Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 11:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youdaoxxv.icu
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
https://www.youdaoxxv.icu
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://www.youdaoxxv.icu
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
https://www.youdaoxxv.icu
Resource
win11-20240802-en
General
-
Target
https://www.youdaoxxv.icu
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2220 2964 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E28F7721-5EE7-11EF-861D-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430315421" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2964 2104 iexplore.exe 30 PID 2104 wrote to memory of 2964 2104 iexplore.exe 30 PID 2104 wrote to memory of 2964 2104 iexplore.exe 30 PID 2104 wrote to memory of 2964 2104 iexplore.exe 30 PID 2964 wrote to memory of 2220 2964 IEXPLORE.EXE 32 PID 2964 wrote to memory of 2220 2964 IEXPLORE.EXE 32 PID 2964 wrote to memory of 2220 2964 IEXPLORE.EXE 32 PID 2964 wrote to memory of 2220 2964 IEXPLORE.EXE 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.youdaoxxv.icu1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 38923⤵
- Program crash
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8
Filesize2KB
MD587ee5d3eea3cb68a761c4fcaa003fc4c
SHA151018f370e564308eda68a87768d75c2aa625e1f
SHA256755f15c6183ed8bd3d268ee00357cc3782fc911fd9f2299eeab0c20ceed4f798
SHA5120f59acd2cf30005d06ca2ce134fd55932051efdb4ec7567f537d0cec2a584da9789f6da6d9121cc9daa3d41907aa97f498b45ae22c1b55ef457e6672ba39d355
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7229E30BCFD0992128433D951137A421_175AA887E5F53442EA7A85DC71939C17
Filesize471B
MD543ea210c191db5edca03195fab1a4289
SHA15bf0c7753698d2dd40134a7d28e159156b38a264
SHA256a74cc7ec033d285f1ed5bef82997b075545bff60189e2e8f9d126b72eb20c51f
SHA512657994a2d6e9ad469b9ba4aa3a8008aebe3b2dec87873d8cd8c4da381b07051a5bec0af459ba39f1e89b867b566914b06b56b82437bd3bf6ade08b6499154718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD53a0e611157f1066d08c3e5b273aba714
SHA10163f166be0b036cfc2b6ce78d59ede05552de17
SHA25620a8d02cfcfd8887394536448dc97c88d49a247a4a933ba7081faec72da8fa8e
SHA51255a387ef662a407ececcba0fca3d0a48e3e9f36eee906684dc78053396915fb5ebe78ea2d1e7ce313001cf9d7b1ea41cda419dc554957d1a4ec80d0fa7e82f00
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8
Filesize488B
MD5dca7a0497dced34bda635bb9c3f9fe99
SHA107a80eccac8345d00eeb1f42d7489f62f49bc72a
SHA25630a245f3272e9ba447c56ab766bb5ef11927e78f467304d320aa84136a1bc20f
SHA512ebb0be742c351c51f24f55ccbf2e98858cd2e7361893f5ef64b7dcde39057fccac08bad94c90714574d242c987fadb07a2011be66f9635ccceb645a3e4d83cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d1a26c1b3f5e01c0f089f2d81aae6ae2
SHA165a7e3b2cbd73c6fdcf11216f36f10fbae79b3d1
SHA256cbd097f8303fd3cd54c036ae493b16ace5a41b746a53b368620a9e6fd9167721
SHA5120f4a9fc1a4ed5ba3b207b194a9e4752a1206acb45b04820dd62d6f3627a159b36bdc2898f874b89402f8d11f5a118662ae189b702d975fb9759d77b7d8c521e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7229E30BCFD0992128433D951137A421_175AA887E5F53442EA7A85DC71939C17
Filesize406B
MD59e99e804cc6b4415c3f80453fe1de6d3
SHA1379d784b00ea79e9eef015206b97fcb659d02730
SHA2566c33ff2d8564890f8bd246986faa7f503541b9c88991e0d2f39170ba066604f8
SHA5126e9a7989f82e00533b164eb9be35a5fe0a3797cc8ed1cfef30227afde14477958405773f2021eefa3054bf7f3ce87c464b514c6383112154ca9684bfccb4e6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1033c50dd66be5be0ce4c65e87672b8
SHA1b765af4fcf030b64502118827adbb99d3e236a32
SHA256e6b99466677649d8f24466cdc8715a72400c4155eb66bcea2fc43d373accd20e
SHA5128d51c3f8558c58839ef9b51a98bb0c28c9edbc15b1083225f9cdbea1289e90228e527d58aa5ba6c599b02afd9baf4651fb8edbc1ce6abe4452975b1029e7f1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ce1664c34d8323dbe0bc9f5025da367
SHA1338b4e0fa4f51af33ea4ddf5111c0b8e6e902249
SHA256b72a6c5f99b040d01de898fcd1ac3691b0daf2043489b75fc26f8cc1b1eb27ff
SHA51245ce1a519e70ca792239c090ea76ffdabc064f9e2bd4f7cf50ff259cd047067f6f1bc61b71a098a71b7bf3ab818b3596e1b83dc5296b6e4c45c4ee91c1618f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e611b77d36b390e315399bb9d5340bf9
SHA15fcdf054717b905dfe32a10ec2f39d0609eab377
SHA25670633f325c679acfb7066003bba01657a136fed0ecb527f1f247d2f57b5793a9
SHA5120bbcd7107eb6e80fb7f67a0cf715f8ba14626a5961046ddc465580a604e57b4fdd721561fc3fd540172f110d25788c898bfb48bb092a503890e564e250dd023a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50497253d4e6339a77e190f8953a843b0
SHA1fb14ec5f3d12e1112c599bcafe614ccfb5f6cd78
SHA256caf25c4e5fdfe62f5eb9f4e11f02fd2b354359f7911eb6d6d3a371c8149fd95d
SHA512bd78c4e01d2e6fd3d8303bdabcd9e72cdfd06f307f4437e73cf34ff9aaeecc63606aeff97c1a911c66bfd59c25f8d94acd004a08016c5e202abbc5d15beb2160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb52b995f3a30f586c8294ee081d0ad
SHA1810d5622543ba15d3020e9b00755ac71e753b145
SHA256181d4ed22aa583b2dde3d2ce1438c39ab7b0c604b9e5c7516a2fec3489af3e73
SHA5126748a71118fc1ba3b88085c2dc37978bf92ee802d431b55de65872cd590a615ad8f5224b824624d40e83072df8f67e6ac8e351500870023617e6007d08f9a29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbee892537e18c8a6189cd47265ef838
SHA1e00e7acae25b1fd74f1d315979daf155e2de1f79
SHA25651bcd8a1e656a4f634467a48d9c2df97501ef367adfc1bbca93ce292d60f27c5
SHA512feb668d941a4cded131f53b661e2a7d46d7ca963c37f34dc72ccea560b1f220984129ac871fac5f02045213ac4630a4d3e011b2fae9dd0f42b6333af044c1bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c0fcaf328f38af1ae69979637930bd
SHA13e7a9118fd4e6c5ba012ad1df6e4bb01ffd652fc
SHA2566791058ef8685ae6844b6616cb14cfad679280320f6d5c21745cbba9e1954793
SHA5120b718137f43ef3078efc5d8e02410aa5765c75121205f239c600dae35d0dd4f9a38284f80e31e8664b4a419e0cd1ae52514c031c4fce1dfaad2501d05c8f9694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43a38c4e285ea331bb6dd8a41017e4e
SHA156e72132371e02a689d67ec535ab16e4387d4fe9
SHA256ea68b1124efedab7078b43fa7066bf607b3f28e7cefa0f7db63176d167d1fe80
SHA512c67eb4dc6786d4233f55b7d5a575dab3a34dadde37dffce8f545eecfa1a29c046f809517bf414526c4ea6f83cf5e551a4aa266a99fbf4f27a5f831db7606da80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9c7139bc45d3ec28e9596d67170f72
SHA1be358fe3df5946f2c923756528a35d6287f6df54
SHA2566a09812d0bc9e4d18f2e6bd77daefef95f42416a8bb46127acd8a22169cca0a1
SHA5127b4c58bb10263302d13e29c8655c453b76e82915938deddf2713f921cc024a85b5f0179760ad2dc7e51b0af32528152050f44471df8be487f6619cc925987f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b6856ab52c2ee43ad0426ab233fd93
SHA162a1e58dd01dd422b036cf204ae81fdfffa3c6e7
SHA256818afb817a6a81da87f0b8b118d292e881811d673583621920828de84b98ec62
SHA512e262260378f4c384273d0e9d6cbe4446c2a2984dbf2f241feb9599fb89d8b4e716aeb80f400f242c331d6fd172704a35a61c6829001f207e69d6e7594cfc462d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a13b995a9456fe6d1cca18d4710f67
SHA1d4dbe5a4d637fa150cb6ea8975d8682976aaf3d1
SHA256df1daa86abb9db3e771440e26904821f8e056aa7329d77ae2c6858eedd659746
SHA512f49995c75f5aed9c6abd2384c4e3552408305e51bdf2783da1d64b351cd3dbaab8908689c1aba019c7702502d8a2e9e33d9c3c56184f03194df100325b976876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce348085599c42e71f50c65b56f9ae4c
SHA1f06178cdf11a04a00bd2c72781d7b0724e385ef5
SHA25680717ceb50d46356c94f88198d140a8f4c04d3fe420b2e737c037c7b602986f7
SHA5126ec434aed9a48dfaa9f08bd62975c57a219271db5983249a271605ec90414409c47b3e8f1910e7b311a30b06de8f755868825c1959a9d571c436aae17bcd00f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5013317f5751ec5f0fde40e5b3e0cfc9a
SHA1fc858cd3c992a80de5b7f21d63848c7cff58cbc5
SHA2565a5e7d9b430d284cf7ac06532afac4117570a5eb5f4bb3fb5683e64b28af4b15
SHA512b50e222d67dd8b6cccb6b9a9054f322230238df860c49c9d17f21eedb8bc7b48840e9a5a1516b45f48b65b807a521540c16e426467fbceecb346319f9ebb7835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD54720ad2893d8a1e39a9b2e238ca1dbcc
SHA164317c819e5ad4966d4077950fb2f1fc28a21965
SHA256d739a0dd64b09e4b65a05c29d6405037a88f90eb44d26f009781ed3bb521da89
SHA5125922bec7006a0bc023fb3e1acbec2731c5272274c88771fd82cd3a50e34c73c714ab4bd1f276d04f2a530d985c742c8b0d77bc956e859d0cb02da8d7fcab6b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b27d0ba1dfa1a368d323bba483953a38
SHA19e8620c0e3060df98e9396580e291442db15180f
SHA256d07752eef3a466930c87e0461be959a1dd56b323674d0dfcdad5fd7bab39965b
SHA5121899a42fe847577b6c9e398ae65cf17f9255d92b22df404dc97b9ca585dbed704dae03c050118aa51e90639de8c98df24989c3d8c64d1965fde62dd992f4afca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3H1FOMV1\MF8VYP5H.htm
Filesize15KB
MD503a518416b5bee8ea666bbb1c1e9f18c
SHA193901be2c512377efa08fb9272cef28202f93d1f
SHA256754f6cb2ecbb2f54fc739e195788bd462cb155730a690c855d7beeb10221e78a
SHA51217d6957fcc2d1b858c033027b9a7d4b0bb0e3959bd758bc53fa9617187a229e572e1a9cdb0835eb6a33af6fe349bb531b39c2b1cc3dc9acd837d653ffc17f743
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b