec2022057f39fa81d3e38fc3e2c045
SHA256fa2720684d8678553eb4ba56bbd88fc87fdbfc1a39c20130b272d5ab8556beb7
SHA512e4770002992faac72a2f9d0513a25d1b73d31735e12b377c91b9d95a9d6297b793ba7a3d91a42a8b5696797a63931a440d41ea3ec4074b5fefe6635f4152e8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56874132182c240bbd445b80d9d995ef0
SHA17aac6b5223e256414efde6a54288ef4d38b3f52b
SHA256548b5972592ad9730a06fe8eba2a1a3a22493681d02f8af00b753f0e2f322455
SHA5121179582669205bd092fa0ea7b5604660542a885d7b14e14944db64833669004fe003507823030faa35f6edd77a29f5d36d6c28c501d8263a17bc45b6ed5f946d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc8cce1346698d586ee23e38baabb84c
SHA1c367be83bd978af87554dc2c73d5074a3ed6e410
SHA256c0cfae5816dc030ca08ce87834a29b202c9b5268dd2018a1d3debb9563ce7a8a
SHA512b04a14cb3051cbcdc6cf0b105ece5a5c90f79cd91e2275b10b6e458e3bf106606b56b336903f65bca3cf5f6cdaf6c2885d20a820dd17fae076f57a60a123ba08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc05acbffdfe561fe0e8c44e2f44ef5
SHA14c7144b3e58b9e218497eaa36cbf8b23b3c12434
SHA256b7cbb404d6e642b107878f03e7937204c97c7491b8175fbf3b0da52f61043a3b
SHA5120415e9dcc8d2fe6ecba70a257a649f7dcfa52a3fc7a3f66e1e103ba19be0a99055751d21765d1842417870ff2ed2d6e8ff35f3e7d7d9b0877c9684edcf7fa1a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b0da209d150e813d1ee0fe2e10d374
SHA116608f442b0285cadb2932dfa1f449154a20bd95
SHA256dee2e2a9f5f702ecf68b7610edfa62b0e16cc7236106ae9ebd70e04af2a41a64
SHA512f7006e961c064aed334bad381f8afa961e680f73f3947d565744778d49bf2a501cfb4edac70f046d452b341e85673777daa08426b6ba4e95abd4e12c64600d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cce3a0ae6e87470eeabf54a50ada7a4
SHA1facf59861b732f864880193ec009a96d1bc0cf4a
SHA2560a3f4ae380b8d6f6dc3b33c65e70c31bba6300e0c39470b5441c6cac4164dc03
SHA512e3d8bb8a527874c06732087a734b60420934a0551b434113ffddb262a67f18c03256b17db98e1e10d9cb4eedd367000c5a2764b6e103c0cda952850e1713a4cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b