Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
02095f04e02f83f71ce95d42657227ff348c5088a713fda26248f98539ed9538.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02095f04e02f83f71ce95d42657227ff348c5088a713fda26248f98539ed9538.html
Resource
win10v2004-20240802-en
General
-
Target
02095f04e02f83f71ce95d42657227ff348c5088a713fda26248f98539ed9538.html
-
Size
973B
-
MD5
1449a5e956e51e47e41c562b9ec25a90
-
SHA1
61c9809a85ffed516ce30904d1a79158d288ef5d
-
SHA256
02095f04e02f83f71ce95d42657227ff348c5088a713fda26248f98539ed9538
-
SHA512
165d39fc51f7494817cd023f70e076eef84083671b407b0d8fae78173560185d36027e08e76c9d5d4d23c40a5b98ee9fe5e963b510113f425143b520c63be263
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0120c8392fdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431482702" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE9C1471-6985-11EF-A87C-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000dd4baa71fd3919ad17b205076b04fdb94440e27c1fab224befba924e53ae1030000000000e80000000020000200000001de8bae82635d2832a62dff78917f8aef83285f5b9ce812cfc9bc66c2f8792e520000000ff971e84233c6329d983a8d0bf39c4f5b02561b0a01d6e46f5f1921ddc73ec1b400000005815ef25d4a2eb9301eb6586dcc57ad99fca23d4206e28742e78b58a5edbbd77bbc0ba6baf738390ddcfec60f680f97b00e15d67ac607ed35c0e4fe4c3169ab5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2716 2136 iexplore.exe 31 PID 2136 wrote to memory of 2716 2136 iexplore.exe 31 PID 2136 wrote to memory of 2716 2136 iexplore.exe 31 PID 2136 wrote to memory of 2716 2136 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02095f04e02f83f71ce95d42657227ff348c5088a713fda26248f98539ed9538.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc2a70e8a163cce18240fb26f9b46469
SHA146bd7fd477b41242b5e5cbf9b30721786e45a8d4
SHA256cc2b3ef5559506347b364857f4a88805c676293f234bd5329c592ce1aeab01ce
SHA512f0589f7d215db4e59c8e4e6463d2feea2cd1388fcb482adc443bad5fd7b0809fcc5b94ca26ad67770ca32d46c6a699d5920f6ee45f837e9bc58d013c3d6cdb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f1b513b2b33b4f172dfd4fd71d703662
SHA14cf3b90437cc792e2688562de97d98eeb8267d2f
SHA2569db625fded145ca0a689882611d67201ac93a8ddfe48068654e5f46417ab10b5
SHA5124259aef0d1c3b1c5e63ef1cc7bcb6c41a7f419b3b70c52a9852e00376a26808ed651f121be7f3e94fcef3f58e79e368c6d3f6cf30d2a3ffc38b209771f467560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53526017814c5203ee6815ccf2e207e8d
SHA1fe6dbff72be515d07e8b35795014931b92cf5eff
SHA25689fe130b18d28ac443b5feaacbcdc0b9967000eed3244b76ca4e17b0304f8d8d
SHA5127fb259c7b49dbc1ee6b65cb665afcd39cdded567acfc09350a0e3c40e12a78a8ee86bc8d372bc14b61ff6dcbc739404f6354347561e5af5d2593521663bead1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac67bd5baa64927d58f80c667fd1b11f
SHA10b2f9d7cd5054e59d9bf12f86fc6de04db3af29f
SHA256d4f9ecc546821827ae337f47626542e720bd7ca3970ec577593591c5afa947c2
SHA512ad885154918e8ad0a05e62bd29373d4058ad73a4217fd773bb8f4004c465c5d6c6a597058f86de044a1c1aa1d007c4bfc17b0d97244e011c30f77152887f8019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ffe405243a7d11980338edaf7916eb0
SHA157fffeb5f1c365ed7663c92a8e32786be0c0714a
SHA2567d2af004ae7185d47793e4577374d74806e17e951e67033e039fe1de9e32359d
SHA5126ec107fdcd698e46443c9b65e01938e8ffec7db9236d7a4ccaedc7c1621f07dca8f4e11ce9454cb30d575ca5a85c4f7a94ce49ad8f415aa18bd00a737cd10661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cefee5d06177520616f35105d97d7901
SHA13873bd8d8368602ae2da1741ec54d93afc9c6f27
SHA256b20e8a5ba78b68f02a1d6545fec3f4cf6eb9dae562fa2a86ebf52dc2901a0f29
SHA512e2b7140e5769250e25d0eb43340e514cca2e062beda2c8ea091b66dfefd875e54839b1c7e31592d2d4af3b087f555ec9cad61a7726d8c262ae55d66390054a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f47b89d84cfadae5f0200e2b43395217
SHA1b3c63b9fedddf154ca70bb32e3823918d2341705
SHA256c9d8ac4cbfac451579b420af07bfd4f1e8981c6f6ab1b463464c98ccdac2d4a2
SHA512a05f0e28c82c75496c49b27c2a9430daa57749c63d2b718bcdc5201e78c4a0d1a3ab73a2875ad3c2837d89768f518efa1c097ef4126a7c2b449e3525f0cee292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1bc05338c3572b69da2f7910375007d
SHA172a89ad8864fea688932a2e0aa858d60c908ff4b
SHA256258caa67ef699ff83cb3b07f652477b51f881869f87fedae8c4a25314df092c5
SHA512ce0aada6c3b21703253ebeab829391e9e2e4bc677a8b23c43bd0e28311df5b343540a8255b9f1344607d32b62adb00fe0b0caabbb77a84deacf3a1413a458bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573939f877da229321ca85a6e6c6ec74b
SHA1a8a41a2fea418603c6846aeff29a9468b1dec9a5
SHA2566315419781bfb54f115ce5713f4aab44a6344f379a0c6c6752fb51fb7faa857c
SHA512f51e7ecdf9ce983bfe6cb76efa88bfac57995464ecd22a03d8ecdd45487e5440126cdd1b1b147303db1de17544362a09431a350f975873a0d9573dea791755ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fc3ecd2b686943c33addd37c4bc27a7
SHA17a7642e3f0794d516258913c47edb1bff9ff1582
SHA256fdca7321a2961c53eac927c05cfdd4976fb4fe884a1a5372efa3fb662055b4e8
SHA512dde016c53421aacaff99e0fa7160a41099c75a879492483fcfe17bd83eb321f875a58c4ab94592daed66191b819b085d6db069fa6351a7774389cf8271f452d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f0936b7d194a2901b9fcb530cc609d64
SHA12b6baa0510d377ba39e19ab2e60e0d5ad212f7ae
SHA256ab309dd2e6f50788f8db3b9267abfdb775170b3a52b48d9da9b46b605973bc39
SHA512d8ceb794518e74c390c499d6d8bb6e0b0076336b30e69893f157010afd0b7fa2963abaab79a14ad1d5c36cafd5036a3c9a2c568f600760c0d8a2e50e00fa9b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f87b99b25074fb0830bfb9ae9101175
SHA1b69c33a6387103611dd4060b27f6059991d11da1
SHA256d0df2f1faa51a7267b6f2dc113ab9ca898712251b31ae8bb82adc6b1ed0bdf57
SHA512d3630c71826e4d7f2508172a25dd2abfbe255a09e99e37d1476315a8afc3c62af5243f44713a483ba568537635ea41a2c088cd17d348c7b11cb2bcc2ec694a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51faea7c9d40faa5f358ff54897004034
SHA1ead8d860cf8ca5ee5eb95b21768c78e54de4c085
SHA2568785cfcc228995699b27a2e481aa34c55db3ac86d5e0d14ca4f2a20318069d00
SHA512f5bbc4a25335bb57ba790c98031f458f3a233c1833c2ee4f7af564801711226bb4b7b49c556dd503da8756a265d44870f50040b3d3b596bc522704c3c35f9165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fcec86fc4920d49d41f42098f7081d3c
SHA136766435b2102a84400901bb0455e02e8c2ab9cd
SHA2560d58d113435852149a6e797a311a57845d5e9121fa73050063d53e837b623b7f
SHA5125213d37c4315c7aa1125472930949cc272edbca1a230448b909a5bdcb53520c49aa8a215c05ffa6c183b9750455893a5f184ed0b1458d7aa26ec27e0b83af7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530b570a80dc48f044b7b6ea9f0c2a7e6
SHA13b52098a0dd9a2e7be4e7f82bd108c2e1ad96a86
SHA256094848ed8b568ca01e9080a421fa166c41d9a7a71903cc85688ff27aecef4ba0
SHA51267a3672a18c086db097ef202e78a51bbde26dc500c49ac6da8313695066349bed52fee221bcd93f5a04ecc96f4d1c2db5b8a0f9d9fa7914b688f07382e94aa11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfb5d176d3b122c51a990e6eaa823905
SHA12adcf9172c523c0b60e042e01271e1845677eab9
SHA25619431cd1a33ffae194a1277098492a85ddb7ee2e4036ab181b1c74d494f76a9b
SHA512a7056a1ac0d78d53914cbc98a2e6f4828810b019e12e692a23cbeca2a7f9c74c0f2dbd1eff2b67d80824cdd2b827f19c57513172b81905a8fb2a1867b9615578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf0364769d99fb7374ab9c405acb4d21
SHA1c6e70f883366b05043c598d1c4296116dceafc84
SHA256248f65398ec3d26eea79a2f11aa644b94911515029fe6008bb6d5edbe81e88b1
SHA512c7d315015e771483f4564b5ea6a06a31a7b0da1cd38781f25e956857f41903596d22c27359b696db565e66deb65805008ba995cb61c76041277a5a0e21cf957e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5388a2a398c89cd8554e5a256cc8e3380
SHA1deec306f3d1a96ad70b826af735a5d3bfe781264
SHA256f00b60a98d26386036b93dd44c0376b52daf13184c85a6bebb1e85e77840b62c
SHA5128cd8f412d119311ea2181e738a660520deb3ed26768d2dd44f27d1c8a7403cb7b0b07d5740d3c7621a9b565db2bd839f3d2473773adb68160363e2ee41d9b99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f1e1b745f58e67ffa160e2c7d26fa05
SHA1108c4770e25cae00be9df346366b83ff8be614df
SHA2569c7c8606f3d3191a75b5d1fbed682001b61cd7191ea27b0b19cd4f541f5791f5
SHA51275e129e2384701afd315629ce961e8c0aaa2bf5948196b93e3959f40b4189ec10cbcd66540a0917a14b95829ffb9d9e418a6e733ba112f381b92ed36253347ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b