Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
51b158daa2d5350a0002849b510a6b1a4e7796a3208aaed277ed0da35a4aa048.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
51b158daa2d5350a0002849b510a6b1a4e7796a3208aaed277ed0da35a4aa048.html
Resource
win10v2004-20240802-en
General
-
Target
51b158daa2d5350a0002849b510a6b1a4e7796a3208aaed277ed0da35a4aa048.html
-
Size
254B
-
MD5
fff16bd809c0357eefafdb6d8f29614a
-
SHA1
a430c731f84d4348ab41da65a48c506e99776780
-
SHA256
51b158daa2d5350a0002849b510a6b1a4e7796a3208aaed277ed0da35a4aa048
-
SHA512
74a7473946edcd4974f200eb37a7806f008139cafa7f85e738c4661172298bc54feee3f3f7a3ec30deef58832760f1fd6642bc65c79fbdc12611f73a6bd97789
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0981D5D1-6857-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e88c49a4b9bfb0f91c7a77046beadf175b3c9aa7182dbdedcf3e65ebfd9966fb000000000e8000000002000020000000305b904e33c5f4c08da75969172c0dbb2550256872e08c6f00f65db94164456620000000ed776e88c4efcf950b2484ca858b64c44b458ee52333ae5bc6d531459ae85872400000005dd7e9cea2823c6cd12070e1975ad55fa33d9e169b86151cfab42a2c2ffaf4a43c5bbee4b2c7a25938cacc4b4bca4998a7d653861b02a8115b45fd5a388b0fb0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a852a451d59d4d486cd3de3bd928996814da889599650c3873650eb01b1f3aaf000000000e800000000200002000000095c48b3926a878b78cacbffa9d65afa5f5af13abfd102968d1f7bf1cffc2a1c8900000005f6f7122d79a07759f582e4772d6822174f0f369cdff2d5b4973b247708ca37600b617add6bc95190408098e1a0a0f6dc7ff7cbd8eda061c7ffb02e50956b60914a9dff87490faffe94469cd7bd2ab0d6bde531cdeb19e61fcfd18d1a9a29409b20513c4b7d9d16c9c53e6a337ee53bb3c859793b7ced58e918ed4705c509ffcc8f82753e6e458ec5b76bf8e9aab58f7400000002d8c0f49eb9cb24555a0b5633faa06d1fa570a921d5a5cc6cd5e360cbfc65032b5efea01e390c2457075f57f755f796acc51c5c9423eb5276601cebb2bbf7af0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905211de63fcda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431352718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3000 2024 iexplore.exe 30 PID 2024 wrote to memory of 3000 2024 iexplore.exe 30 PID 2024 wrote to memory of 3000 2024 iexplore.exe 30 PID 2024 wrote to memory of 3000 2024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\51b158daa2d5350a0002849b510a6b1a4e7796a3208aaed277ed0da35a4aa048.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520edee8ae011cc6153b7bd52dc36c1f2
SHA1484e8dccb3bd0ca663e203a7cf123a0e107dd535
SHA256829fd15090450f8529ea83ca101e2bab71f3ec8d3f3c539f8e12ae1d6bb50f31
SHA512a42f26ecdbb38af3797c1ab053f65bbd91230dcc82bfe15ee7e7880b7b9abe5ef9b802918d43b5ad854c7ca6e951311bc2a0be3850feeeb2f1f0cb5ed757e811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7103d4afbba3226d4572406579873df
SHA194150b02a13b7cda9a72afccc86c6b48a7090fd6
SHA256342b830e855865039571578aa9a0a490c33b2463b282bdd85426db0ac51ffa86
SHA5125f1ae6531d1b18de36f3729bd3c62c977794c3746484961c1d6abb6fd89aa2aab1773c9b3f69563f3a21b1162f9a2ae525c982dc591c08174de3074af3335ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de44c0371a7c4a6f23dcecd68217623
SHA155d132fb76f90d85bdeae750907129ccc8a36df7
SHA256145290bf3129ce9a5cea5baa2ab773f979e4b3fa7013e6203105d55590b1a778
SHA5122592df4fd57265780525a1a813ddf8725fff77d8cbcc950ef2f2482c4694e9053b3c4dd33a6e3f70b71f16f3fcdb22356839638056e50583d9aa082bc4eac230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c6c7d6398471d86882e23b7fda08ee
SHA177cc8f99e1d82ba9086e88eab04c601a5671a4bd
SHA25643a0e68e287da1520db8fb9d21f5d12765a6e540fb6c6fbaad7352169323bd8e
SHA512ca5381c58f6b70cce4e394d66204be7f2a4370489b06f863b31c64351911d054c02f41083c2d623b2a774e55082df2c9e77acc1c77488a08c4d0a1b751775f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d890b6a5b0462fa2c4930f22aa8ae5
SHA19c1c0ebf176ae872a38a063edb7c13f07de66186
SHA256a2018df867a3880a6f5b976cdc29ed346150935405d94a42c5515d040362b6eb
SHA51292bdd880778fd46043692bf5ab7beea435a216a285d8dd55bde08a4c277724003e4fd58881ae6743b3366ebf9235b890fbc8c73ba5fff138c0eca6ea7ddc54d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2345ae614331413e7bae129627106b
SHA1c1e105808bd7a1795a0807a91779aae9e942f3bf
SHA256bd609043c7ce97b38ec48ecd0e540fae00242042fd61014c80a05d1439bb8d6e
SHA5128455b882d52cdbb5b0d9789c38ee2ea7e6610a95c0720b3c276a124332961b9a7579b3a186ce6f71a2042806cfe40e2b8f62ddb2acb14a07b04d3e40301bc5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d014fab03c6d0295cbf4853d836eb5f5
SHA12a7d92bd43a6a74edf6faadc34715297299a81c8
SHA256cf6b9378cc9f81d788e184cae708bcad123b2792e91567e584a279db685eb835
SHA5122d361eed1491e68487c70da5089703ba301567ea23f9a6115f73a08aac4e569d9aa95468bbba8199a43d3580053766461738d23319cd985e9c56ff536141771a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3268b15b1d8c1542bb31721652b6833
SHA12412a5866dca3aac0c37208c9e146f5b79135590
SHA2568bb8f6722e1113666137602d19a409f674d998e030b9abe10d526422a3f21e9b
SHA512cc168131579590f091c072d1ad5f4e35f67398cd051101f33027ed922f4f3c04835cad75710f72e84e5e7ee0236d4a154f82236e7d17d83a1768995c990c8726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f85e335aa85f851282c7923bfad8da
SHA1591272595f55eda7409a8fa398b660c4bb377bed
SHA256918bf69b5be3dee414ab06ad9a655e0d037b98bb1dc8542de20cbd6ce6e9df59
SHA51238a77995b660d383673ee9b14dfacfdb896a1341791f4faa745d4698fa810c9ea3d5abedc3fe78b77622b1d2a5d0a5a8512219fb4dd0bb28dcd82ae4843c35c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952f75dc43518140d51da38c4b4ffbb8
SHA13da86f6ca9e26223302e5faac09dff0cc482dfd5
SHA2560e5ca25a6d314ceee15f70ec83644cb7891609a92bc0aa1b4a4a08c6f30d56f4
SHA51235a21ee5ba0c56fbcf1797950d3c46eb20affd3c9a6b6f2c6a2e3d2c52af1584ce2570ba12ed3ca3b1947743f75f492c287094a521959369346dea0feabb130d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9cafce095078f1304ec5146ccd38c7
SHA10352d68bbcfbae2110c257ee68160d5fe5ba897c
SHA256148de164e49d2f2a7d179b9f5737ba94081cad0e11fd67f4b4673278ce9a648d
SHA512412b076330fad79f67c3d8c423f453597a7ea004cd44a22bb6dd40223742e8107ccd17b4f1ccf90ee6f454e37118879b6369509fc455467ccffadd5d16a2d3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5609000a5b3994a5af9f5a41ca8617a6e
SHA1cc865f1bdc00939e1f814bd6907bcd7965857593
SHA256074a0c58b6f7ad3189236fde0a5aeeb3440dfd1235bfad6e081934cfdb5cdf7f
SHA51277e518bb67331009b0c5968572bc09d8d631a088da299606e2ef1f942ea7e879896b92e0320fd17dca3848e1dec6f697154d4592668a37b492f8ade2b17239de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c74cee1d6a964e4119caa674ccd051
SHA1aa3ddb037fd13ed92b164fc09fee87a00990896f
SHA25675110e60317bdbf7bc806dcd2d9c681afd9e91cd6c60e3ba966ea6b2a342e147
SHA512f4e5d3cefc8d6d6ad9c676245fd3d10f9ca802537a2df86aceb9a43eb92324f2d600f22b1e5e39588231219ae786779bfed5e75c3555e8803571a50e808244d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592f074b20c46fca28760b79e3c96cab5
SHA11748dcfcaddc08a31819cf198647bf1331afbaae
SHA256260c72c6cd24dd6595e08977b18c5184941ad52db2af00111364c1105bca2d51
SHA512dcd129e8a3179ed44a58d53fe931b99ec634662c647b3f99f21623ef60d26b5060939dbd0c29a97ab808c98abc4e413ddac471ffc2afb9cd14132a29526011fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5c7949ef7bc08c3dc923191aba3ac7
SHA16b91381315579a7838b6e15a515298493bab0c23
SHA25697cb19c6e47d18057e1ffe66606753f08fe9a5cb074d32decedad52109852335
SHA5125a5e7b74c0e5c9e29a661fefabf55e8da1150ee70e362e359bfd5d9270871b3d991b3b5cf85586c08fd4635a5ef5481c6e0f3fd9d22e845164062fc074cbc2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e76db41ebd16e05fdd1e67ec4c741d83
SHA1a77b92b32993a94e1680042945c66c75ac9ccf08
SHA2561b0f7db2b2e15e90489ff05249763a67e5be003ca8d58ce5064a9a8f166e3979
SHA512f7f13ca9e17dd0c47137273c6e9ac7da7a82fbf5b700ab2245af6198baf7af721f6c502cc44a599891f925eed5a69cd2eba9ba433a5007a2a1bb85bd0b01b084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f0efa61b09288a3fcf0e82987f5384e
SHA13ef055983aabfa9a5dd32e4f1eccf69a51758b60
SHA256405b263196241e88104acdf01579ab2cf5d98f78a602fd39c27c470137a3c918
SHA51263635b1fce11a5acaa4d806c3bf62dfbdca4392a3a788c0ee1aeeb58a1fb4fa0a36e0592c5e5a8ae0479bb2850d2308b194dc251851c1bce3752117aad67032c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51712b542e7e4c8b36a5ee0c76584b18a
SHA114fa3b7ac4935f21c7442e131b73359d26fa9638
SHA25644250669035b1009a005c6f27b39a23df00642859a5ca980c20b293f94ed9c20
SHA5124838f3423e92a19d0a86647a7a2460e439744ede9bd0d904c34b02b096f04fbbcd47f3a10a23f1880c9e330cebad94060fa0f1471b18c45b57712a829f904c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3eb414cc906859c0a1e8bafcf34b92
SHA1c12cada296d9a52a146b389143ece480761ad258
SHA25616df1322994501a5cc53dbd111d75f2f3bf6d5a8cf4cddff486c662b382620d0
SHA512f4d812b8f4e8c16b21dd483b57acc9b7c473d33f76b470f3e83a6c0889132c1863b99d1cee9d1851f0863a9bcdedab39eb1f8f9f076424df91716a62f0417836
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b