Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
1050f4139562a6c48a4b738ecddec7114f44996f1d48148a9c4d4c0d719fa274.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1050f4139562a6c48a4b738ecddec7114f44996f1d48148a9c4d4c0d719fa274.html
Resource
win10v2004-20240802-en
General
-
Target
1050f4139562a6c48a4b738ecddec7114f44996f1d48148a9c4d4c0d719fa274.html
-
Size
30KB
-
MD5
ee1e267db362047b203f9757e3b983d2
-
SHA1
1ce69060e62b635fcdb6d1a6efbdd157d4e40774
-
SHA256
1050f4139562a6c48a4b738ecddec7114f44996f1d48148a9c4d4c0d719fa274
-
SHA512
aa8904efde5a4d017833886a655fe63380cb72e71a025f064fcc3e7a1392ea6a9b178ea140b3b3cf42248b866b65aba277dd9272eb756c023f74a9e5b02426ed
-
SSDEEP
768:7Ln4JY2h2Se8M6D+00LqkV/XTvnt5vkF9KqLvqSZe7:fn3q2N8MQ0LL/mFjI7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001740231cc45539c0bbf8a583a55dd01f57c0401a5fb7d8ef8c562370f7cbf82c000000000e800000000200002000000026a9cc6fedf04416be0f4ee9e32cb4912fd26e7fb2f686eafab8fcac3ab3a00a2000000034bf55791a802365435f24952b95ddab6a9a0bfe9c47128fe613137bba49c71c4000000049806f5d15b555a9eb24bdc91e4d94c9a6834105938c684af956700a9998c5e80d6cbf03c0c805a8b9f9e3b9a925559352c11f76614122f6c5a37cbd40255301 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0A333F1-6A59-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431573760" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e27d8566feda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2460 2176 iexplore.exe 30 PID 2176 wrote to memory of 2460 2176 iexplore.exe 30 PID 2176 wrote to memory of 2460 2176 iexplore.exe 30 PID 2176 wrote to memory of 2460 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1050f4139562a6c48a4b738ecddec7114f44996f1d48148a9c4d4c0d719fa274.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58936a237b3e6bc2c8923d09297a839ee
SHA1f62be1e8cb5dbed34c32d960ee2d2245a4d31740
SHA2564aced7b80e4f913bb0afee33c779727ef7468bba0dbefe79c88c5a62a9d0083d
SHA512bdf7b3bb7e4a04206cbc02fc415674a056a258be96b9253b51bf55613da63b37d877f5cc31a20ef85a0f240f9b80049a7e9b05f3c077ed52ed5f63ad50786e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54656ac70250e002be9e27c4fe1e7d5ee
SHA1c6c0ea618acf59f057c529cc630b60ead355b5e2
SHA256215c4a4880657f3b173f970274197eb057821c0dc00ab911c9a4eca4f00effd9
SHA512c5406a3e8197c27065b4a36729dd504542f36095d0f6417581227020b4a7b52c31dbf98d821b4849392614a3f5ebd695158fc7dcc65e3ecd6cca3236c6b7a09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf6e96fcf05a8c67d216f1f7815ffb5
SHA1745cc15942a6e293996f2f283c4a520de61a9247
SHA25605a5c902b265e530f74c4d8f9326738941913a572799f90bb16b7ec880ca8cf0
SHA5126ac43ebc84decba0f2106659591eb7323d386d1c3ab5fa029bae0ef49edde5cf2412a2c07208f0efe192843d1e6850dc5252104fbb40124aaf91e3e3c236abe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5091908a498a71159b3b409b393bb3db7
SHA16df1ed26995ec2a8a225901aecee612124bde5f8
SHA256e02f05c7cd10944d690972939330440725377174a15dbf2b056e1dbdf3474b8f
SHA512f14039d146343124d73a2b2edbd0d8a5d89497928f8c2f8a6f22483914884e4fb565f13004c6ac76fec80000f0ab7ff825769dc783fda0673e0eb9f4bcb3a323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c03b815d51000230bc5ba972eb1fae34
SHA16305ec9395127d0b1bc208d3a6a10489d9d69671
SHA256e5d5ef627159bac503493ef94f1a002120e376b4cbf248a5294dd000b9000c85
SHA5122871f77b9f2295eefdc6adf5ee69949eecf67c793e933cdd2b4319880c806cfba1d8deeab240c5fa9965244629f3c468441bc82ec91046eeaf1b4aa91cac96be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6a366c35e1011bcd2181ebae4ba3d0
SHA1613dab311e26b127b198931c19a5abfd859de3e4
SHA256b4c31fcbf2adc610fe5c8fa90894c7f122acdf6f0e1ee2372cfeebad295a0092
SHA5124417c59e624fbb5d57ce7b5537a8a9d4127c7566b68c069ac4665f62596cb3222002fef329768a8668d3602e91bceec3c357d1ff74abd6832eec8a38c85b8de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424ef976a51aaea764481e286b84e2d9
SHA193b47a24bc6dccbf1dd23e17147cfb0876bda621
SHA2564714480162e581be6422e20c4d09c1f981f173369ddfab6097bf203a6c44603d
SHA5121a6c6c71d014678eb3d49c34e831253dfbc2f565cdc6bac4a63d3ea88268d9a8c88d7ab998cf8ef467167d779b484da46f4ce2ae146cb7a531edede60bdbfb24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59662072621db4aa075307159f65e2f37
SHA135f64ec4ec845e51cd21cd26e243fa684671d8d2
SHA256799db6d3abce7db0794f72ad0192cd8390961ae2285ed143d41f26a451f41e95
SHA51233462324c2de0205f0811a190df01a2eae754f827f91fd998f597f7a4c258c27d5d1564dafbb2ad164119530212cd2730035a32044a38770ffffd86025b90b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb5b422df5df4be664fab5fe0b59323
SHA16654cf82252cb3a82f037300a6517a1ba6130633
SHA256357708f4fe54c814dedfac3e834d32058032c3fa74338cb65503118d723b6c1f
SHA512b7110a773f5dfa3ec3f1f0af6f80eb3cba762367a81e282050a2686b4f07cc8f781f99027df705b2cc8882998d0bba2789c180b5b1c856bc8b114899bee1ee87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2606505cea61930240d5f338b453c2
SHA1ad2de4c99a652cf0ad1dab6481ae85e81b307dfc
SHA2564c60a54fa90b6d8b19248326198aaa78d66156a5f2dbb924769c269caaaa91e7
SHA51235fee6dd43dbac9f6b940b6fae7b0db4d2cbb57e6d73920ced1f91f50ed54c6670bccfee20b0e4c56000013eaed59e177016d61f0811eca1bc0ced7f62690497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa2d00d778b2a57070ab45b091aa4f56
SHA19caace17fec8f645cce9de0e29921d026b620d0a
SHA256e3dacd8dcd2ffda5fac24f91516347a90db106191947242aa80906cca0c08045
SHA512c108d14c2a597fec42bf1515f080d90942fa269850268b17e33bd46ef18b571a587f7eadc2c9211d0a096e68599d1ea124649f33f76373f7e8cc9705d3b0e65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7ce2e46f5c080ee0b0ab0a156bd9d7
SHA118f14eac9b9a56010a2238a5b18f765bf1032c7a
SHA2567d2ee9e192ca06e5560a1bbfbf0bd556a2d6fdc44de0c10c3614d78da52a82cf
SHA5128e2cfee3e3ec5c57b649fcce1e01a1ff24160289fcbd35c4713ee860bd8b4a8d067a086b7159e1f80f39db70a3445f8e41f78e46b91e3248a628e3e794467b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ce15e9eb06756e1919f82ebdb798cd
SHA1489ac616ea123179f3b094d6a6ac6cdc9269befd
SHA256e68d6843c2496d970d3580135ccb185e472539b383e0194c99fbcaa1d6dc3fa0
SHA51286aa631c56a714adf950d928ca498313856e66884baaf461e5068ff159c52b8d6a91a317755104f9c19ea9dd29c3cdf91025f4e31e4b2a427fcf7ab697da5aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae52ee2c1dfeb4ec840da089f5924f67
SHA1ec948a82c99ec95dcf2444032e13f16a279c67a8
SHA256146a932e1ba2b72afbda2fac0c5b6c9d88d6981e90527ff6ad884fb31eb5a23c
SHA512ce1bbe062d423b64896fd93c03d515e418e762e6a7f50efae2a5cf2272d7e40f3b457273906b906a6fd480c611e406a03d8af34fa39befce1b8464ae1502049c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eab15e4ceefa5f230ae24e0c433c175
SHA12918bd008bcefc536abb54be7253ec07959525c0
SHA2569e62dc31378d93f91033ec51757ebb9def4fb57eb3a5889589daf96d199f3ac9
SHA5128f948be82dd29f8333b267b1171829df2c5c903f2d219027e0073eaf20c453e40806901a25da684bfb0121757c7eafcf50ccbf92dd91c0f86e69be2d897d39cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11575d1d86fb97954e2c52c10bd497a
SHA1af0d66c8a5bca15d77c0bbe5069288c418d55757
SHA25602e2be20e0a6d234014b2dd6b98fd13e9d6bc41907885173d6129393f4c80a2d
SHA512f8562c881d8a4b7537dddd23cc2d1a8311e630abdeff2bbb940a96ff355e3e01a9839b1cfae1ceca29a7e40077cbe3434b49ac7a934a6ad566560c28f1703351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58add67a9ddd5b7aeead693a381d1eaa5
SHA1c3878595db23bad78bc096dabc83a2c6f7a225d1
SHA2561129034bdd6cef07d4b155ed085f31ecefea3b66b8213ea89a3d62654dcd8c97
SHA512668959bf93669e1f57daeafaacd0b12c92efad7e63bae0d92ff745e1e946935463cf008d6cf97076171577afd82427a32532e133bd6d741991745168e3c1c0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50564a863d3061a39f4d96ec5fa64cd10
SHA15a388351466dcd564b50b2ef180d3e0d91a3a219
SHA256e440ca26d075401f2b86c5956a9aaa9ad8c48b0e081c776f9d13c287ff5ecfc3
SHA512902b156fe642252bad65de83b28b0a4f52d816c9372ec4f463dc07bef7471e66166cffa48d74b13a0d305639b7ef719ec6ca0cba96a7b1d1e91c200db9f51e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650428bf46b03fe2a41b767e14fd3810
SHA13ac00e64bfb75a558c25171af97d0e5b81402029
SHA256d4eb3c4f3ff5dca39f576f108236b6bf131f031b554ccc8c9aa501076a0b1e55
SHA5122198a75dd85a248e4768bb5440bd6b0cccae71aca2c06be6d300129c857e5f348a9059c7d5972b0e5992c8b7c47cb55960c98f562e91ba2979be11eabbd9dfd5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b