Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
clpr84VVJxgADgaiwlBnQglyK28hiuc9RNBjvyCX.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
clpr84VVJxgADgaiwlBnQglyK28hiuc9RNBjvyCX.html
Resource
win10v2004-20240802-en
General
-
Target
clpr84VVJxgADgaiwlBnQglyK28hiuc9RNBjvyCX.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b206d527a03ec50ef025eb8548cc1432d76e15d4e993b743e0528e7fd3dfaa1a000000000e8000000002000020000000b8130ea488cf92db47e74c2029758136f3cab0a6e67fa044716942b1c10ef5a4200000005924cbb669a965a79a6cd0f0b55290ae9851422d8d075121359fd66ca2a672ca40000000e6abda23d551a31afb37cf72180ab4e38f427e4e282f066349dbff7f0901abff4ba3546e7bb2f236c0fccbc0595607e6195423e89eda090500c8b4cf8cd7717c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54D6B481-5D3D-11EF-BB68-FA57F1690589} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d9d4294af1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430132217" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2368 2172 iexplore.exe 29 PID 2172 wrote to memory of 2368 2172 iexplore.exe 29 PID 2172 wrote to memory of 2368 2172 iexplore.exe 29 PID 2172 wrote to memory of 2368 2172 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\clpr84VVJxgADgaiwlBnQglyK28hiuc9RNBjvyCX.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b387d471ec460f0a0191aac437832280
SHA1ad0ab3e71c5e79424bccf3903bfb8884194aa1fe
SHA256630ff0b11a021a44e096e816331c11eb7d8b7ecda7bb3530377e603eb4facbf3
SHA5123077f53e23c9b7c7f3159e4850c12aeca13ffcd77302cc735ffebb6d81dd5988a192f12591ecf19879c98c4a831b17f55686b7656921370c4ac67ac83c054c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ff52b94de0705f303b5438b9ebfbf1
SHA17274d43e52c64999b00c3c866452ad6ca167a390
SHA256b82bb764e768040837a6674cac407012cc4792e9a399ab39ce8c7cbae6347531
SHA512c1bd7ec975087d1933a6b158d699a0b8e503326031167da740367f984cfa2b7380091ea0a49af7818d91b02fc85a48a85f07f543dd45284b7f632d525e5ab684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874c0a76a75862d7fc41ebfaa6c4e4b7
SHA19f125f653732e53ac888c4712bfe6ece4c6b2d8f
SHA256ca0bd0fe0f1f11203a05c16b42168df0c1a25147bc66816b24f517296ce5c700
SHA5123a95925ea5091e8812b3a1875f5987aac59f22726c83fa1fb8daa64a7d9e709a287156a81f9dd9830a9178fbb6b77ea64cc35c480d3db628995cb100dd37aa8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7be98a140dd0727b5e111c83e9071a1
SHA1c44876fb787aae52faca9663c4ad2d3c9ce9fee0
SHA256fdfc06c760d603c49129556ca0b939bd539774594a476962ff94a1ebb3b3a6dc
SHA512bba38c3cf191174ed24604a1be6c560aed1f95b6e64d25c575a57143b714a9fa4561fbfa060a994c4b94d447f40200705bb1a3a014f6685fbef3031c90701845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71d3fc94c138cbf74fc48d29017606c
SHA10895df0ca403efa8d4acf63a6e037d7812a4d4bf
SHA256334908f34954d88f08f4781950a1b883f052527af9c362892ada0cefb1d038c8
SHA5127497c0f0cd3c76c299b696da21e4ab16bb1aa4c5a22d01ac5355150998b2c0c29ca3039c9f3f4102a622bb74fb28bdff95a0ea5d72ffd959efd284cb912b8ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c631ed431a4fe723bb4505d83acbcda7
SHA156b06eac5c2667cb292dc1cdab81ba346af89cc2
SHA25654f186614da3fc7d522a272539d303957dd14ef7388663ccc527d27af2c94bf3
SHA5124ce2930c503675059df762639148e25e4e06875bfcd5dc7eed9ba8fb0b6d8bbd917e52afc4c6b06d79cb61f4a5fb66b315333a3c146fd3d2b041ce52e6a02f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d85222e8e87b1e9687fb6a5da79590e
SHA1f24b2038685e5065434e6867aebb0b995038f05f
SHA256a96b07f4219183ffac70365024a9b9e3b9d71fea0f9dea4318d800d7d51c7303
SHA512ef7f5eb0371e51fc49785b48957d2fcc2eaa3f146510659081a44373036a2b222fafde1d56598492e1a14f4f6fada602672bd86d63b12735536554edd31f4734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f74b837bcfb72a57cbb4adcab7d625
SHA16864996ec7892e0a6842a4b2e656309faed4198b
SHA25629d98dba66b0e14462fd74ccc2f473bfd88e417ebc2f78f9b92eb306212bd8ae
SHA512aea64ab7d81d1adf645d40dd549ccc2c7fdbc6f105924a48842d58a4af4476a7d62037f25da73e867f7fad940e7d7f1d989d782ebac03636fb7a5c8c49834b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e59f10bf5bbc3873f4ef16ee49fc108
SHA1564757429af1fe0330b43f3429b9e2d2399063df
SHA2561f5a9f3596d22212e31287e2a2acc7b949dbb2d9728c6301efd4dc47fba61f82
SHA512962f9973a7b08e4bed9a3b6fc61570d3774bb6ae306c6d8ba6bca2bb21ffd6c5b38e64c273f95575a1dacf4a6995fd3a3243be08fadafe80d4591fa98bf62544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029390c352b6b117d44e84da0392a840
SHA103689e855385b8d5acdb6cecbe5cb15f69484372
SHA2561a070816581ee393695da6d521f7272aa4b5f9ca0bc5059be28a2fca6500a1f1
SHA5125a5d250cd6022ec45e9ebfe6ba4f45a4c40de34f2b9a200229281f010517cbd2d5e6f9c11c1581d1314a2cda87dd0df6ad291deab79babc9e9c3e3477c477109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57805d6a0e9aca7e3cb3de7b46d5297
SHA12307dd638e019c301d88fd93c8e91a4951135aa9
SHA2565300b7f1f6bcbb86cfe3edbef4aefa8da0fdea2fea721491538736a8062fd870
SHA512ccb3520e8eec7c44849d0c6782c6699d0e64046709a893012b10463b982afe6540a6025df082909b4f1750b59c1d3e50c62fd7023d6a9aeeea0ebaa92c7e01e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d8229699e3c6f6b8520b1ec2de12da
SHA1963bcd273bcc560041f2fb5a537c97aa6aaafbe5
SHA256fe790832977a9eb1e4ec4a24b2d8bf7fb0febc88d86c26d98839aac23e607044
SHA5124622730a5dea805442e8c7cb74e54c281d107017a4ca6832d879033210702cd8f45f3bd8abfe5c44e620cb4756a74b37a92b1382e817330c028eafe841732154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551993e10ac0c941d90792b6060e47734
SHA110cf388d3f84622d287fa3e495f99fff643e92c3
SHA256f609f4d94f3f690efcbb9f4b67d57f0dbfffdec915c5c2494f917153085820b1
SHA512db8980a3c41fef315fbeee78a2b56bbd850ffd738b8fa3570ebf1703eccea02f5fbb1db4606a8b455a0d368e4bd12445c90ad216a5eaaf1c9b84c26854155994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42137ce6af81554d47eb8f77e3ec66f
SHA1fc37f78d134a8c529f4d2a01de7c079cb1dd5692
SHA256939251fa8a8e97533b1a4bbffb3b508ab8a865ed47fbafbf9c612972188fac8f
SHA51233f2572c74f675425f125cca6c0c29922d8f8fd29213e4666512d23bf59c61e495532d87baeecbf6ae0ae0f9edf024dcd5f44c0f55812766c4c890af6f181b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbf509046b14c1eb7d67c268eabecd7
SHA1dc377f701ef04195e69a3e6d841946eacc7dd476
SHA256d0dc31539b45742a155c5c3423b557310bd9977fa26517da93de084391813ccd
SHA512cea5717c89a178ce3192f73443fcefb9d0a33f9f4bc5b78cbcd72b95fcd8c1d75c0b3b0d879aa785abc8728c5afdabacf0dfb4115c52aab1e2b7744eb45c20b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e0425056c30b9035b6cd6a1334971e
SHA18800935e2d7766e8346b19ab25cbd072b8d2333f
SHA256121af535b4abf665ba8fb4275c05249285e5f96195fdaa710a4e42c4ce4af048
SHA51202b32d5801533af2ddd22ad0e0e8e81e7567a17dde3672969f589ddcf7c1cac53439e2224d1b68efa0b66097d53c889870ed5b9284066c5e0ad589ab5fea0b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c189e6b99023a0363be0493c010e07
SHA113ce65337c2968c3ecf481a7fafede38497ef91e
SHA25692701f0d27b7b934419fb3b908bcd6432b26db0a88f5b66f28250c5706542145
SHA512c7b4c75a5c617dbfb25636a5ce34be99f9a01b6b4173cfc5ac4723b23e6a7138e71ed72ad509f48098fcff41b7bae5f4f391123ab25e8a7a01426f50bd224b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbebbfd663b093d728434da6981a017e
SHA152175cde9467f93c84cfb979fc81d7a6f4537d9c
SHA25647a39b3ef2be5a7b0464b9747f00a2f83b2bf91bb45a4fd8203603254831cadb
SHA512f24936c5d9f98d01389df03e1409637dfd2be6d7313d2edced9f1e6c30c5570af9f17714179f1dd218b0431ac61ce9c190b073107b97b73143ffaaac95a633e7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b