Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
SteamRIPpalaceofhumility1256286199694495844.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SteamRIPpalaceofhumility1256286199694495844.html
Resource
win10v2004-20240802-en
General
-
Target
SteamRIPpalaceofhumility1256286199694495844.html
-
Size
238KB
-
MD5
17ff4593972658c0964b6813e1aab14d
-
SHA1
4d2257ff540dd6e1ab14fce6a4aa1be96721ce3b
-
SHA256
26ecb3cd51fbaab64cfc024eabe3c0c8230001594be9b34b9e943d01fe02ea79
-
SHA512
64367f97c622f38a74ead0b7596dfef0c282c28e35e70bb5affec99d28f9358b96eaf7af9f4fd7b85af28b9ce7887e58f8bcc83abc76946a88dba94d77d6ae63
-
SSDEEP
1536:4MNDL8DMDahDEqlDO/RnXbvYEVoSWaoo1TREiDQcD0sFbyMzQrHPDfaS3epmxZCr:NeCuTsX8XDzsl+SRP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506aaffa26f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{261AADD1-5E1A-11EF-80FE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430227055" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000055d2c4de7513c8242026ed403a03d53a857c0338a64859a5239c013b0f133c000000000e80000000020000200000005b753265da150757edfedf0fe2c3f60025f55f496c405292e718fbb6d079551e20000000d449bf82c4193d6f8824e161a458a7d5eeb7ffbe832ff54e9fa6e621897d14b9400000002cbd82b71d3e752f0d97181c50e34f0867cb448c5ef6c53eaee78a17802f9cfa26cad1dab7b4cddf30d9872ec50a8876e92595b4444977775f0cf167e9622b67 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2804 1904 iexplore.exe 31 PID 1904 wrote to memory of 2804 1904 iexplore.exe 31 PID 1904 wrote to memory of 2804 1904 iexplore.exe 31 PID 1904 wrote to memory of 2804 1904 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SteamRIPpalaceofhumility1256286199694495844.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527fecd66286827306fb5ba9932405088
SHA12774601e055ab642c656068bba4dd5d4eb72a8a9
SHA2569e403458f87c536601a082718119b357d1fab934b8f0f432a643513ae0c7a0e9
SHA5126ad45064425310aedc73056baeb0d92a25ce21578b0bea516de88283cc50bcc17f6c7266f844fdb638465686d5359dcec9b8dff75b26a8f4b20166f90055db30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68c6d1c2c13e4d94730578dbc97a568
SHA1520e96dae83e748e72fdb1f00c78932197ad70a7
SHA256403661a887901cbabd029992963cb6d3514a2e4435ce4b00727d30a2896f221f
SHA5128eef24e37af55224883b1849cb514306084a8ad1dba6c86a5a247794e483c1add670770193b7a35f665a444392c6e9bf3a8d29e5d9e109470bad5f232d6b5120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa2dc9e59ad707ae183a2d804646858
SHA18a0502da8addf0b3ec68df81cc15e45aad70a7e5
SHA2562059f7c28cd5f961df43bcd936769b01f3fe26fdc815556fbb2303b99f714477
SHA512946a14636ba2f360ce1ba7b8461377736138f745216e30f64b75a8232a26309337a52e492c20c2ec89df08e43bd15ecd3add4b85b87715711f823012ba821dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55584a2fc4ac1f765e17fc4a3f3902933
SHA1386a620996e7696513459a89587586815d8d020b
SHA256eb9260616c4d8921c9ffc54fa2a64a6d58ee0be882c0e9d403e58c80798172f6
SHA5126800d38384b2e7729f38c61182f1ac0cf88ec044fa1b438f74be2a77b97c65e1cc210d294a217fffe98236b282a4ed070f83862b02099ee7643817ea8f7254c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b869fe79cd593c442f7f31a6c9926036
SHA1564db8b8045a0a3261923253cbc64d2c132712dd
SHA256cb84c4f99bcbd472d3c5ec678a6a677291d8a54b2c5ab265bd0d3cf73151e4c1
SHA512aa01b7178303cd70447f235f0d517623a90980ef6b8707e618f94c853a8feda86dd527f2404f454d85635819835e44f3f6611b39fe131b9bcf788aa43f26e29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e87e0a0c9baac5ffc582b64ac73ce8
SHA160525e85f855e47a8cccba7a0f9aeff0e8d18634
SHA2565054ba4b83a8c9e44d7dfeb569a7f95776516b3424d692b81156a33d3bf7cff7
SHA51292602922dbfbb9e12f18fa18f117e5e6d583675ab8632825cf8c9a6594155ad859b6d78800daf8c2a924f2f4d9043824f1ac657e8cfc572a44b3fb63fc694e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23d5b0ee5f7066f093aadaa858f9b9a
SHA1ca3b70ade1ba7ac812bc40b18a7202b0a397af46
SHA2568fc82c3166fc88a8c9b9913f548b0adb81633a19976d8086e6329cab464e1f2e
SHA512eabdce754ca238d3108a2eb95549d9e490a50f94144dab46504301e762d44f45b01d3e1a624876ae71eeb1e0aba9dafb3483a9bb4fd0b588908551a8c1fe2d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d63c4cef3986d000a088254ff2d12ab
SHA1c88d83818387e26b324fecfa44292200be21fb21
SHA256d01c46c27a86117a00199a2093f34edd3381678be95e3c67641ac3d78e54badb
SHA5124cc5f4792bc4d7b7fecc6aba7b4b4d7ed34abd2bea9f7186fbdb111fa6687261f0ff0883e346c0558afd270638a8224b50ecac3a8fb5e43d74350ca70bbdaa86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0cafcb019656b1bb2ff0b202edac0d6
SHA1e9da241835dd1244c5d744bc9a110b2f83333a61
SHA256c617942e1298358cc1cae061d528c5d7e83580d32b453ecd16f78e409bdbe8b8
SHA512967c59022df05ac320789bb514f1081afeaa8734b4697910ec180ae42fc7c4268eca9ee2f809a0fdd1d366efc23ed7c4f74daf424dae2e33e8fb6e452485468e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0b326c0105b0e2801a890100193641
SHA138c3ebd2148a5ccdb81e95720275e22fb65b88bf
SHA256546b12b4aeac58eedc0d3f52d187dccec18e07b566db0528f9fd2eadf507828a
SHA512bfe12eb558d353f6dde346e52b4c1eeca79b815bb8ce944e21c859049375f1f8cb9201c7da9e04a783388334ddaaa3bfbd457444a42e5945f12fb8da5d8e485e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52091ead9cd8332e3a139c882289ef29f
SHA1b0ea5f72071866570acf77a936abb62c6cf4dc57
SHA256ef1d230052ec31fe88d5a65edd88f66441098a39fbaa64d78466acab8a6572b1
SHA51243b967bfceffba0e62cf10ed597aee447952ea77e986ee8cdbed768a61d92c30b85cbef3055e2cdaffd34082e70ab185327bf587b7fd41de2f718734b7c25e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bad6dcb600847b798d45a3bb7278745
SHA15abd0e16b28de5202f57c3320b7711862d4e36a1
SHA2566f0dc5d3bd67e70017621c27837e63cd0d26b66a9b15d30d63bdc7896063ada6
SHA51249b4661d3ec13995395ed6447da4782ec17db750f1483f4c5e6e7a946a1b1cf75c02cffde0c41b6eefe5872b2b706cb3c41ec707ff89ecfadf0c4d0639fc5aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c1b287c819189242ffd8cbe3697ff8
SHA1a7f854aef450a82ab12a457caff23cb39d37a053
SHA256fcac1099e7498be808d5aa57bf347bfa73ec27d5225f647976c3796eabcc099f
SHA512163d9f7ec2721423f50742f0ff12758bb0da048a76847380e29d123fee5cecd82f4fb1be8570bf6686ea91884e8490b123dcbb5277fff1835b452744c965f6d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d6a872b35992942e0f11160b3325e1
SHA1a405bc189a3b039d3ce13265ff6092641316276c
SHA25648512f8f6e1fef92ce9e26bdf7357073cc0cbfa77cfef6c694cef8c120e875d9
SHA5120b4391d3d8c03c801e054ab0b36043aa650ca335f8e91fbbb609a5aa245904f4d021f2091b2937cb9fee26f05eba04d2d301ab40b7624c71c0c5adc990c08532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb82a620a4a94bd95135246130d52b6
SHA1dc3e0be02b287866509c54e15da696a49f4f4352
SHA25628cba7306cb420a3a171e02754f6a9f39c0c4592a325010dae53a3411731d1df
SHA5127e1eadc5ea002a4352241fe8666c7533ae964cc5efe5bed4010de8992777550b405acf337a7813e0a6d52bd1f7ec0fad2ebf8e70116577f9379205ff577fe7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5386a9ec5eae75ca15df82e6d17401e78
SHA17efff94599492ca88aa96b6079a2954929c5db6d
SHA256d19e9c409e2b20df78c51bcfe0edc3b5858fe86d419963c577a466a1c46da5f6
SHA51271a027ec460ae749881aac8fc9b1ecb8b4705b586906b20fe7bf0ae4732a5bb8172d6c6cc0a8eeb011a76799617bcaba69b55c55918b2a2557f7361011a26c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92c3009751add88d237113e224d64c6
SHA1b806ec12fe96321679b57bfe2a9b2b114e768c83
SHA2560d2b65f81b5b9d06b35eaf298bffdb1602aaeb6039751dc9fa8c32ca35f9c525
SHA5127447d0cfd61e0b6d2a3204aa457c207173609807fcb92f079bdc9206b6c5e51c96d9595ab984c4ae0252c1dbba7c88e9ea95b2f185cb86486cd7c4d1537c7c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7653e5230d213e2c8e4f57eb20266f5
SHA1b26b1e10743173cf1f06380f347706d4461b9076
SHA256ea9fbe7f53e6cb0966687525f5495d7767599d7959772de4c53509afe56e2241
SHA512f35ed51699820f151dd7dc9dd0bf6903e18ffb92fff0baa6f7253ce7664b99e1e6441633b2efb3bc83c4b0448cf83a9698d6b2abad6ebd82c08cac6f9a58033d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592305c5669fbab830ac11c31758342ca
SHA1f8a5939e8abfa89bc8edc3b23f2f4e1a61a82c52
SHA2569a9ec65cd059f6200e47f637d28456cde9adc7a72acefeaefad22ce0c717ff0c
SHA512362665c4d56fdcebf7b5799258638125348766bb1b2cc9a3badf65d1624971d5e885ecff92976f7867f5b724bd16ce1eb35bb3f8313181033b898f5d4f980f41
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b