Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 03:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://192.168.245.159/dms/policy/requests_ng.php#
Resource
win7-20240708-en
General
-
Target
https://192.168.245.159/dms/policy/requests_ng.php#
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A690B261-5F6F-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430373729" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004a34947cf3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000dd8d5354eff79b6d16fff552bb4c289c17a5fd88925871cd407371e05bf91ccf000000000e8000000002000020000000258ab9d332a9eed9f6f9fe675fa86336a638fcef2441bb25927931e0e00aca0920000000be027099aa7cfcc5adf2c461f1e86d18b5cdba45e043d590ac087e7fdbc8e18440000000550d2823d9314714270812f7f1ef75d91ed8ba7909bad52c3c28af2bc16011c5e697c1754aad272d3101ddd38e2761eb5dbd4c7ec52f581ba04b271d39719ff4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 824 iexplore.exe 824 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 824 wrote to memory of 2716 824 iexplore.exe 31 PID 824 wrote to memory of 2716 824 iexplore.exe 31 PID 824 wrote to memory of 2716 824 iexplore.exe 31 PID 824 wrote to memory of 2716 824 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://192.168.245.159/dms/policy/requests_ng.php#1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:824 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d54093d7bd45bfcec22212f2c6a22a0
SHA1d87eb171daa5381dd1c3e6fffc6d7f192343e92a
SHA256a29593dd03ff89db38c19f7af98859502365045b8f3f8193be59cbb9002c0e97
SHA51266afba5d5ce99c8b9cb3c2faa5952081f717d4121d4cb5f2a7671bd1d4ba6be98fb2bbef830116dde42aa9aba84fad28f07a66ee075db050c015e01119ab2d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9f17eaa48e6d2811b5fa82a063caa5
SHA19296831a909cd80266f144686a53119f96ba7560
SHA256c4d6a5b3f9cf5078636d96be0925662b94ea072421a4bb90a9c727f80ce1c1a7
SHA5124450646e2cf3e2570a77be649c5dbe9aaf9c98c546cc8c1a0d7f062d986afccb8313915e32931958e54342252e6bd92e30cd2c96e9ce57f349aa5eed1f866321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dffab04e2b7cb83d074c5cb66398bad
SHA1a73356c6d430482dc7acc39d507e5e0c6b504cf2
SHA256dc9371eab0ac51ea3a52323d32bc963f59941ec15cd999b0333392a866a918a7
SHA512840dea6ddf8ffe83931e1d1f73cec1b09f7c03fbc6c9bb53acb1ce73dc02b51a55ba84d361019b6ce8b40698ad5abd8fe94b24707d7213741e7d7ddae7f54046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244165dbac6481dc060f303a1d8777bb
SHA12d5da6d16c917a557f2d972af8b40a0c1261ff1d
SHA256c9e2381c97d1bd1bfa8ef02ccff7715f05f0fb4144a22852cc997c8b5a2d2c83
SHA512cd6752b82a099f370bc56bb9b36ff86cba09061a3fb38ce5a3e3fd7c3157d4e152644e0c7004c73d5978950cfb2504e584f55e01c18db4d4c9d3ee5d68fef682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f06084aa9b636a806b260d93f30e547c
SHA1387028e014342a73ff9a9c09e556c73069b8d561
SHA2564f3004ac250c977aa1cb2480df92f00ba50c636baad4574725b011bb1df885d4
SHA512f346c5bab7a9d56a6eefd1eceae7ab943bc2d69787e2887ece8aaf901debf0cef352345dda94a27490cbce91b480055b53b9e9f02208b6a559dc234206f36ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5232fded661b013226b7724530e394a0d
SHA1d000c6dc654ffac88c15da4c2896206090c55fcd
SHA256485bec601a58fe7239d635d23da35a5f571eb75573e2df779d9fd8697b5edbe1
SHA5123e95cbc5c764ba1c74905d340d18c8c498566983c22d01a0b9e1e442feb2ca5b93cea7b45dfa8a6fa90df5a3e99b15cef8cafd7c77ace534be35a003b352e105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f16bc6a53c7e5dc8512d94a95dab6fd
SHA18522b4d9d3391b64dd71ddbfee2b0a159a627695
SHA256f30450cc150b9ac3ea068ae913e60509a089708e575b7337a15cc4877341acde
SHA512ec5934719c25881786e50cad9a35575cd052e9d6103a931d23ef56a0e9b14fe9583ed529d7b1e97e615b8a549fe058e4db32c4e6c5299cace7793fcee453c894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58876403175b70b9df920f333131b5ad8
SHA10bec7d6010a9ad77f08e7ed5795ffd48c8380d62
SHA256d63f83fcca0da821e64577fcca7786e1ba027b32a3b07aae677385045d91a52c
SHA5127ef88ad8606de146ad257cc56b507029a037d2172d0af6e31ed410803a037da270e0b22ee46078603929e329ecf1524605f506fd0a7d332ffd81f4e299e26a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cd820056bba8401ebade8eae713793
SHA1eb15c505e2cf976713d2926bc23f08518cee1783
SHA2566c71b7e58f654d8c66ed2956a08b12423f6d63669d714949dd0ca3f8f89a5733
SHA512f96f16085dd6d16f95d8b2e7a8afdafc18f971f7d6a376df9e78d185003e7487ed5ec4f4bbef4574bc1e741601aad59c6ecdb5b5c887b790ea96256ae006472b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480ee59f4bc6489903b5f1bef5f20503
SHA115108f63df51582817b90ee0bed7bcea73b3f83e
SHA2561802c321f3a4515c2d18085ba8f0e12eaaa494e072d90867ab6381e36171b218
SHA512a74d5ac5ff58add8dc5c9f36b219cc8762cbe91e5fc76fc91db122166254488c68fa5bd7914467bcee17618788a1a9265066ef072c3f71789358104d2fd0b208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ba766a5b1ab935661c3f6d60272a94
SHA18b2b297eeeac60993fb6e222815fb74b7b4e76da
SHA256568ec7f875542b219262f26448fc7eef42ba0ff0fba1b1f2849911776dce3bc9
SHA512385de560b1a74a7fc504c75a62dc606eec25756285ba5d02c4c51685b502da19b4767c8a4d6a7cc3797ca87d7638e5c11dd3a21880a1a30386d2b8276d9b8b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524352372a99b0f024d4869556857e725
SHA1d41b65226d43e0ce7cdfbc5d509b8780253b7ddf
SHA2565e6b367d8779ca63613c09125c6b71673b42b26e7baef1a61d280820a016a27c
SHA512438010d2e622932d558ed9d088ff7c6a9315a93f197b9c5e9d0037616c1a8e63c544aced4f8a087a071da845560ca372be3a7cc3dffc3f1371141dbf2f6328c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f04196f9bca14a40552b21c3bebbf63
SHA16335fb1eb1ff44173817fc9122bd92488fe1df17
SHA256f5c8484716a66d7ff287ae858d45596ece08fcf05c830d3ce08a9a0647469966
SHA512eb67662b611d132bd52049b7a00b1c4eadfc07addba809d1210c459942b7f7ec246224c51fd9db339541e9bdd5b267e2291995c80c503f15d9d97978dde02ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f7dfbdbdb2eb03665f27946fed832f
SHA18a0fb7952c4f0005ae5b965a8c57bc378a55d10f
SHA2563bcf38ad94cf95493b5957874d58e08e968d4e718a4efe88539d95235151379a
SHA512d405fe7fefc7f2ce019f193a42de699803a3e0b77ce4b0e407409c7c0912c18f5a8253efcbc2e5bdc05ac2935e74c0faf129125328b56ce9c36981038efc4e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b208d181062b1dc5d459a75110687de3
SHA1666d979a537787e5c3682e7c74349149937b3b96
SHA256454ddd5817799153338d54ad1a19efdc2f51446398693c8b79ff7ddc7e1d4c2b
SHA512a5f17cc0659674551fca15d4b3effa68462793958526d82cdc1d532c5ac3d579cab75d122be117ccc7b5fd31966ffcd3d98e9720bd6fba0f36663e7ab5e5044f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527f18ffab4345cd365ba2f6344ddf23
SHA182538baf6e9e8781b1ae2d6ca376c21eb0ed47bd
SHA256c5e88d675efde044e05a318431e07196f50de1637edbe7895fe429895e39ec45
SHA512439210acf064704f8cd96e10c6ac8f0715fef57cd1001127ab6f4da18f925090875f1429cc80de7906e2748f2e9a6bb302fa8f05a1821bf68db2e0cbfd26462c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bac64ab5452688daa73661ead19b963
SHA16fbbf346f77accebf8aa7db7336d8dd4c2f7ad42
SHA256d975458093c06b0f14568dc9c75d4c632965f8ff8c7c9a832f265083388a076b
SHA5125ba65b3490d822efc48a625eed2248bd9e69142f6ec8762de0893939b020a429a3407009c2348d41eeb94e6bede78fc88625c8cdbbcda2e82ac2b4ec7be89998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc466d467c6c18845c6521508b269a7
SHA1c2ab9cd26d311802e8253ed0e8dd02971031c414
SHA2568bb407e3cee54dad98c002ed9bcfc45ee9170769ac09f8b6b45e5c3f8f38f6ed
SHA5123bfd430a334b2d8f91b2ba5dece5935b9b0de0d1a8b6f9e253852744d097f14c546c6dd558063edf3818acf6f7b09c2bbd31a8ea9235f4ef3a8eb0e1b43ec692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540aff2d5335673af786cfdcedc6218fd
SHA190f10d69fe22bf0b911f3697c8efd2c58b9fd9b2
SHA2568362fd0be5c040c7f8d336af75165b58517811481ac76c697d7e139a97d77525
SHA5126cc63caf9ea34300cd2be368809d65844e4a225dfc96343ecf58d5e69f4b098d71b14ba09fee3efacb296444da363dc06bc9e0ed6fd83f790b2695591672b860
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b