Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
3_setup_vpets.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3_setup_vpets.html
Resource
win10v2004-20240802-en
General
-
Target
3_setup_vpets.html
-
Size
1KB
-
MD5
10e02772cb7b47d78943616f0a3ffb45
-
SHA1
ecea33f86aaa53ddb861818f1a6e570277c8470b
-
SHA256
1bd8de197b3d665b415318330e8e58848122c6cc87390c846b64ec9bb3af392e
-
SHA512
24069d5588ae72eca032fb7b38bd9d9878f46acef5268d07b2ad106c5225fa6ec369571824a17d1e495b198a5be19bf06c4c992b4d08477185fe3c120f3edd80
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bdb1528effda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431700806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E27EE11-6B81-11EF-8EB4-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a52ee66ec210919ee9d4c82459d64a6953682b310becae03e1e096f1b792c7ec000000000e80000000020000200000007fb6510950e5356890726b8948cbf9225dce8770d9062b7ac4e71f922abb642320000000996a0411fcd59ce83f744d4bea86de82138fc42f70f87463387f913661bb7492400000006862c25f01db94262255e2d6936818999330862126f0da353535a6a4f5d5237f2b0a226907d527376fd617c7c494e4e58f46cc2f7e7651596edda0090f5e6512 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1016 iexplore.exe 1016 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2252 1016 iexplore.exe 30 PID 1016 wrote to memory of 2252 1016 iexplore.exe 30 PID 1016 wrote to memory of 2252 1016 iexplore.exe 30 PID 1016 wrote to memory of 2252 1016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3_setup_vpets.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ecf58acb4fd018ac11eb2687fccb421
SHA1cbef49d26788f39c02fad57f3eae7f7cc38715cb
SHA256e08f0435d583b0e6051ad15951a3cd48fa532869f34a7af1130a00ac25deb634
SHA512f176917dac765bcf93d6f8c39b4e3f60ec3186602827ccdbe269eacdac2812adb832f3220c102f9af4162d669c928c82ef07ee5cae8d59f63bc0f2b121f18ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece246fd232d9574382d29f4b5e9b779
SHA14d8c9fef2928c0e15a0d7b08b9ca647f04a7b99c
SHA256f194c3a5432a79addf5d20596ccafc82576b0d618f0604cc9b41cb3a7dabed36
SHA512fcb3fdd5ee2794942574e73ca0a3e94bc1d16466ef7330802509204a91fc407b558d3750a3982787d6101a5c0aa53a8e75387fb037595f5804207e69832d0986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf6b357228e3f2568eb6ae078d4b011
SHA1bbd2dee18dfce846c4f9d705d1d02b0739538899
SHA256802fbf3dafada9a9119eb7512fe7a0670967dd8868e8a25874c6538d807f5331
SHA512a1b57ef462e1f169b07cd3c50bb76c48204a3a619425c798a894877b230e47e75112442995dcf40ccdde6610c133fe78a6960daa7d57727fa635b35b736147cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51da43145058686657434a22b6726d9a8
SHA1cd20219f8ecc1665a499c43e8960b716b11c60f4
SHA25686606ca7173630d990a58076b36eec2ccacf7ee3975d97705dadd5a824d0f16e
SHA51278d689d9ffe551c2cd2b7badc8cee2b8ae627f1dbf26fd45a59654a3ef400c2c876cfa4fc7acaf6db07cd25b9b907a95ea6cff37899d95eaa4dfc3426fe12450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814b48f93c4b05ac985a8f7ab4af4f18
SHA1ce1a67606806aefddddd30b9c211840046f7ad7c
SHA2569f6695a5c51723b1e260ae8bf920df523611cac9bb0f2389803d1d152fa7210b
SHA512a0b1894c17cc09b6b3703fca86730d1ea6b64f5f94cb808b6e4ed22f82cc313e5fe0034dd619812100c46fc551183b3329012b6ccb06d708c4ef27a97e5342e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0584f6d5513b8f79d18300593bf6054
SHA13a8bc1a1557c71e9ad0a9b48de84b1d48da7eb8f
SHA2561fea898bf989099bf98557bc390008b7a8099fed401206aea9d631dcca772973
SHA512caee98005cac185344e1a9be005af22b7e5dc430b530c4dca53cdc6ec158ae46665d64f112b427a9c1063d2968cabe36fc52f434167ae96e2ac382785ee5a62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576333d20226366b150aed7a543a7fd80
SHA14142b02546c0517a64a863538f3a56c335939e0c
SHA25661ae25dd6cfb09bb02914b0e5fc11d59054f0bb948af1c827ab03b415ab26516
SHA51297d702827f2a217c1f845b76e402205047edf130a9162ff821d62f537aae7021ef8d590c4b4fe629e9ffad4844c90d437d67d4393e7327141f3e853f5483a023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a7e2eaa2771f36ba2d1aa168bd4ed0
SHA13c7de3cb0b669ad92456c9c78091c86d42fd56fd
SHA256894b9cd73fff01e02915961dc23b3745abbab939c25c94f5a570a04fd76c8de2
SHA5126ac5b1ebe70a3bbd1ee2d711d1cb2ad49aeba3b3eed82a854b56f5cf54d59d38452eeb981252f1b871b4ed71fb00d0f61036bbc2bdc0555f52d5b0858d05d9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d404a86d2cf9790f7b126ddac112458
SHA17ef2fc0d9ac498536d3bfe87d02eb90b3d06b55b
SHA2568b5b829a55e492448a4884998f5eaa135bc0ef3a5f995e158b843076db494c6b
SHA512dfd8da4ef426359c83d9f8101244e01141f27d252efee0a3fa75402a8d9a0d7ef75954967929aa628ee1dc1b3121af4d121181506b600d79601084d4446c122e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b181af6ed7fa9ae9d01acf05cf474a12
SHA14626cd41aff8516d70f872e90b6a986452da6c68
SHA2560d93bda944baeda868eaadcf71e946cf1bdd9ed707cbbf38b282901b1d2eeb7a
SHA51235ebc665da37a22a4682b575acae23e404aedce941e0fab4a177dff6e51da4b9c9b78d410e0db95d1590cd27b076e8bf2cff614367faad9a8a1ccaf35c32eeca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be21e2cf7e9126e34cc03ef0e28daa5b
SHA1f89f676fc4740a9c17f9d99e7ab3d80191d931c5
SHA2567f0562ec89c3cbaf517a86f6647c01c2b825aaf4195b425deb06935046d80365
SHA51221e21bb01e770ed0e9c8651f9a094848659562d2f8eed8497ec758549ea959e762e2e52749ae0afae72e0a394f94b906deb2d40148993323959603bdffcf959c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26eb7ec9fb9bc12c0cccb0f07bfa2bb
SHA18367cb1bea1be11e8ca911e62964c65371e2d266
SHA25652ef1a827906365138b5c8c3aab969fc446c0dbc2cf73ef76dfd4d370b853bf0
SHA5123f2b871099421a47e7426eee19759c002aebcb3088784036db0366df4d192ccaa874e7d38322816859ae3d012dedf4fa37d05abd8d57771ad52d8bdeda168589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538aeb0b814cdeb78f61899b43297fe79
SHA1ee9cd4ea58de911bda1b881bacf8403565ab049c
SHA2563a188649dbe0e0e4110c309c09e742828da7c71e9133004f2ab5ff1f063ad80b
SHA5127d8d9efafc2d6778f83304c88d43434a43a45c10e876759a0975b6ecc9bea38de5dc8ec557c57dc31774de78425624e40b72c173de0a6533c34211d8ffbd49cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faae26bd832b7e0259e06f6b18a784d2
SHA17f8a98415f870277182499fa75196acc65d74d28
SHA256fe78495b7f8617eff6a038a5ed87fbec606fba6a628328bac984b2d545b46d1a
SHA512a61f5900d826c35320ab9d953cd9d4a54a4deafecf3aec45374a6b3a3880ef1d91082a930244b74ac035508492c0576d1bc17a708bff28ab37bc384f43ede138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515747952345ffea7964f1c9a525b7246
SHA1d80c30be94d267f57b4b2368d1479707948306fa
SHA256ef63c978ab5826cda4ab4c7c860918c2b3f7912980ceeb34c1a3e7883035293b
SHA512fbd667d1ed140f2e7f75cea44f858b082f2946ad21e50bf6643cf925cf9afb10c60bcd0cc08cdad57ebe74962e381da52ba19fd815920b23a9223e66cfb24155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453f2eb6030989dd5f9e7c8988a89478
SHA13e0e1ad6449fd426f7ffda07b714fc747734318d
SHA25664f7ee6b5119fa111cd3e3092fc6953704b84822284c3ecde26b5b30c6766d1e
SHA512e3527d69b0562f348c1722c8177366a400dc217d3cc2ab479efba22f826787b1660d8e91a7c2737a952c65efa456c0944fc9dc67f28640e7a841fdeadc214c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c365db898b40df12d2dd1f2fc9a8383
SHA14b929afd36779315dfbac56e86fc347e76416e30
SHA2564781740cc5018571ec049743c71a87cd2520587fb6e825e3ff0174d9f6128b8f
SHA512f6f80397bff5dca80284ae4f22b14eaacff753198ac2468c31f6eef2624a1cc25629417baeb8930892259508beaaab9db1bd09b5fd13d2d26be62a0411de306e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1a74a5636861a3b27aa38777ac9e04
SHA12bce1cadcff4434f2a958ccf3709f099543e95cc
SHA256745128a963a7602b00a9009a1cfc16ef4d8295d627d2732b7b0162c42dd6b368
SHA512f36ef584836a0e2cd9a1223e98f11fa2fa925ce998295f3b3f2b9aa4056a75c6e5f9662768c52fb19213f71875205289e42a981005990762e042eeaa92da4fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af8d54870c2597b8d2ae9baf0f9879c3
SHA1cd97d1c23b6924744d3901360780cc3e3996c3c0
SHA256b7929872960e2d83f0d8312bf2c36b1bf0a7b3becfda4b1121d43afd526186ae
SHA512ea58e31744c219ca9756b9e22504fde1ab9854a7ff4e475532667b2d7ab549337703f229ecf36fd18880a70fb512874803d896c1641035f55d205ea42605ef9d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b