Overview
overview
10Static
static
3086583686b...77.exe
windows7-x64
10086583686b...77.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3RollOver.js
windows7-x64
3RollOver.js
windows10-2004-x64
3caption.js
windows7-x64
3caption.js
windows10-2004-x64
3gestaltung...e.html
windows7-x64
3gestaltung...e.html
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
086583686b2d70ff5a67cdd5c60de6770ca6cc1890f0ebe3df63173e32530477.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
086583686b2d70ff5a67cdd5c60de6770ca6cc1890f0ebe3df63173e32530477.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RollOver.js
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
RollOver.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
caption.js
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
caption.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
gestaltungsbeispiele.html
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
gestaltungsbeispiele.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
gestaltungsbeispiele.html
-
Size
2KB
-
MD5
f1c2b7b7b90de9d73672db4fffecd1f1
-
SHA1
04ef4207e0dff63d1ac2b02f701a53f6b098b5ac
-
SHA256
166e7db0bbf982ab239fc1ec9a147515d71d1d446d684223767c5b494c8b05d7
-
SHA512
81bcf68d8234b1f73aeed52548340f53c1d3db14554084ba7ac96f9e481ff5f7871be2fcc3e761672fd53f1f3898c637f63cbebb2034d81dccc4f86c55977db3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430859172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E63CBD01-63D9-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000081ff226a2d5292cfb8394fa73701d6967138201d1ee1006f6159b71918ce3aed000000000e80000000020000200000007b3c5da5613a646cffee3c80069d0be2f3d5a835a06389f9dc54151aa28e6e102000000042fe85c1ab01c8be28b7c07e3d4a0841444ea2c19cde478aaf24973f479c6c4b4000000096b81565225e6f4ed226cd6de39e6d896930ac964f37a8eeae198143061ad419399a833226e29ac7e4dea64ae5c917dc422d4cd1fc01f0d5b4bca3e74914eaa9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a8c4bae6f7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2512 iexplore.exe 2512 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2512 wrote to memory of 2328 2512 iexplore.exe IEXPLORE.EXE PID 2512 wrote to memory of 2328 2512 iexplore.exe IEXPLORE.EXE PID 2512 wrote to memory of 2328 2512 iexplore.exe IEXPLORE.EXE PID 2512 wrote to memory of 2328 2512 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\gestaltungsbeispiele.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bcf7f084a6b80647a7ba3685046ff4c8
SHA14dfa74b55ab78a460cbb7a9270e8a543e46ae9f5
SHA25639c2481ad769bb68bc9bdff37f0879205d6a7bf5098c17a6993f5a7b0ed2a1bd
SHA5122aceb8f5e19925b1df9d06ab9cf3d887a4760bfa3d88c738062e17b91be05bf531d21cdbc66188fed0315bdf8f641b07ce58123a76165dbbcb8132645d6cc5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52aee10e3250c76c6d58623b73f884b65
SHA1ec407f0d7a1b648c4a2375eabd9be2b0e88e1fa5
SHA25688ff4d8842c22be863c8ca5830fa781ea4b562864e0e033723b788bb06943e58
SHA512f553a371ed3b43d999d62e573b08e589fa868f6c178b30c0b13eda68e7974c52f5563d4e1f36a065516224115670fa555235b3b3f12c9e3ad663c5c41ad2e83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51f275f69df81da1e20ed027a55c06cf3
SHA15a775ff9360028d00b8b9505a175798be3099987
SHA2564ca4bccb454a4d5d277ccf92d0e309559f400ae2236717e91d4759e34e8b156d
SHA512a9b4553386ac1421fef86729a4e8dce4ce1c1cba1c8c68dd28fab844068932bc91a14af657f73e409abe4dfbfe33705aab9dbe69becae1060dd3b5d37f7d342d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57f296f72d62b8b65e642f1416aa63ff6
SHA1c212beab4b083950c5902357504dfa5eb8f9a5ae
SHA256ced6c97124ff4cb15eb7b4c18ac468109a4c9763423060ad2d9470b7c0e7e6b0
SHA5121d00df98467e8dbc58babee49db33c940f98b55fe23360863e6e799a1930c8237fa70d3941c2dd57d8bfbd3a8a8660369a7c2b4eb1b332a17dd09352137b3b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51b5b7686e57dabf4b2a3c9c79fbac5d1
SHA15420d656ca5a170d1dcc7c3671e7a6e3abb37f19
SHA25685f6a6f4752efca40a9cd5bdea0eedd69026e683249a690af9b5bbeb42f04cf8
SHA512e217b53a92380930af5f797c6abe72310e351eaf6c51ec7ebb54861ab6bcb69e31ce863534a21b252600e6fdc2d661ab52c577a6c4527c2bbb292439efffa44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e00ecafffa4a266000a4f12cf02964ea
SHA1ae56aeeef65565f58f26771077d21c8cfe95a7d9
SHA2562e1d960e9f4f1595f3dfc2705728a51fcf0d3d6091cf130ff63c016313fec488
SHA5124893c372aef19215542dd4f055df5d4399402af7b56abd15927a76172c287f241039341b271a5e9524671560b2285ba06872612e9b3a88fd1733efbc696e6730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56d3e81df2f3ab81769144cf736e60a56
SHA1caba87ac746298806fa9ea9def51f6911ede44f8
SHA2568c1b1dbe37ddba3abcbd70cef2e86b07ab579dd80c3cc39770e44a03d6375f9b
SHA5124353a1402e76a1b4be48c737ebec7516846312d5240e70210e0732df6e5973c87a82bf49c86f7ba61c028b68965f3c78a54c7f932cc96d73c7f6a578eb186ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD516e5649c34322a8a000e7c811ae7797e
SHA19277353b210ffafd8959cb977a434bce5d126170
SHA2569b83ee3238507c4b0260d2ab21d6ceff4c9975051b16ba9eaefceb474e2028b3
SHA5122b6d8e071749d86761b5df18f5962aa6dcee808a1052fd3003539d7a2cbfbe71ebdf15d7184fcf0ccabcd063285d5e9ab88f2f4a55d76fae09f647528fdc07e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e1d7914578f4dcdacae99d28e83add24
SHA1d2af54d6d6fa9ea4124e55ca8ebd4b841245b99d
SHA2565eb18d1a067bb1378d77f4ff134e1695275e6aba05dcfc083cd1c597e910a739
SHA5123cb699a015d63d46ad65eb80619475ae1685a25e9f093fac3b8a693a9a4a0a420e90856dc624ffcfecfe4a2dfdfc5dd68f89a11e6fe72c37c968656528fd72cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52eb91c8b35b82a98adfec44336dc20b4
SHA11aca789c72cd06e7884795c78c9d09fd07170d27
SHA2567fd8da17c97cc60f8267ea211891caddb8c4c5d4f26011ef31f8122b930544ac
SHA512b9586999f174ce024abf205494393a1f4252d17545f54c69bb8824293d994c79faae8fc7966944832daa72d82eec74ca1da81ede62d283e54e7c61bad3e71ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54f30631dbe4cd48ec8f602442c0f4941
SHA147ae7dde2a7703bb02b2ac781af213f65aeef577
SHA256caeb1813cdf0bf7bed2dab599901ea05a8984a26a3e128288ea098e1d51cecb9
SHA51200f78316728b8e04b6ae856387e34f260968d03140e8cf5d487505ee289a4630c856811f8d84fdb8078e3afc44e888bd78442c690656afd8870b8435d0e2a08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e4d17a9b2ff450c27e8a9b8e6a141b54
SHA1e3037ebe72b95e7e7ef96a1bde1207dac17ff678
SHA256a058e9107db0832c0266e84056a42dad407f8feb38ee4d02a797a04e086623cf
SHA512e4a3247fb64164f684ef5806f06f241ae8bd4258a4396b340c594973062a16635ed8d684a3fe293210fa33d22f9d90d7e7e7ebaf8c66349c53bc119a98a5d57f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a93ccbf1292a3365c5c5128edf1d6d62
SHA1aefa9272420da3e8592e7e79a0703fc170653423
SHA256e0ed9c1f31958d8418ae7ac13df85f34fb69ea6bbe3138c82904a02ce509f2e6
SHA51279ce7be1be4c77b61f8d71c03761f1b73fe13e4da646e7c323409671f72d25729b15826703b21d7391020ebc6d21094c116eb94fa1f4a24dd3320342e205c4f0
-
C:\Users\Admin\AppData\Local\Temp\CabDFD5.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarED61.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b