Overview
overview
7Static
static
7Unconfirme...24.zip
windows7-x64
1Unconfirme...24.zip
windows10-2004-x64
1Guna.UI2.dll
windows7-x64
1Guna.UI2.dll
windows10-2004-x64
1Nyx.exe
windows7-x64
1Nyx.exe
windows10-2004-x64
3libcurl.dll
windows7-x64
1libcurl.dll
windows10-2004-x64
1monaco/Monaco.html
windows7-x64
3monaco/Monaco.html
windows10-2004-x64
3monaco/NYX...c.html
windows7-x64
3monaco/NYX...c.html
windows10-2004-x64
3monaco/vs/...ain.js
windows7-x64
3monaco/vs/...ain.js
windows10-2004-x64
3monaco/vs/...lua.js
windows7-x64
3monaco/vs/...lua.js
windows10-2004-x64
3monaco/vs/...ain.js
windows7-x64
3monaco/vs/...ain.js
windows10-2004-x64
3monaco/vs/....de.js
windows7-x64
3monaco/vs/....de.js
windows10-2004-x64
3monaco/vs/....es.js
windows7-x64
3monaco/vs/....es.js
windows10-2004-x64
3monaco/vs/....fr.js
windows7-x64
3monaco/vs/....fr.js
windows10-2004-x64
3monaco/vs/....it.js
windows7-x64
3monaco/vs/....it.js
windows10-2004-x64
3monaco/vs/....ja.js
windows7-x64
3monaco/vs/....ja.js
windows10-2004-x64
3monaco/vs/...nls.js
windows7-x64
3monaco/vs/...nls.js
windows10-2004-x64
3monaco/vs/....ko.js
windows7-x64
3monaco/vs/....ko.js
windows10-2004-x64
3Analysis
-
max time kernel
13s -
max time network
14s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 00:35
Behavioral task
behavioral1
Sample
Unconfirmed 601024.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Unconfirmed 601024.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Guna.UI2.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nyx.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Nyx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
libcurl.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
monaco/Monaco.html
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
monaco/Monaco.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
monaco/NYXscriptdoc.html
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
monaco/NYXscriptdoc.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
monaco/vs/base/worker/workerMain.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
monaco/vs/basic-languages/lua/lua.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
monaco/vs/basic-languages/lua/lua.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
monaco/vs/editor/editor.main.js
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
monaco/vs/editor/editor.main.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
monaco/vs/editor/editor.main.nls.de.js
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
monaco/vs/editor/editor.main.nls.de.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
monaco/vs/editor/editor.main.nls.es.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
monaco/vs/editor/editor.main.nls.es.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
monaco/vs/editor/editor.main.nls.fr.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
monaco/vs/editor/editor.main.nls.fr.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
monaco/vs/editor/editor.main.nls.it.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
monaco/vs/editor/editor.main.nls.it.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
monaco/vs/editor/editor.main.nls.ja.js
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
monaco/vs/editor/editor.main.nls.ja.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
monaco/vs/editor/editor.main.nls.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
monaco/vs/editor/editor.main.nls.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
monaco/vs/editor/editor.main.nls.ko.js
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
monaco/vs/editor/editor.main.nls.ko.js
Resource
win10v2004-20240802-en
General
-
Target
monaco/Monaco.html
-
Size
47KB
-
MD5
d65261c2e83ae0319cb5e931d3cd813b
-
SHA1
b13189b8e6c82f9db00985483867e2ec27c99ccf
-
SHA256
520aa43d592bb8171d7cb015cdf6b8a2f5ae007be9a7a154c8f7c48b6f33b54a
-
SHA512
3e6e544d3947fa7b5a0391e84f6157b155f7a67cccff81b892a8d3c2f2303bf9003bf6ad3033df6cfcb809cf22a8208a8dbfb804a01d1b1b3def8322d14ababa
-
SSDEEP
768:TWi2Np6OXoy/21rxzD80kShCTrw4mkMXQnb1fqKTr5q4QVGQ6riAT+e3N9vnwJV3:d2Npdoy/21lkSMw4mkMXQnb1fqir5q4I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87B54951-55E7-11EF-90D6-5AE8573B0ABD} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 308 iexplore.exe 308 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 308 wrote to memory of 2320 308 iexplore.exe 31 PID 308 wrote to memory of 2320 308 iexplore.exe 31 PID 308 wrote to memory of 2320 308 iexplore.exe 31 PID 308 wrote to memory of 2320 308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\monaco\Monaco.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD547cacb087df7f71df9f1fcbb66a00de4
SHA1346b8ef73c3096d6a5cc3760822f49df026ac88e
SHA256a888596c259ca9ca052adbbe996c509ebaa9b249f24faa095ebd731ad30d3c86
SHA5121aa98715efa49fac2b2a2b981b70599059ae87300a80e85bd4f77cf2086dea372c7f484665d444a4cb6cd3915f861c1c50126dce208e4b1a0e6d9d503412e0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3dfddcec6a8d4d3af7358029e33a9b5
SHA1d5bf8c649ff69ad8f14bc7dca8dc6dc790440729
SHA256d7024e7f6421b8fc89f2d002426be3ea0929bd08e57cecc155dc1f092cf6705e
SHA51245b5da41aa15f0ee6666da556fbdf5406a61013ee537f0f99502e8eac03a245f14aa5b233314c07dae95bda260c4f2b8be402e99c35d76e3e25c2908e8dda124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ad34e7ead7ccae7960a02166733fe2d5
SHA180de591f4e6fdc7dbfe7f4ff2228cb201e8862a4
SHA25641f33fb882132c65ab7db745a1d2ff5ff6de13d49ab05aa4f4a6e236d715ef0c
SHA512e5298fc2ba2afe5cad61f340714e070c0993008afe72eb247c0a552b736c464280244df149fc6ebaf4511f36b582bf71dbb67775c5323fc410ffda8c57fcded4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fffb41cf2d4c809f29040d621f08adfc
SHA1cceb387ea986039fb144a19bf817950b4cdc6191
SHA256506469df16f84184f1520a6fe8fcd6be6b5dccd2f69a704dbe3f34baa8c6ac56
SHA51230b8ad04ce4bb4c6f5c4cbc24fd48f01e30f6e39f1eb82fa39bab6ad9aa9e0674e2318b8b033bf2a0dee6f04bcfebbe2b227372b947d5f7e77c2833162fe4eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d24469bcbc7b12fe512a9051c060267
SHA1ac723af3ee725a162c38e669fae824cfd7c1553d
SHA2567f0014241008f999b3d28cde38e08917883d8f5851afd0be4fd1b63589ecaa57
SHA512f8f2cc24f0b84647a3eb65cb4233a34b89b40c41e186494e13a52b5fdf6bd59a3b8b24a1ac0d77c63536bfe9099e57be1d8f1d98bfb6a77b550f98253033519b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af8f8b902653e60eee62c5c086ffc837
SHA12a80d6d8b3265504db1e7fe4af08518f9e967c84
SHA256b78caf4ee83bed8d6eb042953681b943df481e0affe8781af6935b2e6fb3d509
SHA51221ef413bdf3aa23066a029f4461b7fd1a2313a14a615086aca720eb6565445e46c4af86e3063a1c1f715849f4984eb3ce9efec1dff8049c58c067f0cba00353b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b