Resubmissions
22-08-2024 12:39
240822-pvykyaxdlh 1022-08-2024 12:39
240822-pvn2haxdkd 322-08-2024 12:38
240822-pt73zszflr 322-08-2024 12:26
240822-pmnqrszckq 8Analysis
-
max time kernel
5s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 12:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/LeoLezury/Hydrogen/releases
Resource
win7-20240705-en
General
-
Target
https://github.com/LeoLezury/Hydrogen/releases
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C5074C1-6083-11EF-B585-FA51B03C324C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2204 1460 iexplore.exe 30 PID 1460 wrote to memory of 2204 1460 iexplore.exe 30 PID 1460 wrote to memory of 2204 1460 iexplore.exe 30 PID 1460 wrote to memory of 2204 1460 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/LeoLezury/Hydrogen/releases1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543386777d88131aabe7d6e140a9effe5
SHA1f0dd5016200fad525b2955a9d8dba675a2f00b74
SHA25678e4003492555621190754aaf127d9104b927fbd84917da527c4ecfdd7664df4
SHA5125b41c22d9424518679d7958811b7b7f0f4027a103f216cd93bde68b969328f4f8c61d4042bace847907fe29373b6e4d8e63272598ad6fe939f1bcce681d96b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1275b093b729ccc34a505289b877e5
SHA17b165a857299e335953ea834c66541803a84fb85
SHA25603b00d6b85eeb2b77a03c7a9af09bb6331f913fc3b20fcb55ed0f965879990f4
SHA51268080260abadc71dc5aa24bd0e8f372cee403ef917777260ca693b4dc76bbaa73383a1e32c64360e92fbdbb64e215c516373c99ebdb6e41d4561cefb121d5f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c3fba0f2834beff728b9906967178c
SHA173b522c0a0bf1450bd56556fe4c7c35b43f69dfa
SHA2561e6d4b5a025e54599552fb915777232ac79833329617845e00a8cc618d843368
SHA512a8464043b99c84cef500f21c696758ddca0a4c22d3981cd05ea0314d07ef2cf40fa41ee866cafc596c6f3fbc09373452afd6a2231b304463fafc3d95f522da69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be1b23de84d424ee9b5640982db20d2
SHA1c4b6ae570f9064551c7fe2300794b368bc39c2c8
SHA2561b141958ca3e88143fa8995efa60ad4fde6b76bc112273cea31b39477f154ad9
SHA5125a5252cea59b84fcac549e5551b3fff7933749af28fb0de25d94ae0c1dabbe3788eaa2783256885e4cc095a7679b07382cc272fab5b6af7847d8e9afcbc94554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1dc20302329d0b0e2ad00279fe75be
SHA17b0aebc17389af2184f73c25cf45d52a9aa220a6
SHA2567dd35a2202a4398925eaf5663e662c7aeba213882519effe0783677a8caaeea8
SHA51274e1896e37effc3c4a8fa54e71ea2aaf54d5366660ff53536f43e684be3f6feb07650b9466fbdd8b88ec7dc4797232d49d4b1a2e1bccf0cb336c9cade0f2096e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed59038e92c9b1763cfc12493b216f23
SHA161ff3cfd50426d637376bfb86ab10884c79bb96e
SHA256147fc3bbecfa1a5f2b15eb0ddd6c6fe106da75f9601728b4a75bafc1bdc8c3de
SHA51229aefbeeac7a9ffb2ca1f03fef96932889baef1b3d0b40288748be58d50cf1c6ff8f758a040c35e595acb07661a1fb2a32e9b9c1732a59206d1490a5d5661bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84d2ec10b7f6aaa5084f4da4ac798c5
SHA1b1315ef90b57138efb9a50d2bb49a42be15a867e
SHA25618f2b1b23c3303d7abe365f24c31987dad6b67335f750b418491c3b13955b918
SHA512a24294d229b3bb7529275fee36a79244620988624d5a038e59e0591f8946a272aab8e89f8ab9af75224476d7cdf255d6611416fa22f72d51b219c9ada7eeca8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b98c14e65157db0bed83af26e98326
SHA1facf84a0d3d8b623880363baad6d02e2c30b2098
SHA2564118d8a5c6cbc89a9c372cd13848bebdf71bfdfefa8b19676109db7994fef7cc
SHA51210e19cbd310a9265e39a486b9463d163ee862aa523baa43fc38eca550fec27120801420ea4b9c0f33d93501cb842d31dc42d3c78b5843499c75984a1d0b64e09
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b