Analysis
-
max time kernel
66s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
PaFRXh6fDu4UDCXB8RrCMW2uvSIr3RWnUfxVvUHC.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PaFRXh6fDu4UDCXB8RrCMW2uvSIr3RWnUfxVvUHC.html
Resource
win10v2004-20240802-en
General
-
Target
PaFRXh6fDu4UDCXB8RrCMW2uvSIr3RWnUfxVvUHC.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003cb4a5b6ed5cd0d11b5f2415551219b22d1149c9fb64ab70ac37c298c6b1f307000000000e8000000002000020000000376625cffe05a65498b44e9a12d33eec9f9eb15baa4b2137a92c8fd4abc226c5200000007bb9666dcb7dde1546d5cd40e486b863a9146a686dd1583b4662cb19df9dc92440000000251375a3b319791e358da9642e3d634b8d38f512e67cfc7931f8d7a21de4ca3b41307db78f35c75bf80e7338839f9857dfefdc9e8408288e7e6855867057f89e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b4ce1456eeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FD93271-5A49-11EF-B137-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 912 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 912 vlc.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
iexplore.exevlc.exepid process 2488 iexplore.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe 912 vlc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEvlc.exepid process 2488 iexplore.exe 2488 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 912 vlc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2488 wrote to memory of 2324 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 2324 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 2324 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 2324 2488 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PaFRXh6fDu4UDCXB8RrCMW2uvSIr3RWnUfxVvUHC.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SyncLock.M2T"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a814d1dbbe5dc1439fdbaab9b6188822
SHA1cc0bf464270ede5da04767484b663974cf742f1c
SHA256fecef3d093e67b7219cd0ee70f9e329107c299813e9191e72ae64bf309cc6c6b
SHA5127c61aff76d797ac299c2f494b76758cf1922761e5d57f53ef67a9b9cc8ce2741bb4013f18a60ad8b641216b5febfa804c1ee7dc6914cea826b0ae4c2992b7729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55814ac7b6d7615989e9a4e4fde38ea49
SHA13352312b69477d9abe83b47ce71eef3e94e1d441
SHA2562ee5c83e46e3c131c4ce9c8a7cd2b6ff75ffc5f9c9d06db28396b4f6582aa420
SHA5123f4f1bb54370fdd958ee8f7825677850943ac5c831e83295654749a394c6c5ae6c256fc7489fd40ef4f743d478cee5862b13ed877fa65d1cc350fb123fb0e8a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50aebe0c8f2acbef8eb2b1c8ad3088071
SHA162603589b7c926d6a115d5f0f1974b81a35abdb9
SHA2566e21c9066dd1c777bef026539e58cd094861e3c26d34da94a819a9ea50a4a6e0
SHA512bea54294b9d703deff2b845aa8736b172376505fe06ac42748436342d84db5a0ccdd9c8477fbdb3da14d50131dbe89f7242fb216f41f4bd9f6d607e7daa61a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57c370100f012347a6229ae9435938ba3
SHA1b38a83e76eb043aed3be92f1ac32af54a43ee418
SHA2567942385046586678cb68e0a50a76be2228915eff5ee2ca11006bdc511243aba4
SHA512b410e22e16af50d3748ad08704012ae1aa527e30242cc6c020fe36fc1250a10a20c170a2baccf182e349095612a0180fcc6de1ee61fef71dd829fc3bdcd24fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD586dadaec3f0309beebc92556fff427cd
SHA1de9b287caaae253910498a34b6ff07f140c652b9
SHA25664e640142b9b43d369abb76bbd3cc46c753287c34aa025b7aca518e9caecd876
SHA51270dd9a738108f870b6102c26120e62de89b9ad4437c0f7a250c091c6f44b76d7af5ce4a23e61b4383ec098b63fdf152aa00f7ff839e23fc0ed0114686b17099a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59a7697ff719adbe58d7102a194a8defb
SHA1a88a735c80e579a9b848ede2051d31880b050627
SHA256b4f9c1395062a67510e6de344f300ac280928f80740e6686be336322c951f632
SHA5127244a434cf55594faedb3a451b2944e2fe9940e99c89bc1f530f4fc4f6c943321ac44b349a6981b40aee605746e906047405dd9fee41f4c10b37985a8c29a3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e561ba7922b02c742d16303eb01e464d
SHA1d17507b465b610b0afcd0c6f8372f0a8572b9605
SHA2565be926a2dd3ff9808482bb49f9daf3b9d9a600cc5a140d120a86f32c82ba4d17
SHA5128bc2c885bb61bd5b9181d48179d63826c64cd2b858f819192f11fa3ea7c62611c88492c22f699ffdadf5bf2ac4fa4c333fc033f6060ed163ff1dbb247506bdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59ecbb0cec8c86ae84b60befdad7f830d
SHA1f7db8244ff55a4132ec205946fc22aa786078680
SHA256d4b8bc0a32c22d587c167d1ecd1f08cd7cac6b9b10c3ebedf2717bd0f5a1c9f3
SHA5128f9d6915ad153e41ba6ac93c081fb00ec76942131c4d93464b3ffc202d6903e307063d5d0efb25649c8e761bfd29fb6da145e749cedc05dba14172a853cb9429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51cd3046a094ffc96a7edd1b6fdeb5d56
SHA17d0e82f95446aa6dd25c7d681e7947feda77da89
SHA25624da4e25fda6f33791e182d864c21ea07319334a0dbf027a6090acd8cd7cca27
SHA512d6776aa67aaa1c00ed8faed9798abd07b362762bd8df8edefdc58d70343876ce5ac16f3e83b0e9f159a6e62aeb33e830c806f61864a965453334e2729e589a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5947bf134c5408c2f6fb9f5d5d2f0bb7a
SHA1a999eee8b3bf4b489b2fd167f39a3e32c87f4926
SHA256731b8369817dcaaeefbdc7877e3ff1968de2517cb604cd0387f46a2da13c50dd
SHA512e3fd2e1cf1ee01d0109abfb3da42b4894c6b90c207b1faf0381f9c01e5bb7369aabcc878bbe86dc16f2f1bf4fe0ba10d43ff63bd635896aa4e8e6c7dd83e7adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD509267e808d3cee4352ea8c26672d24a4
SHA1d1da51869401a1f3886ff68695873d1b3be28a07
SHA256146fce7a4787715cdc159956a055f5aeb166d60a5a4bf6d987088f0c283752e5
SHA512f3bb8c96b756fd8b146a4b7075e269692cbb6716c613a1435ae1518e6de7fc121144707da0c784a303e45bedffaad11babd5a3d7aaa063f7ea77b21a7e782b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f0c4e56119f36f8881cc10e6781f1a56
SHA10c694a2592e40c624c15345f43eedd876d94da84
SHA256617bd1fd42791c236b5ea41299e96750854ff479bf0ba6d8660c1ce80032f50f
SHA51222a09b9420a16705371e96a80e6c6c2145d9c31cc8c36a740f30dbbe719cab432048a74524768fbc34e2d12976bf8cd1bffec83583dad97fa3380e0baed290ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5fb93daa37a24f1434dd3d7ba5f2e0367
SHA1180d4f094b240b055c8f7c1ba8919432df7740ee
SHA2560c2c62f550634d9cd9996fe5653830c169323b4f6ae53a4da0d413fcac1ea40c
SHA5123b0efe303a96278afad11232169ee581f846b1cc6bde4705a8b870b06911779eb610d9d41acfdf131e0afd6401b22548a556bc0dcadf7304376f6ecfc3985ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50ed3bcb5a0d6c05153ec02faf44a4e30
SHA1bfbc3ae1fbd78c7eb9174a736fab5c0a5640f3e2
SHA256bdb3fd2fedd50c79c8374cc74a550c9145b3d5de6412f838d9c2b56c4d3155dd
SHA512120cabf95ee668cd88129c38dbf0fe123e80eb5c5367e19a83c94b5c4c6fe4b8dd9d99d0797cd8c7cd7609c40f91d78f76c364c247f1c15a0b235fd9086ccf1e
-
C:\Users\Admin\AppData\Local\Temp\Cab60B9.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar6177.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b