Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
cf6b53fd85efe3d8ad1aa3e4a9500497
-
SHA1
facf6c3a6155bae5f75419f4e5aed4b93dcc4186
-
SHA256
0743c0f8458c3fe7ef2f20cbf7ed5ac473156e690036198315fe9510b028a0ce
-
SHA512
9a0ab011612eef899174723018e7a2f80a2dfe956c9739f43023bb3cbcb995708c593fa4a763ccfe2ed2f4c386474be6627dfb65a7ac0aec88b20a10fcdcb39b
-
SSDEEP
3072:Sey4YbLEiAbXgyfkMY+BES09JXAnyrZalI+YQ:SeEQdsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F194B0B1-622E-11EF-B2FE-72D30ED4C808} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430675791" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2164 2404 iexplore.exe 30 PID 2404 wrote to memory of 2164 2404 iexplore.exe 30 PID 2404 wrote to memory of 2164 2404 iexplore.exe 30 PID 2404 wrote to memory of 2164 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52735487ed87c99598eda5c273a993643
SHA12e69dde6154467bbe208b5cde5bd122d2e2dc36c
SHA256dd3c0a2865a7d3f7d87df85a6993b203faaf5a55dec1eaea9f0901688ac11d98
SHA5129258a05497f02888b963c625f23e91f98f45a8d2f725972cab3086b57ae973809469f83cf71de4f15cf6f541805dab4b2c8be854d25fedc011a0ef5935d3d591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5538fa678da3b3b19e2f7e02d8e87419c
SHA11df98867c0546e260c053c59dc6437c49c4a8dc2
SHA25692190ed9d037767fc820ee3e0f3358cc458da922351c93977d313fbf87a18430
SHA5124ddc816094c4dc3f0ab5acd96ccbf5b13b6bdcfb526a88ab48269e0883d80dce4743042dcd022e315db8df9c722edae59aaf203692a5554c0a4d727d2366b8a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b740ded308747859bd7caf29eb0d1dcb
SHA14b6671ad294e8aafcd6601083f536b35b2d88bd1
SHA256e96db646a8d81861ebf2c6b03a28ef99e860b47c4a4a96cfaa41ac1afa96d6be
SHA5128033551cfeb597f8372f2904149fa8115e02f9920d5a1b60119c883cc8671ad20cefc23427591b66993d5dd1ccdc4d28536d73561167ef8efaa22627a95a96f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a521b68798c971df9533fd7e759ff3d
SHA13ce647ef79fc45326e15852d61f5d41e5241d07e
SHA2560987da0d4090fadc56e2a1eea0a73d81873b839280df3e86246cfb04a3dd7c18
SHA51223c2493505df289b280be6f7148bef756719ad29bb15beddad87c0fd9aa9d1e4b00e5b69604d8ce5448216acf0e3e8b76ef5df34466dded491d865b551e8830a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5847b5b1aa4dc41dad73f60cbc9ace136
SHA19c91b855d718b647e85ac3ac4171f6789709fdc9
SHA256573ee1362da6aeb2760d37f6a6b6d73e327491d76f673109a4fb391d491f74f3
SHA512b141d349ad625ef6c4124be2bb0f58fb3b71d28e94e87df5327b05e986ab502243265d06e5fbf036cb138d673c0d98a846d1fb65ecd2b5c2a8c7e143e7bc5881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD561359ad391c683698a072554ffa699f7
SHA17d4b237c55e5905f0505488a5ff1ad85b48554e4
SHA256e2ed64d6154261f965dd858a79418d5c3427ffcd25c43ddcb44b6b40a3e0c6ad
SHA512035ff442efb718225afe4cf13da485231a5771db00c72e7ab3813fbc6f75d7f6276f33df13d90b60cc91b4889de4c8218486fd24e97fe272d8b086f8d8926ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f1dc228b9c42f634bc6ea2e21d95183
SHA103c600d35e36dc6fb051137d1945ed2a34ea8342
SHA25631de00ed5129a7ead30d6e629817b186d12f2d66a519102a3c47d35267e5f7c4
SHA51292b74ffb1ce8651414824a0608377123d9659335e7d1e12e7aeab42c858c5dce503181a11e94c48f4a052f359fcc3b0d9824bbf4593ba7ea0831e52ae703a887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b00c1e2656aa243dbff6b293dad095c
SHA1629d057c90e7b7c21708d5e68529a6f6d9092aff
SHA25654ddadaad96e6bfde48cfdb3cba24e02682a9858900ca046c37e5b5931e6c83e
SHA512b4c192878fe8b6d15d25538b864f5d2a324a5c51de4ed6ee84331f9319e56478d7c8266449fb9c2954506deb422253ddf26dea2be8a3369dd057847da86e8183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e19e2e7813bdcfc5bf4817f24b660ebe
SHA10b50bfe7be60f70939538caa97bdb9bf2f45972c
SHA2566f9b7db8968dc2b74d78cdf21a40439c8898c50e6827a291ae9e4339740a3211
SHA512c6242a2ff370cbb3222b26f139b10f034daf6138bc832984508385aa746df4a944a491c5f2c577eacc3882adfcd41b0e2195aad174c211e4f5f66b7c04ba0c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575e20722619bed58a38852f425a6ef5e
SHA1488decabee2918f6b86d49c964abe45adf033718
SHA2562875479f1ee1d48c0d2f633a215104d01c99bc61c2033e9d4cbcad2039188e92
SHA512618e381fb3613c2fcf8748ec48d393bf0923a8c424b7ab042b9fefc81062f3bcdfd2a84b4e3c9bb00e57af4a2be305679bded1532e63b37918b6ca3e2e100b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f750c2edb154ef26fea3aea082d6907
SHA1c3b6b4ddd552876aefd4b902c7f3bcd3aaa0417b
SHA2569c13b46a368454ecda88aab31959751fb6b3fde9cad2fa4b7e70a45587742bb6
SHA512298a6b212ec0e7ddececa372dc95cdf1d80b5a200b4f7f59adca71e21ccff72f177d9fb12745f52ac75892a4f1eaeef0940130c29ea658c3a3c15b11e65363ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e5ca7fd4c8d1971392ca9f0d7a6a8bcc
SHA1f93fb4da31d3379a9bdfe7e371a75f9257a6faf6
SHA256bc7cb982c7e8ce640688435abc58df4d8791134028935d79b9b8d5fafae2dc45
SHA512e393ba3041d6897840649efbdcbc09a0748d862e0dc826e0a107a54b480f7834c3fad0f9a2f8fb20a999822d8a791b8fa042009e36b31fe998548b570758b331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9e929220be52316a65cc639bdb546f9
SHA14125288717771e57aef60da31d69b28f5c57fa55
SHA2567a320e8cc1bb71bbcc8f3820e611aea4010d2cbf846c32b5102365f5dc97d812
SHA512d240df6e2dbaaacde4007932edc9327ff694c7b464f30d6ae77216d3b027e8faced9a4158ec4481a648976e90969f0fbc416f5806716ed146180a01d24ef01ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed05f0d31bb3cf448a3116ed33154c06
SHA1c0bfa938ad4e20bc781cf4c11689e8ac6149eaf2
SHA256d3b66836be4c6e24a426f9e1ca035f8438f7dfa512fc2ced59480e765f35c550
SHA512d72d1f18ee479c07503581dd73f6a99b70135a02390994ab8a0905ca876f8d78049074a0767eee1fbffe0493d64697e97ed3af6701b4c3b94179d0249bf1e3d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cdbac5832de2f8d5bc780eec6a9b7d11
SHA1432cbbe7b6375c9a27aa2ada6e719ad2eb4c0472
SHA256274c08e32e1acebb1eb785a7d35b02e46f71742daa118b29b87203df814bc24e
SHA5123f3edcc2f7d8b5da022abc52e067743f8c28a189278e51c4166b5eeed9d82b15112ae67955a0a4d8b6212df98f6bfad602226a64ca4a99ac7515064aabb016a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae90b277dad6d28fa5e9e5b6544891de
SHA1c8ea029a8d52045f2472f8651f8ebba9518c9450
SHA25663028c62b45d1e4bbcd1bfc0db9e307667bd8d2589d18b99b0908cc418c2431f
SHA512dacb4376c00eff0144579ab8f6f007ce7334de75a2afdddf5bb75ef484bb0d4f9e710f111eca526449789e6e5e271d315a42fb430be7c04716f07dbed6cc082e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50edb041a163e708fe5ea65046b07bf1e
SHA1f4d6925ad6d94ea62a02a0859c732333b0c9459a
SHA256a379ba864e6657ac12a59a511adb86d2d1a0382e4434e9c25a9abdbf166a9e12
SHA512ac1823cba5885c21e4082786c0e4523d9af4569bcafe00b416a2075d1bd5ddacbae7c6eb036b19d95c6fc53c19004ef482be80efaa56cc1501bf75f8b2f4810d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59d62f1936a6040fbcaed90cd774313a5
SHA195fcff7e9841f0620946c7df7da67f2c0634aae3
SHA2565925616e131d77a288cdae3bc3c499320b9b26d9d4d948f196eae578d6de7aa2
SHA51210748ca1e78b1d6c20fbdb74835c5dc7009d76165e0affb35806d1eca5dc5435cc2a3a3a1a802edd22f1d6f61a3b19531d92ce4f45681a82a12cf92d6507b5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d4ab0ed5ea6be5d5e00fbce1de13e6b1
SHA1c0a950dd9ac2597a275b23ec661c008959317ecd
SHA256536bc5c8c8ac4704bbc9c665ad040dad93bdf7f33e2d7ca7d5cb20c45cb9dcdc
SHA512fd930672cb3d10c30e2d10009dd1e65dcf9af3451753ec5a35bc2018e4f9bcb3f3b08e8fb612cff846145c60158b8f7d5939bbc817bb0bd2d80f8d02a34b353d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0536450d856bf0a2bb55e37945368c0
SHA155ad5c45a39881ce8ed17f5c3b4bcc7c1132e948
SHA256807926aabdac6a1d998fce1f54422398fb12ae95129a26d11951d14abf9e839e
SHA512fb56b09d1dd5c39ee13d79c9e60acb84b9108142b00dc221af2a9a98b9cf98eac5970863be4cb64a0838be273f919f7ce9f284d46f704bf090063d8dc59c3240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58aef9c85cc4cac68fc9678a738357884
SHA10c168369c025203d7e6d1911243c399b6a343c21
SHA256e2bb538fa5304361c011842110b0e28f8fb97b9be44d33feb9fc6901669c850b
SHA51284eb343d796918b093c067499e3590475ae065a847d41bb6ef463a115aefe8a40a7516c93bb81742751da1653f0bb39f713770e9f9344faa78ea3dc92f537861
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b