Resubmissions
08-08-2024 07:55
240808-jr73ba1erl 3Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-08-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
a-z.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a-z.html
Resource
win10v2004-20240802-en
General
-
Target
a-z.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000a9236f659f333a9db6e1be2f4a265a54f032bf4e1c779e803ea85cc4690faaf7000000000e8000000002000020000000fbe92b97e61ccbf96564d772f6476c5b1e06c16c6a161570e0591cd69b657b0e20000000dd918719e1bcf4fe14d6dbe695a5175e30ce71c8d62ffa81f25a24fea84520cd4000000037764fdf692c9c1272cd01688050c6d95b9ffc7ae2c75eca880f1fcbf4255780678a680dbc9ef9bf1146dca733811a5f1101cf7be36541b1b458a2cd59c647cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5072cf6768e9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429265594" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9349B991-555B-11EF-8340-72D30ED4C808} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2488 iexplore.exe 2488 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2488 wrote to memory of 2380 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 2380 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 2380 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 2380 2488 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a-z.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5297dbfb684aaf8564b75acc0d84ece13
SHA1bbe98aadac2bc4f8dea7ce162478ba89654d30dd
SHA256acb6613207d9cbb984aa04658fb2f8f610692a13be4d78347aeff0e61b828527
SHA5120b86fd1914cb418e3de0c32946b0a2e466ac52fafd28b94b9e0c60b0bdb2accffce8f945f96d44ee040563a45a5aecf8c6f7bcc41dcf6a954404635348d69442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b998e594c96dc3a5cf01a6226b4ee82b
SHA16da1237f8614b8e11118c7dff31cd62e5e93ba58
SHA256e7b5275d42d28f9cca1f4b14e2b214aa75deea6e71a8681b1260686fb8358e82
SHA512e683b81c476fad962edf63febe5e05b9e39ba5a54c7c34540e30d6fce328765d25fddf44ccb7f76c1bdf085d3e3bfccffcf0a0a1628eae36b4e3cdd63083d694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD569b4137c0ee570dd9695e57b40312aa3
SHA151b29688ea1cdeab873c17a3d14bc9ca437c4be5
SHA256b5da909a6d0b586327a34841c6e3d04a36927fe4053920787f978204c92d0789
SHA512c64824a34d4aed90ace4290fca79a9d936a95016ce9cf222b84c7cdd10a89404efe111c76f87d2dce69b453f486dd167d82f74f2a84d3ed91951b6048efe5506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5167f505898eb199717ccfbda688eea04
SHA1c40724b442bbe7ba33792b264827346d1a2ae052
SHA2567f60087ab9eb0b9e764c175b743332367caee98d534032a894f021ba2748d5b2
SHA512f96b5d959e2310947c837909197fcf6f2904ec52c825e1487905e379a16a0174ade454538157cf20b36f727462761bd06eb88bdce51dc859a0932ccb1cb133c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f9037b77b984583082f9fd53bceb7584
SHA1403ee7ae380a4f0eb96275cd30c1bbbabdf159b9
SHA25641f17388375aefc82496150d246d43fbe795203e8a0b67684c8b56c26a20bddc
SHA5127ad6c75c5f532118302de226e5a7364267f16ca5ee0076fbf86a20c31afde6502f0c4ff0c6957c9f6fdab5e08c57e04c4b1e3f7140ba1587da00ba32402cb307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5afe1dfc5925664eae705830c7a2b35f0
SHA1d112abe6a6e1e44bd13c4ca2161c36f32fa1ed8c
SHA256df91e24cb93d9df15ec55640a93bbb77b54c64251b4a9a720dae79130c5d4032
SHA512e218ed71a67b137dcd02ebbf9edf72d8fc348334535b9b4040143757c38e35beab85a75ae3e3c361fd663edcef87fb1b5c4ca9ebb1b2d5474c0af7f8d13cfa64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51f0ef553de0beaababe9c793c18b3c46
SHA1c1f7bb2b9484d572e320113aeb5cb5282b80b418
SHA2561b7322d864dec7ca23fd438eb5bf71c5dcf04743b4061656357a3791ef4b6910
SHA51261a29c533f75216dd27f47ec685f2658f57c624a9630b70d9b1c91ff8bb6274226711639f9805b5a4f2875d476e78bb3a71831fddacaeb5b79c9f16b29a20b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d7b2fa1a1a5c516f64c51b1f9668d52b
SHA1ae5e97cce4ad9bf117bd9147dff6c56db3b0b6d1
SHA2565017cbf115e11e4c254a30e97f25197512498babb92694d5993618233d56a8a6
SHA512d0cf8d3a429bd19110cb70621b664c77dca99248bff5cfef3263511ef6fad6a9e2834a0c065c4c06955d20e9c2083901e40bd3cf6bb5eea9d1ba3143fd8fde56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d59d1ef49e1782c182266deb0a445547
SHA1842799ea790ca7fcdaa27d4be0b567002f1c283b
SHA2562a60262c7928654851086ba8cc02343c0e9fabce26f8eeda41338135b7928973
SHA512c6d74c96ac43188c1ae10cd87c95743b15671bab4dedcfca8ac30ce60af06061fabfccadfc09b43a3ea2fb9f1b46159e5effaa1ba290123e993583e13d2e7171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58f06721327d844a7e893deab28e3a311
SHA13b7096c1ca2515b3f802551fe412f04b915b1337
SHA25673b11cb3d0f39f3ebb2789309aa9b2e816ee7d970970a5e6be9242201a9b15db
SHA5128c56308dd9425aa93508d5954371d12dfba4c011a2b937b4dac957077f2e6a2a57623328db048b61b970bd7206a5265285213247dfa9c95f6b9cf009f7b93e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD534b5df5e8fa363f6f10f4be06453f619
SHA1c4b1744c7894145d52720d9a0603925c9ab48d7c
SHA2566a8c9d3bef07a8deb47b001e6c865bfe972298db5ae4efa8099d7f7b627afee7
SHA512718935fc1e021884e64cb89f83b18168d00e7e4d0c5becfc6e801a29ba165fc06d1ba2dfc5da33fb65b5dee75576c2b772de905f5e6e24894fba21bb73ef5e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56b4eae05077d77b3e4e0b2f365ad8b2d
SHA15b0474f8be45173bde12442b5ff30d7407468014
SHA256976957bccddfcad50a35bf4bae1e68862113ca2429803a14bbd48d14be70424b
SHA512d5c0b1f74dfe87d4043fc0823356914ca253e4b7590c3d3bd6a20e96232de0e779de4a980d23deccd42e2d9957dfb6f847b40cadafdf5f74faf967cce393d0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a1b90a2c8f7e09b93f5e626fa6209ded
SHA138267b4b98d1d2055518fcda434c110fcde249da
SHA2566d7a5ba3289749381e0d41353e0b04f681706c401581264764c91fbf4ba403a4
SHA51246cd3d2645e6b84274571c5331860eeabbca04df90098a92a219cfab009852b3e068c7ce702fd8ed5c634f2b89a53cdeaf8274ff23a7a190b14d7cbcf385c591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58163cd75642d55a52bcbb7105e356d54
SHA1e1cba1acd3b34055b6dd9662e0c4dc808086df53
SHA256876f674554615d542b8076b7741bbf682b2ced55b5bb9b09e4058b0e7aaba77b
SHA51204a4ec113ee9045d28339c3f00693fc7a62fd95dede00838d2a94af474dee439ef8914987ea2a622eb6443dfbf7c0dce050710e024849092f30c97632d238878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD569355211d66f99e37b7ae7d92a6a3a9a
SHA15da1a02b3900114055787dfcc02b11965147acaa
SHA2561368481233c366610683b3d6756f472c546135beacd076bc6ecc0fbbf4d57650
SHA512cd875741034df6a34e4a05ae6aac97712ed9a4e100218261c59e5dc2071d6e7fe5bf1d7a5672dc7528eacf898b6e4ea4adc39358a4e685f86cec9bc2744e7f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5127093ba753ca609ee04df046cab8cb9
SHA1d2c73a0075df2a29151a7f9d45f13354cd045998
SHA256234c096d9ed0c9661814e7111966472434d197a051787424f3d8150fd5cfa84f
SHA5125348f73277c933f9ef50b277e7659671174d9b997c5abfaf9b71f2dc2afbc95278f9bcd99c0f0ac42a4973e00433cb15d0e2fe7aa54f5753c06bdc9c44ad5eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55395a4df704a027501dbb8e2fba1a7dd
SHA1cf7eb492ee408baa4d2611c77c7871743011cafe
SHA25620f55d05401c847896e2dd616fcd94031ee64d24410fa73d8d7dadec07ff4312
SHA5124f213a030bd7e79c5949f108d0b855ce88233c320aef9b788298c353955f8a0b1b1c03e64cece4fd1eec8c825b2896a55f90905586cf2649747349cd85a21e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5559a7704536e7e3147218f1732d7a97e
SHA18ba4e58049c59faa83149bfd0c058a7d283fed01
SHA256b7f75e9b23a4df05c5d5ad0bc19c505d0e6b1183382aa6f91d4d17a3ba5902e6
SHA512ce7588a3308c958a7ed26d04919c8264dea9cc235a9f28f46001f6da3c545d26e965ed963a842f838625325a896901a5235ee51f1e1f9ba205c248708e7d0e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c57d3f98a3bb63fecb2fbb0a8a260705
SHA1e34942a9df8b8be88be8d4d83ae1c5fba2907b78
SHA256d1665705d732086c115c0a28ff1a177e99edc95184f06edea64a766c35b53d54
SHA51254a7277915c8f0100d950aa731bc939d577502f9a9e03392b5e53359f4c30f2ef23f69487fd52100c1d03635b5341aadb8972f008d929990a062c5ce4e58c1f2
-
C:\Users\Admin\AppData\Local\Temp\CabF9DC.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarFA5C.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b