Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/08/2024, 08:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 drive.google.com 5 drive.google.com 6 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E83CD171-644D-11EF-BBC5-7ED57E6FAC85} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101c68be5af8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430908993" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000008b152123c943874331bb831ba33627c2db4834f6e3e910c581d05c30dc636029000000000e8000000002000020000000a31e67bc55ec011370d0b0ac9e8b5b6d6cb04c70ca5e775e539a22d2bc64dd882000000037edc659bbd7dd1e6045f6895387707b307d0dda7849bd5f7dda7a3d00c17ecf400000008e0ab4067c3f7b58b5f5a1b3edbc59a49f0bbc4b4869ebb62402a57c3dd27ee72d5c8f025e30acc5c53078c493121b354cee4c27b03afbb1a71c36d5e6e051cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2780 2840 iexplore.exe 30 PID 2840 wrote to memory of 2780 2840 iexplore.exe 30 PID 2840 wrote to memory of 2780 2840 iexplore.exe 30 PID 2840 wrote to memory of 2780 2840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53bc45a07f30fbbccc01f9e372b4a740b
SHA11d4200bfe9c495f706a765f72d53c41d2171225a
SHA25656b892894b79f00207d137150deca1b56d96559949f6f4d7a4e614d441bc9e1b
SHA512ef78f3e11dafc4aad8947abf760976e1cd2035d0f0f210858e84e4f1cf181be6c06e8fdf7d9a055d13cd1d786f7257c62e797cefa40d8a2fe3fef782de715a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da79e3a46fbb88d4e1bd71a519ab6394
SHA1f716e256151b948b3f7cad69a5b901d6c73b62d7
SHA25697446551efaf953593c933d501d51dd153c0ae87ff13bb05ccce690442e55a45
SHA512b959b8350f5360867a99ab4b3de944a40a9487fae360d4755c628983fdd5004a0daa4adc7a1328197540536eae45094b040e5fa146cd3cc038ab18185ca64f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc95aec87305dbfb1962ccf9893836c
SHA13f61ba0f949afcd1a3ea73f72c1c056addec8745
SHA256c5effeccbae8bebf509b068e9f4759b65c8b869a169e3adb841a3fe1a13d65ee
SHA512a9b4c7c461e84d8c0abecc24ed75a5f2e2e7e90ee564347cf0be947a8710a6b76a575600a8e306537d94239fc9666b9dc04144e9dccba879bb9b6a19fe888bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca0612864d0b1d3ec4c3dbe67edf125
SHA18f090a865e6b085b89bbd3049f95717263f0a301
SHA256c71288243dbacd6b859ef3ea5dce86e360fbab9f1e0a39b2abaec458029a8a60
SHA512baeb55adcbaf13e24ee893c35b1f3a9259c8e83893573cd3c69b816f6e0a43f9148c57752314374ba4b71d52c864925826345a0bfc1f4ffa10808f8036956d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c0774f88ebe5ce04ea3194ef4bebfc
SHA11feea8db4a4e8e9cfc531174c07c0a64cd5918c0
SHA256370e365d899b96bdab2348b78f6e4bf1f8c95add57b739595d152e5c2003d562
SHA5120313a4e6dc9c012738904495a0bb40408926c21d3d362c744faeaf3ec06c9d970b79c7f1e988f60a5077a93c2967c4f885d26fe368ebbbd03accf0b06f88aeda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589844795b26e3df398c57de86cde7ade
SHA16a32e9b517580aa6a332c863d9f0790046df9f46
SHA2565ba365424e29485ac8905b92136c540a2f8ca8ef11d11de58703e12c53d86290
SHA5122f9d7bf65f8ef84453b2cfeee915d5563e43229463656486ec1686463ee010bda45b62a2fd6f7c4972f2777be698f7c046e704768ef6c471a2d4c67a60fce902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d0b59149ead90aa9b7d8d28b553be8
SHA18372e6363dbfe6bc3fb3db7b56b6db86e1527e22
SHA256f1c95336fbba50cf452ae0be87758ac66ec3292022a42105c4abc9c74a2968a4
SHA51231a899aafcfa945d3ef172ffcd98662ccde26009f29c02c6d84ccd85958192be714d73cc3f34b7f87b9c27bb33986aea55c2307b755def72166acfb7c2ab0cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558dff67d9d95406c2964b834165cfb26
SHA1a12c004b83020df226921c549422270037a81076
SHA256a7beaa9b3cbf93b4a4cade1037ba781c857edad3e426aeab43c870d87629c161
SHA5125dd2b005089fb1c66b9ea6d75b046d586ca06d147733214d973fddf6da0eef7a9685fd6b278c5daf043dad30094c04ed065aa9d0123a00288b597ca90de403e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b70db89b69396b780d428c60d334066
SHA148c8222ef7856cb5d8afc3846782d12136c42ba7
SHA256aa0eb964465a45a5ef4b6941650b82cefd01bbe2ccb3f555d4c2fd71cf00b52f
SHA512b37eef22020ffd831c19bea1474996a7c25b0e439eeb52d12f8af4144970ecc9e431ae44f6a573cadbf28fb13dd4c29381775fde5ccc014030e0267c5d85cc2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0034134b362f86946dc535c4082d80
SHA1420c9bacac9be3f3d481ace46b40b95151574008
SHA2566053153685b943ee6684648f9952b58a47f53e4f6183359d1f14a59139b7cbb8
SHA5126e411c9dbba6f1ab29dea0dd13738df545f37e403dbb316429f80052ec837e0fb470b56b39266703cf906b1c64c89f1688524383f69690d0f1086f2a9e9692ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd813163dbe20b9d9edf4f565585b65
SHA1b89989efe19f8de18465edcba3ee737011e68816
SHA256b2e776c73724a2c1f45d82a1d063103e0f1fd49e317b67d6788c2b46b10ef3a3
SHA51249ef014ef12cc2a904347edb9d1e40cf747d096b4ea2c3e7249b84a26d485b9783349e2b310ca725444a1b060f76b0527fd314779cbbe9b1db4a64ef9d040d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557050bd8540de3c60d91565a48ee7b2f
SHA12c386b5cafc9ff006a4e5b902c56d6573e1957ca
SHA2563af2f253bbedd951a8e899474fa9753ff84e84bbc7c6fa680222eea53e0c7952
SHA512f6136babb1ef4f332315f8206c4e4d17ced938fae30a641d79bf4bfe8df15bccb602220ca5bbf5cc10038345b9570da32e2d5dfb0b3e7b8212ee019622f8f1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51962ce26a28969455c67439b3306334e
SHA1b4afa596d0d81f0c9f32a12b925280a787eb3ac5
SHA2565b77c19f1f3bf7fbcd22c68f8e091767fbbb6e0d216acc718ec9acdd5585d17f
SHA51263e76e179314dc72d395bebd65b4c7fd3fdc909a9064a6a83b2b2698e5af568d5ffa2d1993640abc25027cd6b415e3d8efd1dc579b89744e0f44e607675b2907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a0c2adca3632add8daa4f01466b55900
SHA1b9ac346f0010f00605369db1ee571572cd4a14d7
SHA2560ad6174968d5411d46e3db365d4b56f64db6c60d9e1562b58db7fc96cc8bac12
SHA512b5b72bd8639260c7ff596cf98984444e914c4c14014e9e4baede3c1945ff8d2e1a44aaf4ea97a120ceffa1a9722c5599c51856e325cbef2b22117b78152bd4f3
-
Filesize
5KB
MD567d2953ef92311ab2fe0fa2f1ff98069
SHA14d17c04f5efa07d30d7fd8dbb847fd8701353293
SHA256cefa09bb217f545acc419df6e800e4e37a7b94c91bd2a3aa11fda6ea529b9340
SHA5126647f7dddbd91d32f6d8245363fc88626a05ad0dcf99790169ae5f42c0d6d9210812e95b7db59fa6e757860d466ef34ff3b1a1426a2d413c2707d9e88af8026a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JQ7VMQEC\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\analytics[1].js
Filesize51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b