Analysis
-
max time kernel
201s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
5xo6u56prLhh7pbndbRrHc3Y2BxCjOoaziztckSm.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5xo6u56prLhh7pbndbRrHc3Y2BxCjOoaziztckSm.html
Resource
win10v2004-20240802-en
General
-
Target
5xo6u56prLhh7pbndbRrHc3Y2BxCjOoaziztckSm.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507032343afeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431554726" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FB3EB51-6A2D-11EF-913A-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001b4047efc69114d871dcf2dfe4e285a853ab44a72d28ab44a3c5d5fe30a4ffd0000000000e8000000002000020000000501ae0fd2e2ad671a7f0ee3ea8270bbd2b238e55f6113202e1866a74063aac8c20000000e365284a8d3727f79ee34e24ee4c9d84f7613dc16d65573cf5512e91994b09e040000000468d76cf562914b8877d7e059dd62df671498677778e857de03c3759652626606e0e90e4e8783dd73dbb68c5d5914d9d125df0c332191e7d3df2313f67f2d36f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2808 iexplore.exe 2808 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2808 wrote to memory of 2176 2808 iexplore.exe IEXPLORE.EXE PID 2808 wrote to memory of 2176 2808 iexplore.exe IEXPLORE.EXE PID 2808 wrote to memory of 2176 2808 iexplore.exe IEXPLORE.EXE PID 2808 wrote to memory of 2176 2808 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5xo6u56prLhh7pbndbRrHc3Y2BxCjOoaziztckSm.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b319df3a19e3eae16b5d84f0eee37c6b
SHA1626e67d5bfc61f7c467382a3c50f00a6eb8b8aa3
SHA256df3c0168d5eeffd934772fbe73becf5391310a68a84b4435cf50b71875e391aa
SHA5121f504fbedd2d72d06abb3799143911a22c9700d43470ee32a459912f7fe37d1bb12c2df27f0bcf7ebda4b21c7ffe825a5f91c4c551f55517db5355333b79671e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51d9f15f84311e5358f05691a0d9618d8
SHA1f90b324dde99a6edc11bf902f74985dbaa1a5fbf
SHA256a90a9cfd442f692853437fddca5f3c1a26fa9dd933a16b4b11b2e783b5e8de51
SHA512c3fae5d47af657c371653d2fd885bdf6e796626ca9668320522d593cd4ec380e5622c50eb7997944770ffe0bc8f6d6f2e790e60bea27cb1d8f64a7876806191e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c72bef768e0b00340c336f64fb3cfca3
SHA115dd01c7878e83490bca0f5ddb115acd2054ba77
SHA256d4c95757724469aa89db806da9b6616e29fc6d86408c1a0023455ff38fb82c2e
SHA5122eaa61907424ca34aa07a477957ba18d9073b2430a779d203b2c7ae9cdc98350208abce4851c2af44869deca381d7afcccfea7fbdc6271196e2d0e3e124b1115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50651ac8417e2e55cdeef332d7f2d4804
SHA1990719a83c249a8132914bd6427d1b269b56022b
SHA256019955ce4d2aa4e36c81fbb5f812c74bd94e120b3dba9a80ec5f13a5bc2127ff
SHA5121686fd8fa82967b56c1c9009b6b94e0ee4a385a45fc57d230d324cff12c87bdc9d1779175c8f1752d2def9380e49927b5e92a8bf88cbc2bd97aeb52d197440c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD536f9a0a39b7d3767bd6b99c0216543c8
SHA10d3eb9eb369793b668225ea873d12492765de7cf
SHA256200d0a280b93c9a936795bd42e6914a6fc0fdd33e40c5be45e6fd2d70f19df86
SHA5122e88385991425ff934ccf3e4251a04cfce157d7ddf7aa4c9066ac7b36b373af018e17f845f6ffab050a415a449114f084be14d02e29835dd0e39f880beaedf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54d2a0a80c35bcee03dbfd06cd0fe13ab
SHA15bcfe1423bca0286035a1459c46a120eb743a83a
SHA256f3bc07dd6b3e218f9935392d77bdeb0fb3d6136b65275d2d9b394d38dc4ca999
SHA512f24a88236c49ab893ada204d8eecac586abd7b2b2ff72bada07e078a88e2e3b3fb03159d7292a5f035370a40146bee15df374a9a9b777fd218fca77b5273df6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e4ad3e15cdc54324d8c7cd07e521ee6c
SHA13e9b665e11b5083e7102d894eb25edbfab09389a
SHA2565e0ad876b4b4faff01e227d3ba2ad4906c49478bd4330d7b182ec18309ffa0f2
SHA5128710849f055415ecab08d57938d78665eaa80c3a92529267ce206d419ad09db7825d464739b9ad4070f74ec87601671580b8ae0b8c7aa0dc7219d043fd802bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD540b77723b99145919b915c2ac802a8df
SHA15c06fe4719135465b6e6ab21bff2a7ff009aeded
SHA2561419904b05b6b7c8e8dec41b46842d1ad564c58d1d7e9a75c9d537062fb40960
SHA5129c0c883348c2d782d56fab5b0241b49540d2d2184bee612bb1c22e003f14975241830b74aa224d1e0bae4b911f0611b695aa70767a428966e46c183b72bb7424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57a83e3d171f6865cb181a1e02bdfdae6
SHA15f1baae0652e0a97ad61d44f42cdec428bb3a1dc
SHA2566e64a5e78ad14435787d534632dcb00660edca9e273b149d3b57ff9edf7003bf
SHA5124a28a0380d7b7522c6adac74c1ea9493ee01106b972678ea06bf163c11171bd7a09339e590dfeab5781395f80be24c4e15d9302f39927d1608bf8c3088219a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5aea93da4c1a317c3cecc05f06e21b00e
SHA1355e283ab1bf8cfd44b96fe24cb5baa8f6584ac7
SHA256ea8e6c38da3e021dd69f4bdaf41f03ab79382f431464f92560030c555437e441
SHA51215df4a8f1344a81738a06b6fd914eb4f336ebb5a3a4d8c00c1517657b577ce587264fa78780ace33ea48f993a2862d4fae47ecce8836ebc8dee6d890a6ea3276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54cc7e89ca49f95f5ec07521a476a1c26
SHA1db632e0a290169b9ec1903245de56228db23c298
SHA2563da04caa2c7510d0fdafdd893831515a3836045d7266be87960bfbfecc7d3724
SHA512090c5106037371f1e236d9f007bc410fa8b761deb361e01b0cf13c7cbc6bcac614850e40c7438b4750e2f1485d6e8828a6348dad59e9a701a96ad408f89f7b4c
-
C:\Users\Admin\AppData\Local\Temp\Cab7F20.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar7FEF.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b