Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
a.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a.html
Resource
win10v2004-20240802-en
General
-
Target
a.html
-
Size
1KB
-
MD5
35ea6253a833a0af7ad80fca921c1290
-
SHA1
6993737882cf52ccabb923cb40559a81c0d37375
-
SHA256
2867c435436c0bd34f279c778178e1c3d5493121eafc7f46c3686dc1f86ce3ec
-
SHA512
e4786fcdda876ddd5d253d2f66e16da980de18e3652e7f2886821a39b66f48e4417214eb43c1f04cb61e329273f996969a5a9c25f13f9cfb883eab503677eec0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e0a03a24af71fe22b2fb01bfbb6ae3658854d0bb2e92a4c5fa5152d28d2fb12f000000000e8000000002000020000000c9e5d6600134ed69a9d5b4c39f6cdbccdda8b95cf91341208c2aa3eae43b34d520000000a9cb64ce17ed3ab8693ba9b813b2fac8f0dd70f6c2fff6d03f6a25fdf0a6a2ca400000003254e683c504424dceb6003eadb7a873a1d29adbd16eae6bd7a9d7a20bfc00f3ffb2143ba5fbae479a60ae539a9f522b033f903cd275914e9263bf3621d8d5fc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ab53a786f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430707973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDC707E1-6279-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56f98f0ffbb5578abcdc95d1bfe10ffe8
SHA140404de71a8bc55e5ad9e33f9d793c4db01499c1
SHA2562e5847e554befe668a1f6295811bdb9906083cbd919deb22aac3d501e8db3eb1
SHA512166ba6f4ee55d2a766cd2231a3b230e3fee0dda58f7feef10add021e45c11ccb6df6f19e5f079aacc870532f7895d32524280574f49dcb4e2a264c3e5f543bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5f80230a051eb0aeb3204492ab847a
SHA19b5c938a446df91e2a0d96ba3c78074d4c478dcf
SHA2562b8a688f90f133014e5725e92d637b6280fd19fbc4d3fd39f560f7303202ea02
SHA5122d1500de203c67ad0909fbf85964814ec38bfb7581368aa2c7e5219d9e9aed4d3c740b574fd2321c9ed9229079b0283cd8a41a00645413e3c9aab6371e3483a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c16f2bc00bf6acf6c09a66d64fd70e
SHA164bb09cc7bfc19a90da91caa6ac7c1cc91264330
SHA25659b3b8b7a61a0dc7ace7f7e037bd2922247d16607c4f0a9b2e040f44eedec599
SHA5128e257ebe4766692a2f83909d0f0d3b11290a1cbb5c195e13a8cebd882c7f3fa18d991ef2034bb698c577fadfd96814314b086853e2b56fbbf7048e8ebbc86609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5965401ffa563a121cd2cc505b781968e
SHA1eb1d63ad1c6a87c42dad021b3bc9ffd931fd8bd4
SHA2565202cea00eb31bc9136956f9d79272de96875a083c95243441b455eafda214f0
SHA51255d1f160aa99e2a52a8ef17c15d91b1dee066e7250584d8c7c6f2a9f99204982bb0bcf2d56c7ac7116bf2a0f1d32b593b0e8a6338486206ec113a288acff033c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca0744b96b28b0cc92b6539ed5fba2b
SHA1c1e0a6a4e1ecd2d9bb8e546b24a50a55272965f1
SHA256bb09a5d65a1a67b6ea372105c85096a28eea7d4abd7b510388d1549fd1c30ae4
SHA512984ba2a9a36663e9deeff9381eb7b137669503dfa9a6e3c553be1a225d91fd131761f677f73472bd12ba54b4c1e078985577bc045cd3c29f2fea7c1eaa8f1e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378054ba65fa63956eb3aac176517b81
SHA1684e2a461ba4ff3aa0b964b1c773b1c8f349493e
SHA256e2c6f26aa24904e91b91069e00dbf0dd9548b95302ce939d42260e441fcf5109
SHA5126297240cda48341cb8713cf16507bef2cdd0f05a9d1a641493968bbf73ed300837286ca29c251d554e95cdd0263ff9c7703c92c10c50bb5378aba36e5ec6c53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f221bb78a1757332c57aa88cb2b3430
SHA14fbdfebafa04ecf88a3ca16e8c4d55b8207e54d1
SHA256627b0030dc2c2cf905b6dc2127b3fdc7e60dc14d071c03607d3d0b0f4af7d040
SHA5127074a49c6c1e4add86fcddf73d3b7bd5dd33f20751fc02b00f8c80391f778698be66afcc0ef256426723361892d5aaa4060898f5944965bc747ca24f488fe7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537d2a5337bba3893015306f591f6ba5e
SHA17061245d1764ada0ebadc7978c270e16d5b21627
SHA256a31f798944ea7eef6a3b797eb09f4a4a5d134b4f5f65ac4fb89f88b6926b7f40
SHA5123609eb54b5d1611a9a9d50dcfcb1e08f59828da204c101d7703fede84963a8907931e9c5abe95fb3661625bc1a0806a645510d06a488a0d3569b38735ae666a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8abb5ad165b23db1df11583345db0ce
SHA1e8ffda1cb3c727ad8218d7701feec0330c879799
SHA256e94ac7e5138aa859aea6f69f4a3dc36db6ad9f525ecdbcc130e627726d3cc25c
SHA512b10d54e747692135f448d5039ef40986894e13b625d4e73a495836a598b63fe2b9756b8fa0ed40cf46afe0d885e64defb889354c6ba828204cec6cdbbf88c8a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ab2ea25ae064854c0bd7fa4619a07b
SHA1962bba27c71cc275f73aab09ef076d8b491b6cb4
SHA2567787cbb83bb95d306c1701ae7344612949b9877b9ac1fc630a7e2f7da564e088
SHA5129f8c9f0f9e4fe7a638d1c0770af39dcb80586d731f0ccb18256f53d1f33bc8bcecbf4a798299ac1ffce369c229e436f79ffa8096a7db2039887609c501bccdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a232c19591a5d7f0e6e066bae18d73b
SHA120cae690067986c1e6da85b378e5f31cd9dfaa97
SHA256f8df837a87cfee8448e66ce7f7aadb29bc88f13b32048be4078c648046aa6ab7
SHA512d0bbab93d8388db5b651a1387cab2e8ef7ef77af0e2640afe0e4380fa8adafe1bd1066d377f499cabd4d2178779c57ab65478d661c33dedaa6e03c85f75d041d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f444507526b64967d80f9b942d3133
SHA193e2441b42d57115905f5634306cf1c9bd6acd1a
SHA2563ad65e723c08b09c7b19255de879f39f8622ab75f0a909841c64dbcf6e3edadb
SHA512553643132c2e17446bff9c57df10350a4b6a27e2446604e187573ca26e67f2e7061617d23229ed8e9fa3adaa332a3b202814d8e2341756bf5509728c42c4f825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05b8b5527b562491525c9b89d6f1efd
SHA1684d89b5a3b65a8251d77119d07b3255d180502f
SHA256b10d07252fcec966ed35b6cca5774316730d924b84ffd1ba65462f458cb3ead9
SHA512a280ee2299393c7465e618d4c109e6432c8cee5460b04672b0d4119d087c1413408c52005fdd250bd45c30020eeb1ac7154a4fd2c0545dba7211c1aa2b2f39bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e722a53e52743a9c1a038e1fea134192
SHA1d0b0e392262ea1675cc257a708b19f2e16460213
SHA256bd5836d0909cedfd35bf107774063cd45b3b0623c8016fd3f158b40dcc1571a2
SHA5125fa207c9718313837ce6ebce66b1f126a221b5d6ee7cff95f74ce57fdc4bb895bb9598bb099456ee8fde7b0764453488950a10a24b08030cfdb70382b3cf0fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f536f882e9f6729fb2dc0819ee2b6a55
SHA13b0deb67bd7c16166f5460f528ff4afd7b57ec8d
SHA256abd3948e9c888151f25db7f8fad73c6b855d3d6c230b1dafa7ef135a4671ffd5
SHA51288dbc988401bd3d427ffc357d6c6e1ed80d6408c274bc2c5cec99d2754f7c56962963d9a8b457cca081b0aba8ffe9a47bbb62d8c9237f856ec1ec0c488bf0037
-
Filesize
1KB
MD53bb751081381a46ba97c9d918e8f243e
SHA1fc1623dc2bfb3fdcd6264224d24dd02cc3f0dbfd
SHA256cd91035f0074bc1675f180cd156012b98e7209de02a957a30742aec649370d2b
SHA51259426d78f90b0d58c4f39d5279d8de3f340bffbf244ed1a57b32b9dada4d107e52a78fafb3451fcfef92b73e2e76a40456f3f394af0e9dc190845c58fd862560
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\icon[1].png
Filesize1KB
MD53195ac879b2b9fa53087d2da917668ab
SHA1a20fd739972c27b4dc744f9bd35c5197444dd9ec
SHA256ecc1da457aa778e084d3c6dae9d2109a48d0df5c4177afbb3596ff8140f587e4
SHA5128042ebe82aa7341c9903a73cc49a1785611739b00a78c7cb60384f7fd4be8420d1944c1432d4092d35b5f78a579788ca4ca002850dfffdd4ac6c4f19cf1b4ed5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b