Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 10:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://robox.com
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
http://robox.com
Resource
win7-20240704-en
General
-
Target
http://robox.com
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0D92A81-5E15-11EF-B3C0-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000000a1031a0994b7ee3761b73da677e5427faa9d1bbfdf06a50021f6ef6505a1517000000000e800000000200002000000032e1b7e10caa2940917d4ee8129b46aff4b4b7838a563a2cc4fcafdd8af5b846200000004dd1e78cfb828540a467772711ad099ab3fd4db69875dd92c450dfdfdc4b52ad400000003ee9d353c09330f94f8fd1a2f317b41dc5fabd38d89d9131fdb4cd86cd74529bfd75988acfe0dadadac66cc4a896f2e8dba033ec4f2cb7283bf915792d4ecd82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430225194" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50818fb222f2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3028 2676 iexplore.exe 28 PID 2676 wrote to memory of 3028 2676 iexplore.exe 28 PID 2676 wrote to memory of 3028 2676 iexplore.exe 28 PID 2676 wrote to memory of 3028 2676 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://robox.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f3b64b3bd98fccb8334a3e068318287a
SHA15cdb25fe8683e8556a7e68e84cb9ff50346d335c
SHA25687bbb84c81c0980fa091422eccfa7f8e4f6ce3bde88b3d6f9c449c6e81f9e8b1
SHA5129aec7a30a1e29621264bf4371ea1b0a700e4b5b7bceb57f04f03f3e591e5e0bc99c9d45cc009d5cba22f488c2a27f2f64cd67a3934a55682bea06e72c871b798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52027a010604d4534790616d8f0cd5c2b
SHA1a367006004b776825902d11f0207bd13fb376b9f
SHA256b5ee91e3c7e01ca63f4c86488d8a9990362d670d9dab7977a3d5a442cd1fc7ad
SHA512fe55635b736700994cc9cdd56c63d0d1a54897f83b06b36fc6bb274b032cdfa64952483a22bac503a26aa5455386a8478e2ce14bb22ca366d04a0838e8bc13f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a42836f04c6447e3afe70fea7ef72a0c
SHA1961f6d298dcff1f94624ec2d7f5d88e3bfa5ec4b
SHA25675eb24bc4f15f3b6480550ab2140dda7eee23f0fe0e7cbbe14fe117be0cac8b6
SHA5122dbe589b199b0b27b5e89d727f93507855e15c8cb171db22333663d049d68dbe709e67eaff20686ad55be8db230ed55718de69392dea3eb15d3c8ecc02fbf6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7f4a1062463f02cd352edfdf408fe96
SHA138eb37357e0af4a75295e52b0a1e76af76653e24
SHA25677382171ae9bf884046df715f9846442767f2d3b298e0004260e809764947f9b
SHA5126325ee515449cab4076e0c935828b0a26b706175b651f3d3f5b646c017f877ef056d7c42b53c3e56b0780cde8a24326ca90547e51ebd449ffdfb237677b08a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f05b44dc21f76d16a9431f2424d61222
SHA1b1aceeda5ff5872c94d0eaaf73e17fd65541e868
SHA256e92952c160315f381b2f1bf26937e13b39ac2162758cf4a12a71ec4221f2581a
SHA51255d4944b1a3788fd0ce74f2c6f186de64fb930bde05d02488d315572120af8941c790501e06377092bfff0910ed2ea2cad12d2aa1ed347ac47134a42e1d94f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fc80a6129a7ed7da92f4e2c0bd9a288
SHA170ce9105a5e848ded2a378ae70bd035bc82264f1
SHA25640115a00171cbddff59de861dc1215f8ce790afecbcc796358022454dadec7da
SHA512a46afae53df23e145a3b6911a3bc3df28da74b2516032a40b972a81c8a57fcb769bdb4af74f463fb86ce3f3e15df831689be89ab7e5d032e1b720a838f703eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db9048de998e1d88c04d20358de02aea
SHA133a402dcda2f69936ff95e888dd28e3dd60ad7d2
SHA256adeb2bc633c9d44a4519412e921e0ebccf540408dfaba281f3123eed3deb0d0e
SHA51211c0be430b396d696e2a04d69dfdf8107750c1b839bf443179f799623477dec670aefda0b04805121878e05ae6f841a5fd469b7940375c5493e8cb0322fd6dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b77bdb80673a2ef3bfad6326968db6d8
SHA178f219a2704bdf190fe37393518bf42aebabde90
SHA256ab8d7226c6a128d0b71eaac9cb0be081674ae05a67187f212de83efb8dbab353
SHA5121dbc3ad67bd6ed345e5d9b0544e8e57af0323bffd362756daa41c39872a9045822599cc3ff2853ff4b31b7b3dfb0c69a125a862ba57c968cc8e8fad33a958ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7466f20a3566deab8e302b2581913b4
SHA132fd97f839899ef533fd33f8351a1ae567958476
SHA2560705d5783a605f3348f03d290eeeef4c32b014dd38a91251b2b3c62e43881694
SHA512a298deeeee2574e2111da27480fb53873933dc6bc8008d0233b594b0852b9b35acc563fca8639fba315134b0c7afe1ae3672d2b59d37ab0137f421b7a33036e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1c9c0bfc509b611a1ae11ec5ae7e66d
SHA1e4b26357ec22390a749582eafe97af8632d46d10
SHA2569dd5da3d6ad170ab4c8ffda373f7dfb05d76075fe7d7d6cf72d4e4844a1a9c89
SHA512aee965e1432b2c698b7546abf9e11d34b12eb58db14971a31c0e4d2d7f141ede659b589dcf571ba5eabb1185caf88310c503137493308ffcb5be394b1afcfe80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD578a410e736c4803532aeb52951287598
SHA11c0b4ae9bc5638c4280f9ebc10703fc5df6fbf16
SHA256dd12aa839ef5ee05a4a317fd5fc7d1c2ecb29901cb3e4b2d9c9991b595736104
SHA512a8ffdd68229d823c5513fbf58745c96b6f133fdc86aec15d8fbe62f6f15edc03aca763e901614950db1cd667f2edfd57826c390e6df10ee634e89635ba78ec5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5696941be1e7e8e08ceb12aac63564cc2
SHA1c0c99c0fecff1490712e4dd2b5190a3b54ca1c29
SHA2565ae0193bf33743aa590776b3f703888e7a19b2615a4fd43838430b2d433d2983
SHA512f7e378bcbaee64aa4f4099b929457accbd96fd1102b1a94465e7700fdd6b6898b3ffebe158a9b2e6a2c864f75799129bef1403f769b6c21d6ed2089b16286e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ccc2a69725c6585775afa2fc8e5875a5
SHA188e4322fdc3f6874095ffa8d72f46e877b3da5fe
SHA25617b52861950a1229aeb0157435a463bc6502929cf64e9b45724047c703afc468
SHA512fcc3573e56c5da698c8af2b2b3774e2e6404c78d3bfa13af5e6f6085eaab8bae2d4b2ff66a0b619cabd92ed2f932fbf56f36854ade5689e5d2deb4cb8a97c75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d488b986bb8531b3606489a159944ec
SHA110afc6f6879c755c87e14b8169b9dbed85c70e6b
SHA256642eccd11e00a48dcfa98fceaf24b7e8226acf30e9e5a1d1bffb988b8825f29f
SHA512be08a2f9d9590f32e0da66c1ded0327916775aedb66db2b05f76c284e70f001eaf4074617b6fa55d55159de25704fcc6e032bf10a1f6e89f81bc85358392a43d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53a3b04fbd1b66b89044638eb7a69fabd
SHA198db4077294474cbfd522bd6bfbc5f22fe80dfd5
SHA2562b15131a64ebca2c25ac8accb258be419bd646e59a9b414e0cbd615778961725
SHA512799096f24507f724183467f0a1968500f42462463ab269e1b35c0061330678f37f1e68c84bdd9cc48b34bb8fb508a0d4b99cd80d8ef773816f664335469708e8
-
Filesize
16KB
MD5d285ed2f03f48a0c2a80c00e6b6d8cff
SHA18a81ec674633738a64fe9f44514865617e21d82b
SHA2560a2373a8beea069983207ed6f83d344ec083a239a35a55b244b59d0275655690
SHA5123af2d202ead5b52989f46b5de8b95e27ad75f69cb5b29cc4d6c6d4a9dc32bbfff345c58daf708024a4c0c88ccaf0fb5c5bcf09b38408f757d4bddeee7dfd1bb9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\favicon[1].ico
Filesize16KB
MD577e2fa18d7f15845b20b24443858c414
SHA16738a88fa0a5a310053011cbefb76446c8f8fc04
SHA256fa4790819f42ce8c957f2a65cd7843c1401fc5c75a61724789ac8cee87164898
SHA5124adb4032a2ae6371ec91cd93e941f27376e2833c7abab92e36e8cc7133be99f922dd85e213db65ceb64b09b3ca40184d6a1fd5588ae98d72a82a4057dda1c33a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b