Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
PCNFO.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PCNFO.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
THECRACK.htm
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
THECRACK.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
picallwk.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
picallwk.exe
Resource
win10v2004-20240802-en
General
-
Target
THECRACK.htm
-
Size
980B
-
MD5
46b26622cc2eaecf9d82c2f2c023059f
-
SHA1
d8dd6f00296fb4f5d0f2766a1a509881b62cf243
-
SHA256
0be6314852cb21072ad72c88081ba2374c8de9b78485ed3cc21816352d1e9c81
-
SHA512
00a1aa8b15314af4eb20007a74391d90371018f0006d879b1526e43492b0921c4438f2bc37b8606e72d64b695b316bfbda543c4357c32ad18db6adf792cb8ab0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000635cf6e63ca5fbbd2acaccc7be1afd51c5efd22394aa9381a577ca7d97dbf856000000000e8000000002000020000000ab7be4ddb1ead5bdda6fd60a9ca1a1ee87fd4837d65205f6a890a5ed9d4d5433200000004562350932a464ebce03a86f3d619c2247d6ea00233d0be7bbbe86222804f57c400000002c67469d5240c4dd588d6d50da3833130f76b960d9540fef7902cdd9289cc2e8baac952fbfd83f78b4decd25357b7cb9d1336748ffdaf1c83882a9752a0c9740 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430043188" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b559e17af0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CD2B461-5C6E-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1884 3024 iexplore.exe 31 PID 3024 wrote to memory of 1884 3024 iexplore.exe 31 PID 3024 wrote to memory of 1884 3024 iexplore.exe 31 PID 3024 wrote to memory of 1884 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\THECRACK.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2c54fd4ad9e9f47d3d2779273b0be6
SHA129939eec938f28b4073ab233bbc5e6064145be6b
SHA25603c1e42461ab6d9918ae9d35789175d955f1f2e67e4f2ce9762851ad7d6cf8e7
SHA512c69332a7de9f167241dc5c6e990f46ac292935b64344f48e39e9d51f1ef8249d0273d3b909d157660ed6e317aa7c3a3060cbb83e5a925b809c32d2a1c7b4343d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598908190e640ea5cc41cb1857c178371
SHA189465ccb5664215a1aba5a82f699bd600d06d75b
SHA25645527ccfcf738bc91f41d648808fa3f0e9d7a3827298486492443fd68aa09696
SHA512ce6b9e3128b57e13f490b1da4c49087ab8450ad529a2a23312efdda2e70d430defe08f2227da7790d9a34c638115f6a4e60b3452a3f16065a717e3c74d7de4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fd2c43b9112ed479686a8afb79e485
SHA1a3c9fa33ca43ba90d20b536faf8e28fab48e91f4
SHA256cbd8289b54b6f79c639687fdc9c1c44eea367e533f6452fe89710bd8d1a5db17
SHA512f900b7c539dbbbe9e19ec620712cccb706884978a74ce783012dee3c1685809ffb9c03de4312490ad00d019646e6e96262a08a46bd16f668afe079aea04eaf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb3be221754a83af7e43481a28477f8
SHA1a5618621ab20de5a504412aeebd907529c6a919f
SHA256710f4b35dbb6cba1586b9fe374927069f93d2439f9ea5ff6a69e34646475d316
SHA512f1fb20f070a2544d3369b98d89cf6cdd9668142ccd694e3963e097f294b31bebe1123906e5a4cbeb1a8619be4dc5226598e5b2de0a0e445a68a4ec8880870c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c188a8b2566c7cd214fe87f8042061
SHA16ef2690ffab05630ad2073cf2988f52b89536d00
SHA25620205846ae2706e9e65d77b505ddd2740505d7560b02dd5511e01f8e1d9b7206
SHA5129dc99034413f81fd22bb547f4dc9a74e82cc6cd71037d524b2141c13fa24f4004a1975ae39f83294bf5b3ab86b1859b379149873ee30ea6061255b2c25d11b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d86456990c92a348292cfcae910b812
SHA102e80e4eac3c4dc02643ccbddf219defed8624f8
SHA25602b1ecb39687edc40286c95079e27966b8c31f798fa7cb7e85de681f12ca2ba7
SHA512ff58515f5a08fa5d934d181507814f0209236fb7e9e6b06931bb09cab893f8e7e4d56ad6bb7ba811e58b4713fdb053d84f21da47a88da387302525a42db3aa98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579447f8715e0c92ca99e10c09d018514
SHA14c881ccf824de483851ee28ac6eb0a01c9a190fc
SHA2561e1c0206cc3702727e71583a0143eea33af66575477cb25c4bfac3e7ae11890d
SHA512a6d835a627e2646366948880b52a153562048d0534903e79cd0ff7fa05fdc1452fdfc930d59a8cb02ae11c8964d8c7e5c4156d09658dd0a457de83a2dcdfceb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb253744e519a12e394b5d025baf255
SHA184c09c9cd2a7baf1518189be78a4d72d81e53384
SHA2562f9d248a5435423647ad795bbccd4d76cf5ccfb65fa5f2601a216f47e5c98b83
SHA512c5912ec35e4e5bd06f5c166d039bac359cb6c111c28e1d42b0a9455f742c5565db77193b3136a72d0cd5c7cf9ff5ea95f47e698424b3b45099981ab596e6bec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f03ea679473f4391c33f13433c6d55
SHA189b1ee106dfc694b36660ca4d05639ac7398ef48
SHA2562769beacd0678856d2ec445c2339fe5bd3a2caabb2be5960073adc4f34a00f8a
SHA5125deb203172dcbbebe0646aa7c38c6d7f7fe095b5ae74cbbb604b9d26b27751959f90b969e568cb32c9960ce8c0a55386465eff9a58bf4d846826e6b786ab9712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d926e604f5197088d0696f14a0028c6
SHA15d4a33116f7f3ef7d8b48a7fb7857eaa5859346a
SHA256f6de6737beb6b8106b2cd380506ad7e04635b70eedb78b171f109d425fd4a3d8
SHA512eb8ad349defd37440be88f564670db820c9ec0426ac5814c281ae2cd524fb64ec8cd37fa17960a438956a9475e6710f39a37bf90405eed08ce2f4a7e89796385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53874c8f603897f53747ad4375283a10c
SHA152ecaab3bb6309153111e3c96237e8874444ed3e
SHA2569a01e56d894b5958b0a48133e930e44ebb6b48f9dea694f7237315ac2363399f
SHA5126180e79eaef69b98d2bae1b72cf169685ef6aa278f4c2d4319535196db5414d2c37a3122c6c8df9ba8aee7fbcebba5fb488a256af4fddb67c0e921836c17706f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53140efc4d5dcd5c906ff013209721277
SHA1ae0b2aa83eb4220c65ba6b52367179b819340736
SHA2563099bebac106fc5fb8c1b560690c8ba1e29091cb423cef5730bfd2a4bdd3b930
SHA512d09aeea146ad73e12bb8426dbd5c7920dc4d328257283949b4d230e4d20a2c6fc62ec694e852674dff37e78dc7eb0264a64963af9ae8f4465b492198716514f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc2c819df0bdc7aeac369a38f1108de
SHA1a9811f326f26f653c2c294f36c0a9843ea82c913
SHA256e33f195be957d0b5318fd9187a3c028ea15a853624b8445511fd84eea1cd07ee
SHA512fba8ead23e6dc18f99a76ae802312aa6d6a13a2b06386b0a61c41d2f3773fae15c02161555d68fed904269871fbc192e908887c860a5c066f1caeca2b9f604dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58807f983a02f18cab16e26bc76613767
SHA174463b59d7e1997ca77383ff59fb825e28eae2b8
SHA256eaa4d36a0e7326501f96ebc4c37fa291cbfa32ab4a2838b67ccfe0eebc96310f
SHA5120b3c80521100b436e77f3123b6dd44d309fd7241a8afb0f14e27666f4e3426593a54f0159deef350f04e22bd4592f207cee36f56c8b75a3a918cebb067593141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa417d6d025a76f77dcc9a9081fe1896
SHA14a6cbc74b7a69be4f828d14df77df105d8848978
SHA256086112b8e280660234c742fa5b68129abc40f9b4c9799c95aadb54adca4e6119
SHA51272a6d09831fa3387d128f0d27ada101595ef9e610e6ea9c3c79c8b3f272dd24df03b90630bcae867ed3078fd89fa2eb85d044f5c63dd79d4bf0c641601e2cef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14ff3fb517f051771caee1e585458d6
SHA12063161f09825d60a6277aa01b58210733e00c72
SHA256557ec29051ccce30a43d216c4e9301dd4c6331b1548418c8cfec1cec1db2f071
SHA5122146890ed23ef5c43354a5a333846a64b92dcd84f90f297ea2efb12d0dd95401116e7e2830fda0a6d5a87c6b9627ec22d34418dedb6b2194d45836979423aea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573776290c914020a13d438610a28842b
SHA1e5e0ced4b2a1e46e498d4cc72f7c1ee8fac0f362
SHA2560d279116f5e58e75417affa0fda9b1a8baf2e22295473191032a0fe153b12f38
SHA5127312f3f84e6faf3548675e2444f226782fdc334a8f52aa719fe22900869d97a040029591fecf200b3916676a30cc101b15202738cb5ac0021eae4ada5bc7743f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5dff755744f123cca789f2f94bb598c
SHA1af31acd9cc325b4e36574900b17e3cfc522a51b0
SHA2565e62220d7117219ccb2f606f9bb243e40f0aca109134eecde8a2b162a6da289e
SHA5120d6bb66ddb21cadf1ec05b50cd06e956ad9d71236d41e0cc327149869da15e5aaf90aa62754ab91e35146d66473244354e6b391ef7fb0082bc7eefe067200c8e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b