Resubmissions
23-08-2024 15:04
240823-sfqtbstdnr 623-08-2024 12:46
240823-pz1absxcjr 1023-08-2024 12:35
240823-psg56stfqf 6Analysis
-
max time kernel
360s -
max time network
361s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
ORFEO _20246307407492 - URGENTE requiere POR SEGUNDA VEZ Respuesta al oficio No.111 RD Rad. 2013-656.eml
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ORFEO _20246307407492 - URGENTE requiere POR SEGUNDA VEZ Respuesta al oficio No.111 RD Rad. 2013-656.eml
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20240802-en
General
-
Target
email-html-2.html
-
Size
10KB
-
MD5
7183ae1a2edc11e5dc3de23887add2cc
-
SHA1
ef0715dda4271bc9918e032fcd734a1c1e405c8a
-
SHA256
c54c717ccac46230fb0ed7b0c773a889659de0b3039825c0fbf20bd5544954d5
-
SHA512
06007bb9703d65fe0d5aca44190373a8dce830e04d8a08694c34d0ffdf06e0460c9214eddd15ae9733e6d31c496ce0c2c4fd7c255ff944ed746ed8db41731bfa
-
SSDEEP
192:fEAVKRzRqIQqWxDxI9xxz8I9DZ8aT5sdg3wp6vc3cdcgPToPVx3BPBvBhBOcRcOk:3VKRzRtWxDxI9xxwI9D6aT5sdJK0EZ8m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f052e00659f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430578410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000017c0f8c6c7476d89c2b94d7d5a9f102291c9e5807d2cfcb92a96a8c95d1de4c3000000000e800000000200002000000057cc3231b9156d2d563034e3eb0fc3b070243c649ab9875ad93d94b254b9d34b200000003f0a6359b88e921ac3409bb6dfdf906392903cc996691a3a99ac5c196123ae7c40000000ff32ea57959e4c22a70887008cf84f6add9554e8739052dd731f785990f09ce8108da6628725d1eb3815c1a6bc0372c645ac14045322b341a93107c3028771c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{326976E1-614C-11EF-9CB8-C278C12D1CB0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2296 2128 iexplore.exe 30 PID 2128 wrote to memory of 2296 2128 iexplore.exe 30 PID 2128 wrote to memory of 2296 2128 iexplore.exe 30 PID 2128 wrote to memory of 2296 2128 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6c18ca5c6b4acf395592af861b62b19
SHA1613b426063e023e59140bc528964145d39658c32
SHA256d7bb558b416528a64ac99779f386028c983b83f8f255053456282dd4cb2c711f
SHA51234ed1772d174bccd0b62bb6beab3664211aeaeae7890b75f1b3f8bb8f427a813d5c349e475b798a27febea7bbac3f2b9eb7fd1aff49b588c1bb82c26ad3d2bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be6866bd7a31ddfe5d658c3ed89290ea
SHA13f6b77fa959c42791c84d036aee531e2b84a6dab
SHA25610503fa34da00a56242aab83efcae66798439f22928a67b7fa10941f01812cc7
SHA512c580a1d58ab18f8c3f9452d03ebaa467a13cde1eaaf99120cb1df2d5b137e2d5124d75694ba1361dac3cbf85275d505a3a619c4d2d87fa5d25fd8cbae7696efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8c85a8daf8c88139af25c398794a8fa
SHA106db1f9a5f60d5efc621aa79412e2cf61a2859a4
SHA256cc8baa99f161a1088c37892bc8f5cf443ef0fb3a6701d4c2a9fe736e4ceee162
SHA512824c9606bc8207fbb994dbbc03741bb5a00079a6508c59944d9588741f7d2b47350d9441f04054f05acc16d8604f57b8fd3ce0b4667585bbaa0083928b351968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5239951b313032db2c871f49e79b94453
SHA1f9e9f3a84263985ae0ab97701234e9763a4a250b
SHA256734b105fe2617f1200c7d346fb5465a74cdfec8345c2f540fc2c5a60dbb7ced8
SHA512271af3f3d309b6a53c9c130ffe0fdd2390ad4bc2ae01794c6f274300d34f4d308e1662d4a202a499927b1a27d30e7dbd8cbe2815fb5c9abf03df1411c8a11688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5d0ad103809b1662fe60062487186d3
SHA12e01f7249b0e2206d452730da58f7bfb39479b13
SHA2566166bc360fac909faf1083770a87fd7836b20e77c3b1d5e9529cbd1bdba7a670
SHA5128cd798e5922dd1bd35b8caf554418ed8584f85b2bc6608b4c8f0365db8e78b3dd23d0efeb3027e265dcab972db53159ca8b1dc79924460aee16565521a181d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5581373c8a4ec012e9e0bfaf4b9e7640d
SHA12cd3901d713f01b0e3194f15166a28cc8b544018
SHA256b588dd5ef1bafa6fd4b59a8d8f517c03fe94c22cd9c8824aaaafa892d9890478
SHA5124ee5abac6dd724652bcba61d3632c052bf3b311093ac0df97024a678e471a13f11704ea6111199aad7832bb82588a85fc9370169a4057d547ccde9ef0130ff5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c9f42d50a849178ee51f5625694e64c5
SHA11998f5e73aa1edbbfa449f0a1a5365fad1cc984b
SHA2569c7b673974db82911a796df757e587f2862dac59073c24c57b7d775b8d93bf1c
SHA512c3167d96d5a9ea2fe6048a5564335646041f4232c7f79182b51690a7d2e5a74f48fecdec17b0be1f2d02f3080b2e169813d0b3ba5cae929c412deeb1f6824949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5249769117e57fbe4ec18f16a6616e13d
SHA1d63f11ad3ae1233cac9dd4f15a388a471b0e95f2
SHA256b39b72a71de50ce5c3a096915e2241cb1d70f2368233d0c066d9ba5cdc4c18cd
SHA5123554c93da98d8793abb3ed397be0f49177a0d4d33526d3b4dbf4856c7e88c9317bc405035afd51501b3495421b6062be5e49b051a7a106a781f2c9aa9a4f0635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6b7cb113c98661dbd6ce9342db15b55
SHA10d48765efb02aa9135f049fdb9f9b44aa440687c
SHA256f817506d1bd6bdcdd034c1bc79ebc2b22878d51afceded2cd33e314add8f0ddf
SHA512054bbcde8b5b3764e277745747c42825c9fbb0bdfda6972f6ff3b52914496fa02f334ee04ac2ede525791afe60468af83d9c91d543b79ae3198c47c7a236f774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf908c6f8bfdd3fd66b83b483e15b233
SHA1f1c2990932adf869d87d7c7d4d9a5e873d6f2e66
SHA256447f25ea17023b5a9bd0e5c6019527c74a529ec122d3568553043c8b1217ba38
SHA5129fbae580ffb2afde971c0d2d55ebbf906aaf1c0c5874aa8343060ffb5e22ab8e29a75923d0e5af15fb75ff73c7e0a968a97bdc4ce6008d65ac3725f83b7b7dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53d2effb0c3b588837745ef9c04aaa6dd
SHA15d207c7904602a42773282657cf77b34e260e4b7
SHA256ab5dd95d25cb322bd63ff974352f3a03dd8615e64ddeece250924ad98fb91760
SHA512e4fea6dbd0a7c61d01a14fd250c5bda38c74da5db679f8fb1934b9c7ba78a77d1d7d2460c8ac882e124af4021fbae56de7eaa133b5d98976ca93e428db01c8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD540ca8a1d9740821353bfa26d2c5c1b11
SHA10bdbc7b0ef8feb753ec632e883132bf70f96d6aa
SHA2568e93547d9137ffa709c554be618e5b5ea7ce0d1322bdf10457c1eed628b71e30
SHA512cba65118374d71d887641c8e22b3deef1bbaba593ccf26d9cc5458870949f161db8834614959f45e7dababf4fd6dc83a3e3d3fde0756483c19fd0e3a0171ab98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5154da1075f4ab0ca64aa1636e8afe207
SHA12cc63b3844c100305dd19a301ffeb4dcb1e9ddae
SHA2562c13aad5846810319856ad199661cb55f512380701894d7984d037da7bd7d3e1
SHA51207782a38a47b947c2c75562b8e2eb526ff2fe32160b2ad663db669c04986a3b3ad2e468c6044f64a910ce46d36c374b979dcb333e30b632536d0ee84093bbcc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54e4030eabb3137f42289eeb57e034725
SHA1f8e31b172a4238e087fac45b4a7bb49ee785eb55
SHA256a18fce201fdd1b1b0fc05bde4cba7e87ebdaec50a3bcda76b10eabba97da182e
SHA51291af5969e333bd148fa5988f67e7052b1d374000c9185580ae8457f87bd6252cdc75f3b7bfca657cb3671e994439be823f3c2ea8c69324edf07e804efd0c0014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5295bddc49d4cc9a23c3b511ea9513be9
SHA1bec77652fa9eac2e87252f7c7c1d0e1b1c02a661
SHA256d54770dbfc8fb9b61ff8769d6486b1b50b25af9d137f6cddf016bd566f6459be
SHA5128aa1ec46663885ca562e152653897f0e2945f6f3b2ed4a5a35d1578d244985f51e324badfc2c4fb9859ecac301d235f85203285906332376a3524a50907a8021
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b