Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
FTPBA/aaboa/accountverification.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
FTPBA/aaboa/accountverification.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
FTPBA/aaboa/index.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
FTPBA/aaboa/index.html
Resource
win10v2004-20240802-en
General
-
Target
FTPBA/aaboa/accountverification.html
-
Size
21KB
-
MD5
a9897e4a810b1dbeb9e546ebdf378243
-
SHA1
6f0fac76ffcea50c7f74eddfed8d2705f1af8834
-
SHA256
3be8a56c8391702c5ab5a4bac5e16787f6375e9385491b18d229e8659df98696
-
SHA512
b6b7519bd918009b2c6af0aae00b00b8db1940d009edd5dd2f6a33a650371e25711c83024fc8d1f42f48593c997064a0d4fc7a6788136ab6b96b9814b19188af
-
SSDEEP
192:PasG3LAS/y2wHzv6GEbreKKOQ5dlZ7bUEbolLqF1mty7g22di4Fw2SQNw2SQew2t:CHAaylTvWrDwkWT14TGzLEbe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000a7d7150c6486137a90deba2d3a93d89713a6ed6f8c1d20c19b69f9501224325c000000000e8000000002000020000000f2864b4f161275aa1e72081f23fd8351cce0657f497ec6873134019e466a758520000000a98e1b8db817256765cab45fd0b39bdd37afc8a6f90f3d6f77a61c2e2a0d618740000000166edebe7458ec47312f4bac828ffb8a0c3cff864a6d6e3bd190b5ed0b32222827fb0173080316578f1bb69da2b3239deec4300e880dc1738bce023b73df79c5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2590B851-65A4-11EF-BD32-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f073c4fab0f9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431055983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2092 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2092 2336 iexplore.exe 30 PID 2336 wrote to memory of 2092 2336 iexplore.exe 30 PID 2336 wrote to memory of 2092 2336 iexplore.exe 30 PID 2336 wrote to memory of 2092 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\FTPBA\aaboa\accountverification.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0345244c2ade3db6f1e2c17165c798
SHA18bd9848bc435011d6a4bcf4ac411374d1b9b4052
SHA256d134008453032d3b3dc423364cc6b3f92c65c409236e4358adc91e9846e5d19c
SHA51209d2c373d60e45d230b4b03a5ef2e9811696af469beb4f6e610cc9833b5d90fd512e2bac561b5bcbaaf9b758343067f41471c2324022123f9ac7447b31572bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f8ed38d22df479e42fddcb9ac2f1d5
SHA1275b4ab83704db6179751b2acbe1fde3d510d425
SHA256e6f7b8d2bf227bd5e58099e7a6bdcc169b8df4cce6a1761fe5b541974fa6a2cf
SHA512ed9df9daff6ea31211b5976e8dd07af9b25b79a757d845dc76d3ef866ef3248ea132f10475e0bd875799aa36a7d809ebb1cff6f2d87babe07776e64fbdef7699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d9237de4f8d29c005eccdf2d834604
SHA1cb430ad1f6d0196684833bf791683dd74f500587
SHA2566ffd7475fd6226dd3aa2e3964f6f43c610d886971fead280ca13f1e55fabe62c
SHA5121c1a5bef6c8bd1e183affe3295006ad737caa5cc0bde838f11fa3c165a5f8102d690987344764921dc24d746d931e30de3050498b2a0237584fce240e413a7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acced023c26aa0af184a3ffcfc2b379
SHA10eb949be25d75c0aca6570b70f1913ecea3848f4
SHA2564b613e8ac686a38401fadf4d103ecd59efb6e19eeb7d653eb7925fca8491d7a5
SHA5120868de7001695a86a9b79a9e9611391f21585125887336b3ea1141e6ad97de3ec64798ba61ebc1a695e8d889c1ea04741baf39f9047d2cbd69f01acac5bfd2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d11e371360417440cb0b5562ac6533
SHA1f2119cb7dd2fb06694e8f00691c17b3b9adc575c
SHA2567e92371243502d174c1adb90ad4adf0a71307d5a92dfc904fad7c55d2d50a952
SHA512556d9db311ddce21d3ae63d9a10816503574bd437120b37d060b2ea9f9c97c7bd5242cb157596b882e17be26c8c34370f80645a669ef0523dbae002d769e34b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab36acc323e42728ce732b61bb48917
SHA116642b67538b14f474ae5e926c098984b66d21e2
SHA256127b8293b33707fcbd3f09f98a44f29fceef93545074e80b02f7166edc0c1dd4
SHA5122aaed4278d962f6b5df9a742654ae15e417a50b4d028cebc8c6433b65e3a5e8c5b8bbc4596d404ba4c9865047596abfea44c57e662045a3572d64a255080746b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f80e6cb0500a0113d210ca6aff760e6
SHA1e04e41dd5621c5025f93e7ce3c4be589720b1506
SHA256f4b793881dc9a33ab12987b522ea1f6bc2059cf8bbda9f8ee3d5980812e9554d
SHA512031a1224e4cf7428e3e51b9ad72c3f1e05f784510552b0cb695f383937a628362d679cd3e6a0fe378ac007513533ce8e98bdecacac10d97403be1a1201ea03c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162350c0efbde75e7bca8e427d08f3fb
SHA14155e32b11e6794f74ebd79ebf5b80132a6edba7
SHA256465a6f598edf9a5d340d3aa59625108576e78a0e3c9569b54f103860e6db52f0
SHA5122ad3eaa72b5f2cdf656c98ff0f3c214ce57f46743de311316c59c5103b53c57722936ae08fe347655608a468d1d9073bbe4133bd116e4f33ba248f31f1c9e19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d414f78e4d9f5bb752f4f7c7b5ea6e41
SHA1d055dfb97c93a057be6d96c8a6465e9ce6989da5
SHA25645edacc9ec284a0bb6eed7707a42bf411b16286f5dff4f9b0d5386b02b7dacee
SHA512c2889a70a8d4d142c3cb2894d6e01f36f51de844d2cbbd3a317238da5956ea95b6951490c3d4bdd85a6d5bf5061aab7f58a333b7598e3a1269f9e356bff7acd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bf72292d26cc9984e7e1c8ec92c336
SHA1e56a327f756f434e34b1bb8ce645ba6f3af6875b
SHA2568909d3ca2ef239caccd5a7bc6cf48750e5f9edcc0c9d8016d9fa839f867598c1
SHA512b5d507edd67fa27d0576664b99c82737857c52bf367cf66a3d2bef56af49bf679f14175014906867745d7db301b6ba4de9259ea371d537a1ef80df175dbd914a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac66c8a19379c3013092c24af9345588
SHA16a860b90416b547afc7b766b2eba621428ecf7a1
SHA2568ccf4e9113702d8216674f9163b7d549dd405b5eb18b78dbd9039c3f0145ddce
SHA5120aed1079ebb3bd995766e3dfe387f945ab124036207a909a6a62edb8e429f9066ba2b2b015c606ad443b92e578be15e2d22c75cfa098c7cc66a4fecddf2fb378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1c0cc58ea955e069f9862674b7dc9c
SHA12a64fd6d792576e09eda447b4c7e86b1265548be
SHA256d22760ecaac7f7ab730ec408417c82b05f7ac5287c90ac80a5b05e46910f50e9
SHA5120f9bef6bd985951c5ec94bddaebdf6595cfe8cd0d0e8f4ea216173b4e45b0f4314078716719bf52704ea0276e584fc5ad94b9f6e9e0e229a155aea0bd5f473f3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b