Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
8d95f98daaed8c47e6960d164ad9ee771347d08d2a638e849716887cb417e746.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d95f98daaed8c47e6960d164ad9ee771347d08d2a638e849716887cb417e746.html
Resource
win10-20240404-en
General
-
Target
8d95f98daaed8c47e6960d164ad9ee771347d08d2a638e849716887cb417e746.html
-
Size
4KB
-
MD5
d83c31869e842f180b4b12dfcb8c03cc
-
SHA1
8d5c7be1c251a07bcf7e98e99c4c4bfb08a79f20
-
SHA256
8d95f98daaed8c47e6960d164ad9ee771347d08d2a638e849716887cb417e746
-
SHA512
0a7bb05def1c6fad6c11a77fb55b00d0deff1bf85d6f37d8ff1af157d903f6237f790ac3d25988ff9ec026814c24d9438fb35a216044479d1d05d0df7379b599
-
SSDEEP
96:1j9jwIjYjUDK/D5DMF+k1XvJADh/pRsjPrR49PaQxJbGD:1j9jhjYjIK/Vo+kXRADh/pmTre9ieJGD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DAF6551-7158-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708b35e26405db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432342715" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006a6b3492fef6b646458f0cab264ba2a9a9f9aaf63eadb5e4198a38ffd71a64eb000000000e80000000020000200000003164798aea8290652af8bd2749c19b4c84e0db6a0e2ecdc72164b84e609694f8200000004e0bd6993764381ef76a19dee1ebcde01bef3eb205c28017cfb9dd56f861f47e40000000f2b90a6be2ce20b4f6e49dba8824d17e239266dbd4d0508199e043967b5c28bfcf40a3813c827fe7956a6b9a3247fcf1528310171f54b4e1ed5eea97b0a87f38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2296 2824 iexplore.exe 31 PID 2824 wrote to memory of 2296 2824 iexplore.exe 31 PID 2824 wrote to memory of 2296 2824 iexplore.exe 31 PID 2824 wrote to memory of 2296 2824 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d95f98daaed8c47e6960d164ad9ee771347d08d2a638e849716887cb417e746.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f918e3a8174603b29d6499fcf3fab1
SHA1bf2ed1a26732b9f19c1e4ab5bc6388cfb28e60e1
SHA2564cc275b0f5a355c02a06cf4885147d113105dae9a393a060ec82440a8cb43352
SHA512bb455eda8302de54ab656b5e9c82742c1290a8ff5b5a65d253a44f23d60449ae9888859daac1d62cd0bcd93e1400a64978a57be8f41c220cbcd35ef70b3f455e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274cd209fc44903ad14969078cd4960f
SHA11475f03502434c0ba705e17f6a5626f3c465ce70
SHA256b0d3907ea5fead3a562c81cc336bd3c3597b4c1112eec4f2d4a849aad69261bc
SHA51273576cabe184fbb6f1bc1251d3028c747c239a596c09346aad858deecf16e61a529b1ea864465381765fef081891f999bdfe4d511c3779268170a28003098da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0a0be3929571a786f39089a787bfed
SHA1b9256bd40a0f29f63e4fb8b07866aac2b7f11e33
SHA25655b4f03d0bedb5303e48bf8af90f42a0e8336d3291e0850c4975b34883a1048e
SHA5126eb9dcaf558a69bf0c0ce9ad6a1dea7d8cd65a0fed937c2bfd1919da9cca9dea0ff3b85d1676a0048aa6787fd8139e354d81cff0bbbe438b468b67909aaf71eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc642f7a5e4d7da2db8ef4e580470fe8
SHA164bb1840ee095c84546e188c6299d2f984625dc4
SHA256fb98779eba95fe9bd2ec331a7ab81107acc17f1d486b10d9de2ed3d7532bd157
SHA5126055f561275e166ce18ba5fea622f0d5293edb1cbee9ac83e3bc38480d4f8b7a53bae9abef0a7200d88d3d64c2bae988e33c7aaabf50de277a4e55f6a3e8c13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce763dcb1e5f3563506218f275d0e94e
SHA10a365417a5b42bdea47b266281391fb13fd33a6d
SHA25686b3c4e57514ef16db5a7226f738b298785ff4742d4b478895710a30e9f24aad
SHA512573b0c432833c821e8c1a9fa8e96024b3f3f34486c0ecb9141e60e8c88bca66b9b25bbca169e67b8eaa52a22ff2861c9ff814740f225090bf9fa58ed3ff35978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f55efe7e0046a77f68df04fed75f7b8
SHA16cea025c87dd9c2a5d2de0ef7f1fe292d68d79f4
SHA256eabb51aa7df204506310f531d55185fb6e5957e4bd3b5ac289885cece8d52174
SHA512bda981e681ec339563468f26667d336d122120eb187f07cc4bbd48956cec3cc74f8b58bc227b0a5d8900c7cbecb26cf1a1c5a59784219edc1c08e4857ce22d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f66c755fbbdf7a90568a580d8f5ffd
SHA115249b7d73defe0e49a474951641c8783e208bf4
SHA2565cdc532c3def363300fef80266545ff6f569d0739fad1565d3bb91070944b4da
SHA5123826bb31716b716979bdb2b8087bc95c07325a66e003125e2a94f25f9cca27783b17acca1889f8bbe32941e1857085e52c9e661e6a20fff4897109643f4fd72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d0147bca0e4f25a3c159aa114aec88
SHA17ce1478667456e1b3cb7fda25ffbe82e90aff7fa
SHA256cc13b5f2e778920f092bd4c84c5723d51dc0dd9306adf8f1891854e027370970
SHA51224fb0f1837b28ec04854e7a13fe1170593bf1727ff4b6772d525a4f3638778693aabd9daa14fefdd85caabf6aa6ccc12b609a388f3febf41fd1069e3a654a75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e18d8519d328d2ab5ea50ff08c2534
SHA1fd311dee658875e3c3c9c3ff7fed4d97160e5d78
SHA256cbef1c0af716a4afb5a000b72d908329ffdd184658526651f66ed96e538a4dca
SHA512250b4f546a95c3c20c8594be04820b1b544e0bab8cc0847e932761fdcd095f7b3cd29a539c1cb981a0106b1c4764b9105c8320bf8a5ed6e5cb5835681ba58db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d425893f53c9de586c84ee5b6bc3f71b
SHA1c7ce0dded43072806e9e5f8339ac937d977c0965
SHA2564c3d941b6dfe17f1084a4c59994f88c50d6304bf509c40efb7c782d199f3be0d
SHA512aca5692e52e04644d6349e6b786b0004aa46696bc7f1fd72f64428342d6c46cd739b76ef9a3765d0571abf76a8fa4a0049d67d7c0d6a34b9a1e95c17645d475e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee19dcde51e945c7b90aeba927701ee
SHA164b669a7a192b7b283a45d0f22548f0c77611bfa
SHA2565e7e7259fc65c9898f8a9d599242861697d0287853326f2ae5500e61d8d809ce
SHA512b2534c15e4a11ffeba91dca8ce88c8fbd6e52cfea6e0786b7487d45c09d1b597960b1da29cc588543d58440fd9ed8110d012f4db036385e80606eaa4a310a8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a30875748b4c2fe79fa8300c5c980e4
SHA103c4298ce93f14324d9350d9a354ee79dc8c69ce
SHA256032a1eb8674e391f83eb570ae70957edc35f69b08ad2905f96f0e7399e0f1f59
SHA512b8a6584779756e6e4de69a697dad931e707de0cd4c3a2ea7aabb361fa9738671182bcbb6673c60a7f1e6cd70af7ca8bade281f9f6c10dc6494572d0a7774bb23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50376ab0f73eba9ecf98c159cc4bae617
SHA167aa0663ddc9b83338f372cb800c44aa73ca04b4
SHA2564770ceecc9a794fef3a6a2bbe8ea246fdab2fd892789c25e8cfbf791381f182a
SHA512945925e098475d966d86d42a5811da1ba90f9e910e3fe7f1f4edb023e5812be0119e5e068a83558c3463a153bf2139399049ef3748b4edb8971a9fd810c445ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58811e17b49339f31d69e7035b7024bc5
SHA10f1dad98471029a2230016bec10ba0dbb5746f5a
SHA2564f379a23ba0d4877f7810af38687ffc7c636642aa32e7113b3899c262bf2247f
SHA5124bc145be2df05ffca87a316aa9788bf37ed7e130d68cbf1babcdd914046a5ddf877f467c185145e5c40bc2236a280f46c7400a9509c364d5a5aa70f5be810589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4c47a95b00425007b2319eeddecfc1
SHA186b84725ed7f9f3ab316efb5fdfa6ca5eccc52f5
SHA25678f97c1e05f8873b5b5a54a7ae6e9c3826f704ade24a07d453b002603139f2f6
SHA51250ec305c659b69f43dbf79fd6d4863186d592b5a783aa6d9c70e39be6182275a52144d1e53425c04ca3f14d916912d8494b176f6460437111bdacb7d7881243f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f777f35b7f009d953d8fbbddb30ce0
SHA1e201cfae7a7f572d9e401d67ea6d8c880ceb35ee
SHA25614bd107d86fdb1593dd403c0f2c0c201b43fa9125c84d3fc1d29eb892c291b55
SHA5129e589e1b431a9868627d2a1f6f7edfbe69df6b4004db4360a313c2cbebab3879214a38d2b9c125637908679ad3f8256af1e07d9f1cc7027a58a095ee7c703443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f03f28d93c532eff8446a3453fa54cf
SHA1ae6756ad5815f5355f6b82b22a379cae41b94429
SHA256a5a42be149b5702b6d823d14b0694213f8c9cb5b2fd6390d82a5046646517bf5
SHA512cd61b1750a9f1d5f8983600e67ed014ebfe5cf10ea8a2c0a9f2edd60ba61f08417617f50b523fb2cc485015fe57a1ecb85c4d909c6901e188cc84fd796162276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab738fe289094abe5c565601241ded8
SHA1ebe64eeec3055888711fdafc256db8689f20da83
SHA2569e9bc41509159e2434601b25dba687a1d8126508dcea748fa9563ab8068209ab
SHA512ddd4cb7eeb00c59a6dde5225deecc486c8892c53fffae610f1a1da05d98570f9df9a31bee4e63f479c0d2387bef88e02ffd718df945ea96010250446d1061c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbce3f29282846d802190f7bbd9f6061
SHA16b4cea1c6f08898a2eba31eb03e95b9a8d4ce6e2
SHA2560f5bb8fd813c498e5c7b62c479b18413c22ac261ac6fe6f411c788675a8c1533
SHA512cd6f952739fb77248106907bf001920576ac75ad455042c35ebddff9191277281c09c4b9426baeb09bf87a4660d4d4b6b48892a5e673f055f8d5b2a93a6df28a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b