Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
baldi-s-basics-plus.en.download.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
baldi-s-basics-plus.en.download.html
Resource
win10v2004-20240802-en
General
-
Target
baldi-s-basics-plus.en.download.html
-
Size
5KB
-
MD5
2efa72744df8d471aef0f1f54239d02a
-
SHA1
443cc7c7825ce1b59a25d69ff8848db3b2ea3fbd
-
SHA256
f4be09d300efd234693d4b29bff05c93543ef7b71333a763686f5380439884cf
-
SHA512
d521cb91055e2f6ce83461393fbd94dc88b8c1f2e6375ba0290734b0ee5a76faa455760decd3e96027ee83eea08b76c5dc81b9a516d997599ef36c97dbb0600e
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C89ZqXKHvpIkdNPrRU9PaQxJbKlnx/IR:1j9jhjYj9K/Vo+nuaHvFdNPry9ieJonu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05a2ec58101db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431915317" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0AFC621-6D74-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000006f44bcb8db84bb109c650f1530b2ea4e178e534bb12e436b85bae9fa65e0408e000000000e8000000002000020000000c26779935c6a38df531675f22ed3044c397fcd22d588150e166d31fec402c16a20000000f8c80e1f28a1cafd3c976886888c43f78dae9de4688f9bbc574622616b0cf21440000000a6e0e7db8ff1c1dcf866330bfe3e49a25fc31dab9677af9a9bccb99fb556de4d56cf52d4c65ab87beb741c4b0d408a6ca4eecba9d64d8f184a831a682925f2b8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1072 2112 iexplore.exe 30 PID 2112 wrote to memory of 1072 2112 iexplore.exe 30 PID 2112 wrote to memory of 1072 2112 iexplore.exe 30 PID 2112 wrote to memory of 1072 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\baldi-s-basics-plus.en.download.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca3945c7107963e7c99d0ba2146eeea
SHA10ddedbec48ca73ef6f4ab739e9ece1f879e0c727
SHA25665a9d7e482d0426f064d7945e7af15a301cb9d9a8b4874771c6b20b0e6bb5773
SHA51297299b5f48fbbbe9412aa2c66eec64031c9fd828149daa111884943b7de1ab4ff0237513ce13a1eb9be07729c74cd4a06ba3bef67bd51820d8b8ac235321ea34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514dde1f94c6c3be55d049d0562e70713
SHA1d752a2d6756500820a29b66eeb83be38d366308e
SHA2560b998b80be21dce85e6c4fa0ae333debda8069df0f8d2af050a1837a5ee72fe5
SHA5124a806a3f25eec57e82af6f8045251ba9f748627dbbc754238021b6e004497fefcefa4357cfd01186bf669c921d9876268fb0bd6e45d411df5234d74f763b68b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e45266a80e78fe5eccb4d14645f1eba
SHA103d4489d81e85fc4e6314fad97e4257deeb0dddb
SHA256eb1abae9ff9c19f4f9322ff1bafb3bfe839103f1e484adde0e81cb9322eb20a0
SHA5125a2b611e938afa8c1500395646aaedad990d48390942869fb86d9bd85181d267efb0a1b354b11fc10dde28facf8180bead89d8253cec46f6b12cd4f4870e8d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910e9dbbb58e606f616a29b862952046
SHA12d0635f074407efa6506f301da85ad3de06e813c
SHA256c2f85f63f249cb53da6f3dde5c9f76f3bc5213573e9717ba3191ca35ffa93e6b
SHA5127e1f57d23f4751d2af829aa9ebf586849e2fc69e10fff7cd0cf5227a1e66da54f1a14b25f4e064af50ede2e427c7e16f64fa6fe769b8023f29d79aa0fb2326be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57450d2b52308e212db3ed5f362c6250e
SHA17767c602bffde267c258e8d4a419783ffc57d755
SHA2569d244adcc2fdf7ffb39a74981edd2e491d7c96afbada0e3c430ff46b5c2adeba
SHA5124bf1ac999f3854680b669b0846315ece9d8625d2c801566cc42e3430cd5779643458262f1a88ca527b37aedeb6459e60250c31c6e27b06f3de473959bb7350e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547efea8d2ba27fedbaf5bb34f1b9e6e9
SHA14bcfe7a4ebfb8a2696b6b0777612ffbdefc37f50
SHA25639e08eca4e20edd348703cf2eca4c7b7b4e86113e6c14bca9d2f9b2bbf2d33bb
SHA5128f267a638b67cb67d798f5d79beb23da38cd48691a4d0b98133464b24a49c8d2fc425a3de6ba5cbf01ad670e43d22e50211f724da82ec6b7e6de525d7452613d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593229310d176824b1c85b6600b649f1f
SHA17f7f6b4388aa84363ca68ec33fbf65a9678f30f5
SHA25680c4d181b29111d452c9633b1b8b17ed0cfc9c481ab8066a19aada39632872d9
SHA5120626d5fadcc0886d0caaf3d909f3cf44774e81ddd1426bedf4bdf4c660df103a2855b9b37c6c240baa85e7c3e17a88b710472ce6e5efa4cdab30139bb4fce485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563479aff866362f11936bb48d45990c7
SHA1a47714b22b6a10a480e0db938cfbc72c9b4d5a9f
SHA25676002e37e25ff94fec7cf0d6cb88d2a4c1d5323878613372b3920b8b5640aac4
SHA512ee0bc9fab48b53f9ef3fb605f89d28e5db249f2b509a661f1b9ccec7a0dab84134e74ff1b7b711e610768100cea2d21c3776dc30b67fffb02a57c3f059309aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b034fb3a58635a307a399b6271bdd97b
SHA1709ec21e8a959e4320f80ead9a6122b963fe2af1
SHA256ecf6d095c8976afe64cd9a811e8cab1272a07ce7974239f57c4203d65e7fb6e4
SHA5126aa1f3529acffb734e73cbd120f418b57b652a288de43d93ecba225df92f8b45fb0a9590378b81809402adeec4dbf418813c4a219e6de80173cae2f211a4f60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d95d749528b99c4e642fc140ae89c3b
SHA1727dbb11461b84b6e35acd3330cdfbf99321ee0b
SHA2563347dbb759a63826b19489fbdb0421a7197e16dcb2295a1bae8df1cd1f37e927
SHA51282eaabd16c233629a3acb5c2b350069507db0439de48dbec6c3d870eba40843381a3f4638f342d95132864cc00a8f8a48b57371565e9b5ffbd0b6015bd38e790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea983bdeecd8db159c35682b631fa1e7
SHA1df7290a7f1c5a7c076211fee9a1c2c39f6f460b9
SHA256a9bc5cb9c28eebfc59a1b603301a5faba7d468a55083f59b4aa3e53b66ce0b3a
SHA512b626e5f9d6c5cf5bb53019ac015f42538a71851f42709b65f5e7b74ce878c5e07bac493d41fc338f8aef03244ab83399bbf1b3bcce812eadf71ef6cccf0878db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526418c5a73c8977261dd07ec4b75b03f
SHA1b3a4fc509f0009a7b5d567e18956581371c6b8fd
SHA25655d024035bca5945f8592dfa75a7bcd610720c396bda9ff86ee6abe17cc7128e
SHA5121262859971250570c672760ae4eeb308374e2b0f57ca14a5c780db707c434684452d99597a164187f9e5354513bce5871e47d82935b4d90e53f505ce4321a56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503acbdcdae3ecbca505456ede50ae2f1
SHA1336ccefb71ceb7239498a4b71a777e90071688ff
SHA2562890e1b5d3d896abbc3b44a4e03c6508fe1ec8003b39ddc3e2ef5019b08d4e94
SHA51248bdcca576003945edd16504210ae2b2a43c29e2aa6f5aa4b59acbc4e6f2b9e2b88b08efbe5701d4f3a15bc10e6e48413f3ad15d090f64ab5d906dd2b6111176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56387f5761d8695a6ce4f09b42c7b1fb3
SHA184e8670be6a8b20c135b38df1cba0a4cc5b840da
SHA256bdb62fc7c14754fab63af347d0d83dd88c474d0a15642c98f7244bc805d7110b
SHA5128f7d6ac1bb9c218b0e17a347281a8de6817b0963a705c9dbb39d67a52d84181a058fd2b717995b2e0ece90431d5d4504471696688e94f45098f9aec66a35dbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feaee648729c752dd6e9bef2e642f83a
SHA17f31e68cccc08b31532bd6e0ee169cda4049709b
SHA2569907a86333e4f3e5d9d3913478a107b93971ba11f552df3eafc783c243aee009
SHA5129bbff717850c0d54870118381dc8ca204660146b9e4194095203ccc0c44a688baa68ceb01e52d9885ee17661d4c6964a3c119c8f900ee5cee579ba72d3274ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422992a4e44fa7f56ab916c036581222
SHA13f4b8b9a6d377aab36a0dd30d745dfa8d06563b1
SHA25672954f58794b507b7dde331ec4e040724f6d30c57b40e0331be1a26cc9ddd55e
SHA512163faa147da9a6c49eb09aee218ad74e5d8f15368fee5600a3e1425107f9845c0cf185fac709d16a27dd646b6c5c83bf13b904cb1bcc02726c3da442888b8c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cf64d9a06eec4f9487902b347f2de7
SHA12bf0fc380239e218dfe92cf4ab58dba579e1ffce
SHA256a20ff9d79c2a692cf37348aeb021c3dfd66a6cacec6de4aeacf4a8fdac94c0de
SHA51202ce0f7fbef252476eb43e7160532953043ca3deea8feaac407442e6ff0ec3c5d8d2b054ced43a62ba3ded4fb18e771556f35ab5219612a5f7df9a14152fa999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51167d2320c461c95574cf33a576b52f6
SHA10c80b0ae0767c1e0fd672bd8f1492a0d48862ef6
SHA256a37a0041e326c94bfb0a102f8483d3b165ff6de95ccab34647e153d0b19d73cd
SHA51299fdf5532450bdcb6ec4218395e8e2604f0960115ec2dccf25a2c0c50f80f383943c80cd0940b362112c2d3097d7b952dce261615c0065e084ca2e687ebae010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3d64829f8db2e3045ac6be54ca21aa
SHA1d9618869ab103e4ea571e0ade9729bbcd609be5f
SHA2569429cef89ed639c3f3d54a57d33e1ffa243de90059efb60a8768bbc0de08eb1b
SHA5126f8de998ce329c84b9e2d1e932ee4bc1b9666ff58370fafb0e25e031428a6fc6dade5758404df737a688dba7e5303846e3798ca8bfd951f195c4af1fd5b07196
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b