Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
25KB
-
MD5
7257facec8568168aab17c4e6725ec9b
-
SHA1
f3b98e09624e9ce1180b7a3a83b8a6e1be0ddf1b
-
SHA256
2da7aab7c9e0bee551f50c9e276eba9a4b9229d5b3163f0171fb830dc92bc4f1
-
SHA512
9dce56b90791c649bafb38279af81476710f0f4f63825fe2006ea1cb2f617960d47787a3107266816a31104ee0c1649ef3fdfc2d89175940516680213c163c06
-
SSDEEP
384:upsHik2Ge7rv9bIuaJ4E3+3EY1GLom84PXR+4csVsGdBTmnx/P:BitGe7rv9bIu1E3+3Mpnas6Gdex/P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d6333e67f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69240E21-625A-11EF-BD1F-566676D6F1CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000507d3b0cceba1b57facdd56a01d7b36fe91ebef690e6794cf87128d96b2d792e000000000e8000000002000020000000ba39bb472a023ebf85196a06ffe96698f23bae688dd6deeed6349eb0adf242a2200000000bd9a6eb6a2d81d0d6f04a6b1da9fdaa74f3cf4dd2a74f7b2ac7216765be6679400000007a73f91857b775c1658cca540824dfaf4be356e4c6dd8259301c5228a549c025f1cf9a412acb43cff909734532f4db665a7c3fee97a37f3dad0a215ee0aa6876 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430694462" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2244 1916 iexplore.exe 30 PID 1916 wrote to memory of 2244 1916 iexplore.exe 30 PID 1916 wrote to memory of 2244 1916 iexplore.exe 30 PID 1916 wrote to memory of 2244 1916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3eaa1f0cb8d03e92befbf118c5c897
SHA15a4855890abb50afc19186f701c5a60c20dc159a
SHA256de846c5913e5ed5c18573e82fcca201728b47440ecada861f61dd02d54c1f6dd
SHA5129e00ffbb67f763e511df37a639e116cd6c7423a84bd96f71bbf339418eb86cd87386c139ac2b65a3041adc9e7d6fa57dde48982f8dd754428a9b4997ee46b821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68a788622fcfc0023ab06d0eef7caac
SHA1ed246109e5017bcfd11dacb17545d7516e9f266b
SHA2564255a9369a885161ac8087ee9029368c4bbfac6fe29d3cfeeb6d913c09dd55df
SHA512e7868e0cd44c08600beed5aa2ca85a44f0b3ccc6afeafa9fae6ed807070b921794c2f24f0fae32dc59ffc3d50cea7d9fc1577b9a248cb719ba8dee8910850a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd89237fade984cebbffe4255deb4d35
SHA109e5a4f1f4edb4612d08d5c96c83cc7b09276a3a
SHA256e7abad26e6fb338aa923b1223c368fc2e35b65354a818afc7e141495f3ed2b58
SHA5123a4365e5f9631d34c0edea93e3e1e7048768f92c4a65607153a5936784d5fa56abd3108329fd53a2ab679e1ef65ff9e20fa00004fb5390e734b358a3a9647140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3cb140f102bd2a31f1b32e4330d514
SHA19ba851340c5fc7d4cd0cae0a91406805f732939b
SHA256ae5ae1433ecc4cadd2f006348f5c4e76397787f6f659b05160b694e1febcb753
SHA51219c0d9c0ef1c830d7cd76e6f64c898ec8fca2c6a28d25e6366ffb274754ba636541c3a7db07524e606b9353dd275895d1607e17833f1a86669dcbdad671a764e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e4280190921ccee831b68d0ddb9cc4
SHA1da7d558b9a133343277b4086e074b6325a1a77cd
SHA2565675559dfb107c2e4eee9c0ab0475fe42fc6124801c40404de2f3d029147ffe0
SHA512fa5c4a0bf2ca1254ba2c7f9b80f498ac28ec20d43709aeb05e315179bf32514ef81d758a7322c981f8d996952ddbc97de9235e2187ceeb27cca8deebf525ab32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4b9e15fcdc6c8cc379e5139770c17c
SHA1177e59f68d20327c978106e9d7e9a140601f8bc3
SHA25604b5eae547cfaa616abf14cfc88b99f553957cbf968f755996cff13ee5137077
SHA51255f1f4c4006df99a310c1e3a145f50b7d471dcea1151244db4b4756fdde33435c9cdc869bffbd885bf15db20c9dfc7b1740ed34a763d75842f613c6d758bb5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f224d1ca4a8df1d09e2234f6eced42
SHA137a99b52063fcb5924ad1bf17189b9149fab138a
SHA256e0d9e2d5afe5df303c8374e3dcea30c48478377baaad8f33bb2f87eb72eceda3
SHA5123d4f5f92e2dbbe466bde60a0a7b5170adb045aa2131eed9e64154864748a9eca6f373392dd5bd178a7848654d91c397df27259da25c86ec87233ad3323e820f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fecb4486439c82bccceb39a5ad5acff8
SHA19374e4023287dd35225592ad75cace83156bf032
SHA25678bf8041cab9d6d86cef8d9ad3dc215476e659bb82e4a4ac0f10a318c9146ca9
SHA5120638b835188ff6a2b8255f2d8201023588a75f36434b09f3c0daa5a9f9462f67fa648287f2e96eaeeeec64aabfafd8093b5be48b089eb39b819a52e2279474fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530bf246216c5dc7e73a61ef7d63e8f67
SHA1ffedc42a0caf2b3de2bef2d3cfbfb01ae57ebd7c
SHA25602f6233982d25f527baf6836854a460e73188e56b38a468e2890be6f124e989e
SHA5120d1a5f9c2d86ab801f345e455135ac88d1a342b886374c3059b08b67892f67fad886d4ccb2c6cd1fcfa253478c841a25bbe200fba3d43f5bb2464418a0c18fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534618a27e03ce22237ace555f2cfed48
SHA136b3fdc06f53859c48717374051df02d91e7949f
SHA256fbce695d9ca83f24a05320d7bea28c76dad8660841db32df3ed1a96f316c2def
SHA5126f65065e6d54f24ab0892435e936b9119170c2f92b33e7dd0e84d60fec8be30baf918ebe73cecfbf63c91474e51e8a162d1eedf0d0b84a59bc0476fe3758ba96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3ba1d08b85e4503b46dd089bf4a76b
SHA1da309bc87ea5d4aa272b8088aa01ddb4ba9d5716
SHA256ac2b2bf950426c5cfaa3fe4702d7c293afc7dfd53a5bb750ce58480e46ea7f5c
SHA5129ca3a91ea4be0d18929d12905fe89ea85365fc2203ce858735b71f6703e2f220a677a8c65edd021320355419598471fe291ccc0672fac3e56ec73f6ed01aa2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee63929b8d062fb76ed9f2a9a1317d11
SHA1e294f2ea3e4e95e75a02b47c912dc0e840666f5d
SHA256aa345895c26a071ae715281eda49f47dea90363f7d12ae98e22d4887e1f9eee8
SHA5125d8cf8ced0acd81a7400de6979fcbcf3c7015de6ddfd186d8623e7ee97e71f49af823d0a1c2904baae5d9c66ceb2b49acc9040b401ae78156ac43b8a2302205a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd9add5ea6d29550d512472278e262e
SHA1dc879bfa774bedb83eafd2d34d9b4135ce0641c9
SHA256f793ca5a6c45970e21972d6bdbb1190b715698f6503f5e7de21a83b02cd47235
SHA512183183bce1d60f3f6488a508805cf3837e749eb2e2eb16b249d1a23cebf1fe7de89a4197dc6b04df18098b2f59c0943957e4bdc4f0c191289d9fb373387d660c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bad13058d3d78263276c18b467a209f
SHA1421ac8bdcebf2a95a3a1cd65bc95b4a0e998504d
SHA256e34d64c89bdcf3ecc9c2009be65d91b85be7ce1ccfa1cf49a82650eabb7fc7f5
SHA5126ecaaa6a036862952d6b82c385fff33a617a021582a12689afc89d9413b0b7320929988996e2783e861dbfbb629dbb7c9ae2c2713152abaa9aaca35d4180b7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54fb3944fb33ce3a9d211cb1f6ee24b
SHA1f9582428ea6690ad7e82cb571866281b32ca0d25
SHA256543a4951c009ccbaf9b43a99488fa609b078d1c7ed96ce59b111320ca84c8fbb
SHA512b735f641076c27eda1d088742c0780426777333609f506272f269cd5ba910342ba4dca577f83f0ff4f48f2777626a7f1c29338979a53dccbc9f7843a3ccdba8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df1c0fe83d41663688d90198ef44d0db
SHA1dbcb68e62d90fd75caf334fa7779fbac14425556
SHA256973eed065a62a0c688e24a6c4bf9a67a58133dae5216c19187a02de737a44d52
SHA5121eaa6e12b6652c79abc35c38d02f17c1bcd52b4e92d4d19b982043f559e0e6e7b755bcf9ff63669d18ba8a4db3f1d92e9107c65eacefbb4eef3154e66484cde0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1645a0e6059cf30d139eba1d655d644
SHA1c804adc66ba44fe4b3723705a3cc1958e430b36c
SHA2561d808f676131c68b2cfbd6336f152aa9a6e5d6444e37c75ce61fe86b8f57acd1
SHA5122315af183065e2c8ce2dcb8eaaf7ae72b341cc7f347aff4ff7ac28ca0cac74ebe8cc9951920bb92147649b342af0bac5a33098bbeb78585323fb546a9b685276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64fdac4ff08da79ff49d50fd196549e
SHA1fe9547bd09ec5b033ad992e80dbb8eb904e7e9e3
SHA2565b6a65135d6eafd3229be3869f151aecfafa5b0ad82ecbb0dfc6b7b9a1213749
SHA512393eac7f0027fa0428dab9278ffec85aa49adeda2da9a68bfd0cb4056be6937667ebb4e0f8049c2ff673f07e322b481fee9fe4b22b97c8011334cadc8143027c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea1e17c3e98a994873f8115eb46a9b09
SHA19a701e41327543e4811e23a597b2d50b4183c953
SHA256a8220c346bd35fd16ff87ef1bede0b64a031be6f06542fac4a77bfa45fc131bf
SHA5128935f588f18cf923a418dfce85b3eb24f44a322c71c2098eb04e1b828096b7e8083825c83dd02467ce449c86f8c24ab6db47ae4f0b05f8329c6d34f5f33fc252
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b