Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
214KB
-
MD5
3dbf3a70efab7067d9ad8824104a337d
-
SHA1
16e35f2acde3fd1ed22c9d56a1d426d9085635f0
-
SHA256
2d39832744b5a1ec7e518b8fff01eb57c0152ed3340c2804096664a1706a6e53
-
SHA512
97ab3eb255f54e063a643a41228c75a9543c9424661c83490180eaee01a85c77705d7fef8fe284c048c721314ba847664e5e51cebf5c0eb60ae56ea157833761
-
SSDEEP
3072:SIz7uHbReTcyfkMY+BES09JXAnyrZalI+YQ:SIEuBsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432077292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10195C41-6EEE-11EF-BA28-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 632 iexplore.exe 632 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023da3a533078a0b91138b195cca7f94
SHA180d6ec88d8233164867ca07af48a985547dec5eb
SHA256f9d484ffafc69773ebf308d90d5389e747c32389d763b0fafbd4106737d8a5ce
SHA51274862b677bd16f41dbf591ddf9aead7dd3762b9b8edbe274c31718333ff1da3fd7e72797f8104989abbf6ce1a2f15c9642daf25b1e6c55d66b521f4960884609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306b25c47a914430a778eecae6415ae6
SHA199cc76034c0a87be2a5c385bd8006064de84006d
SHA256244b6df421dcc64066159f8761a5342d44f4f7b7b5353976fc4a4abf0e8e7358
SHA51262f07151f8663e0e68855b3d0bbc3ed17217c6ca0ba9ef722b4e27b72a1ccc08ead52aa40ed17b2aa168516dcb6553ecceace8a17cf4847f518178a557465a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e4cbf54c975ae9ed318e592912aae1
SHA1c7292a51eff307b8d5a895b31cc75b606dd4a7a5
SHA2562aa62499eefe570bea0d7b7d5c88dd68438505b13d98f9e47eae8f528e1adaa7
SHA512f67826f23cbbba423e2a2ab94c1d81f27159cbc7981626a6922e4894358a5419a7fdfa3be13475aa89ed57ecc0703516675539f314f7242b3116dd39216cff42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e22a1b32ecffa1e9c4d322dc95f8dd
SHA1760496e04c994de8dc3042633cd056576ee22f74
SHA2564fbdfdf24808f9348deea2b862f4e8c4d87a684d56103c791ffa5f35eac8aafb
SHA512b4a3cb5552c9355ee702ea58863825effdcebd73a02345d51a2ec931e8f513a79efbf8b99fff56e22c8249d56354a69b44f467f2f0c227bc104c010a39553f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580036f7e9842e261af456a643cbac545
SHA1d2a158a819917d4705d85873aa73b107224719bf
SHA25698bbd079767221c505feaf4d2ac3c3b1bec89db26a8c4e20ca3ac4a9701f5ab5
SHA51298b5062eaf93a57039f5c6c319196fa197ad7556b7bdc6721f8ca9b4860cb16d98ac0a221811fcf0ac13fa1556bd221e3a3bd9dd70fd55abbf033e6359ac643a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2df2d49b71a6f6714120724d0599a28
SHA11944e5b25b95a156dfda9a51e40e8f56a7025719
SHA256d03922c372695b9ab01c3b5b8dad5ce1188f6fb6756d8a58a10255d292c40146
SHA51222451cc03f57de1cad31519ecf5fb768a0f7f6769bc1f17c2f811b9afee9fd342c5b278ed952a0679c8310f115d4f1b2d2c8f185772eef13b37a6665b9e1f846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54525c1c266135294f691448e22565dfb
SHA167168d68466ffdf4499d010fd4b549297f1206b6
SHA2566435714a0095d86250bd899e033e9bc696e5a75c8d8496a506ae2cc5c93c41cc
SHA51251d21e233107468a57d3dbf7fc2b3571412767001ddde39c63ed020fcb47d3f97d6c70d3d8446f4fb0e050fe2fed8f59bbb40f7a92f78ee77944be8e1dd43a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ce6a0eaab830a26a614d5dc019b9eb
SHA1f2076ae9e4ed294ace3ae090135c3594b76f8439
SHA25684d3e6fcd837831f23e3d70edbbe8e8d72d71ae5c59305d7e8da53199ce8206d
SHA512cccc86f58ea19b41cdd9ee39b318a11d5cce7ebe9f407226abb729c3df6d1c51e522784131d51da286352192d375dc05696b1a7fdecd1c78ef2d895064429f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897524e214f6d925e954074a34101c74
SHA1883d26c193f7ccb2a4f7364948d71829f4790e14
SHA25685a107a2b8e127a9a70be8d71511dff2b8e844ea9bb11a1b2795158008bb783d
SHA5126da6aa3aecd4265df787e89ea1bd526a761cd7151e29fb14b525328a627be43ec1d49ca20dd5fb1a234355114be44c767b76ef7827c76040fde4057b11441704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bded1f95840f5785950147624671641
SHA1a7790b425abe1fb64ce60183140ccb6bac8a7c1b
SHA2562ccade6dd662de44dec8cc8360c103b298cda71354b493fa78e6ceed0cc67263
SHA51279b2444f8b54b0668d0c799fa1370dd33ab8c4f4abd9265afd358e7b68610597fcf268dd02397071fcfa4562726b6e05cf3fa886b516b69444f5b9a8cc86b25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643f9ed020d06df3d3468de20fe4822f
SHA1b2fd60ac8092ee52020076c8873f446fbeccb820
SHA2563abf1bc2025887c48a92b090c34b13d724bc50e389a49edf3d6e40789ab41a29
SHA51215602f016ea44d4b88997581f4a197df1e5be585585072abd6b0a8eca48d16f3bea1dee648fdf9610a84ec4969ea002c628458569434c3ffc0c3dca082246196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c03ca8c36462d545006f3776b8431943
SHA1949752a8e1e9e5c729fe5d686ae7472582936fcf
SHA2569610adcc01fb7f46b258f450b8090c3d447cd14b5b666e683d22436f6428b0bf
SHA512060598ba46c7727301f6ff7f1fa7a67030e760934d118f002bd03be9f71c8a6183b58417a4190e9c401f8571acb1ad319b29f6e53e37c1e9ecfa1cfcb8dd02a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b