Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
5KB
-
MD5
7c422c835333deb4d18475cbaa13caa1
-
SHA1
4bb6b6d4c6da6b846684ab927fc2613c72f9e4e8
-
SHA256
6fa869cdd39df0e5b36d9b51efd43882863ed05d4b058f6eb27a5bf8afbe7e77
-
SHA512
92397d0d239f025e6742d949d9f2996aeef7ea286af2c6cfc092b251e5a768221d70b24905904ca42b670d27f2826dd35cc9ee05bf82dcfba9060cf8c586b14a
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8kHZqXKHvpIkdNIrRU9PaQxJbKznx/IR:1j9jhjYj9K/Vo+nkEaHvFdNIry9ieJ+u
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52C172E1-6BCD-11EF-9A84-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01a4f27daffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431733375" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000006e06adca9671f250c7cc883646b9844476e9e337b32a64d839627aafc93816f000000000e8000000002000020000000ea5fdd8b9c443794ca09c384992dde82e3314410b04d86401de2f0674da8d876200000002fe82a8c2594e37eb230b88e3d1fb9f8706a7ac9d059c96d7362dbc37b41ce2b4000000024b2681995235c24f6ed8d6307370a297881f38d58a935c6000ec9df544b2b109f3cc9b7af056be4a4f821cbe3de55dfdcb5c4ea58f0baec4fce811edcf93085 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2916 2400 iexplore.exe 30 PID 2400 wrote to memory of 2916 2400 iexplore.exe 30 PID 2400 wrote to memory of 2916 2400 iexplore.exe 30 PID 2400 wrote to memory of 2916 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053ca05d448d91e376b6e79fbb63f7da
SHA13f31b7f4f1dc4f34aacaf604cecb262478bd082c
SHA256fb582cabf3616db334af48d16afb8bc227426e048e9eff501edbccd32f44f8eb
SHA5129e266e560cbd68c74a9538c2f61eaa31bc9d364e5dc8caa791a27ee135fbce58d2a93713aeec02bcbf775b6afda37d6bd7f435eeceaa1cfde46671b286ec1a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7fa9fa73d1fbe8bdbf5e4d677ba8b7
SHA1897bf7e9df49f9c8ae09cebb9b2207216af97db9
SHA2563d982959ad50c9491ee324b03a7f380950760e3119c4ab4f7ae14729848cc5df
SHA512a34ace65dcb8f349d40b9fb033e2cf9729d10c2d672941a0bdfc945460307e240e1c5e89a49e3b4d11ca51b0b8a7ffada5e2d5aaefdf407293dfaf18c8f88e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef838a11dd86007b6e7e792cee3ed6a
SHA1a333ec78ea1e6eb8b9fb6a2eb9bab301a972824c
SHA256cff643a5fb14fb99c6ea319fe1e55868acd73a44dd25ab47658573e47fdddd44
SHA51218ee10e315ea3a61635bc581ba22c9a4c626317e4a47129450b0fdcc268b53fe9efa440486927d7da10393e6a10fa6e05423a59a0c432d4de45771811afc95d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886e348357154a6e8660065c1f612ea6
SHA1fd6373e69cb7e7f0ef7ed273a32d7e2c6e212be4
SHA256fe8c3459b5fc2003371e9e39f3160ae82cb7bc434458a3d54c96f372aec6130c
SHA512f13f644807f86a18182066c3fccb9f081be03af94e37a0a2b2191b9442d09d580507e7f59701c6153f1c1232d6e76288f70ce818ed539510e9d186905e81e8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56559e9a912393b1349f47357dc51a6cd
SHA1d4122ec1dd386e01f26251ff4bdda4015dea00c2
SHA256cd45bb802f5a2eaaacb45c947e4d9c2c9b9b4829a29a85aedc5a5b45c5fe7dc6
SHA512d4b37ee7ec2e827285fcee54f4b9960ac96681dfc6c4d7fbff29add92c7f2184e08f51c044f85e29861ad1a68b9fdbce45ae02257be3d480fffb1712bd3af5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fc41f8ab32cb5dc398d1a316b5b3b3
SHA1d5ef45f6fdcfac110631701f88aebe8de0bcfd13
SHA256a5e066624ee240c4700c55b025b8b9ecd9adb89417854efaf976f4e5d6b704c0
SHA512620c877fb3666d14cf08fe5016b470a51a0f8baa6429a6fa08d4a245d1b69d58ee50eae418f2507d60bd82061d871db6db72bc7a23d6c12087b93c10e3bc8cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a2d5e5438a0bbd3d2a038602fa6951
SHA1eb1bf26dbfc6b6f559efabc6d1256b09579d13f5
SHA256d3f71b0f06fd16cf976293849f78a6565a7b483218eb8c2b755308fcb7829d8f
SHA512858ea238ad080b1a14a7da0eef1f9a53d0cfcb45ddaaf6cbbd044086fe542d9bfcfc6cb75c4c9afb1889e525392288cc042a9fefb155dac10cd5891325d6cc91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ff7340122f49ea2ec409277d9700d5
SHA15d194440c3652cb5dc8c4005c79b1e2e7bb74cdd
SHA256b4f75542cc167be1b5f4994ee5e6f387028c820432126cc8d5b7d199c1d4a849
SHA5121d2a1c9b52b10de08b2d937c8fac40cd22777b291115554d0760fd042109dfb3038de7525fa0a9f0f6c8068cde27ba2a2812c041d728e5b43ae6d31ae56204fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726022df4d5d66bbb00bb14ae7e008f8
SHA1c507221c2b9a45ecaa8ec91db41c48f067065433
SHA256807ccd531622d3b257ed84ae74771330e08b6bd606bec52d9b18f2fb7be4bde3
SHA512dd85223c7c064b3df342ebbdd1dab4fafc999527c2cb57c6364af258e5b2a60370e203a56f5c3678f4b8366b23c074f19a3e5c1b1fbb065bb2a8f0cccc4630ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a44ac8ed3ea8656539430a66756b37
SHA1fd90f81a71bc7d0955f828c64e45cefcffac4f73
SHA256dd18cf76774f1cc0c39df19305d0aa321056a794abbebf7680a224415f770e84
SHA5126ae5545ff0eb597c1a8d48993b37b8ae7f454441749e673cfb1af187af78ac9e0bd4749972281544390d60a24111337b3bef603327b385402a9e53e74cc5493a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3262899d65d7a91422f25d87c19112e
SHA17575e1b0cb6f108fa7d511636beab605cc2d2f1d
SHA256855db0989c4102a15a4cb3deb4c12537c99ef7d66fb6234e00703be00e84bb31
SHA5127fd7d4f2e82210628fd257b335fd7a7831ac687d6a245f6a3e42c03e83df1907a5b7e058af206dcd53d67a386678ae21e7757bd5e54d02879ac5220d4de40b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d94786479dca4e4c91bda2df7f6a72
SHA135b459dd580b7cf6b83096cf86669d96b3eec304
SHA2561bd707884844337b9ec78ea9bea8cb35763793d8dc4f5681ab053512a0d58e81
SHA5122106d69e3eafb5e9a3c7fd28e976202af87af570a72d8ea6c3ab85246e4a6847d06e286e985def3a90e29da59283cc16715c7bcc05d1868ae5d772cf2e880a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a28f44a0ffa8181df7391ce9fc749af6
SHA1ab923ba2225a047fbf5ce433a08ac407452d99ce
SHA2568a5a5daa567793e79c079a18b25b760f4b6c9e833b358c23547e1c7ac775ec68
SHA512dc2ae0563fa1849fd3f875aa3d9d1ce03613887ae4cc5f1f679812167d8573feb7c80cff018df5a71b4ad82ec76e9ef4be37ef517e1d50859ffdd08086a50273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ea50b955743cb5396eb6580d35876b
SHA1eee9a9b924a6fdb5ee61b694c254fe64a8957df8
SHA2561cb793cc00ca02cf11cf2471bebc8ec714499480d8e55b5aa87c76f31a25cb48
SHA512ebbb0696f0e0d6e8eafdb331b676ff0173f426d87716e32e78be0ded9b88a25191c0807a781863bfbe73c9bc45c7141ab9419ae101cf3d7c8116327bf40895ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ff409c9f441cb6a686a964823b308a
SHA199fc3c330591324f2ab5f376371fa88c791b7bd3
SHA256433c83362edfe6f8c29a6b0d720b8e5153b29204dd4a7d10ecdd782ebe303024
SHA512acbffc42784c1e8e530804cb5d0d94f144eaf110b18026bf561c9247dbe6d398a55d47099c71d330695f8c2b1d2dca7758534d24a34d62c69125501e8fc4e9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579babee8459abc0c9fa9bc60eabe059a
SHA1c4c4b1bff02ab9865338be4acae8c0dc4e423182
SHA2564d069918360e35b270cee797bacbfe8aec25e2ddc4c5782b86129144c372e5b0
SHA51250b28c01d90d275a591b2ef2af59292eee0e781fd6dc32eca281840b165fe6c809955fb18ff0ab48dc8333d2047707d949e071af5fa8cdb63b415f9c761da5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5def93b965a09897e9e678b18fc6b7
SHA143ef3e311b4ef86fc9551e8fe62ec8565afa28fb
SHA256e7980251630714ea2cd15b7e27b3f9506c5604a1da08bdadaa825e46364a3bc6
SHA512bbdd708dd8a58c04fcad3173d7e2063aba9e6d054fdef713e5f3d22ae645ec8617df57275de408beb8e50b1df57925ea4d689a03bc8e428a97ff53310000dde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7f981833ae3634b1b629d356766bb4
SHA15a369fb7db01860625d45333c2bc4d0e812010fb
SHA256169748b9741174201c382c1be73d1a825bba7ab652ea0070706f159bd34bc359
SHA512ac94610b24589ed495dcdc315372da1193851a671a4d6065a7a291bc52d75cf8b2a5fadb53ac506cf66f784f588de9cce82dcbc80d41cadeed0b1db098ca504a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ba3eb64f579b7cb1a322aa18d3f4e6
SHA1f53a86502c023419e5e160e2abbf20f0984e3d36
SHA2567725a1257937b0f35721e1197f8e7a3cee9ac51e16d5191e15344b9c0621e8a9
SHA51245c55682a8855b8ed2abd7a789ba1c6c83b950498342a395356cfe489701c8de561eecfc4c41463361d396da1a61ad6680ce5269b5fa8660e1d880c85ce2b42b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b