Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
Logo_Modernism.pdf.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Logo_Modernism.pdf.url
Resource
win10v2004-20240802-en
General
-
Target
Logo_Modernism.pdf.url
-
Size
751B
-
MD5
3fba5355b9c3449776e1b661f9a4addb
-
SHA1
005e6e28ef04d1cc76b980bc0388c50c994057af
-
SHA256
cdfb1afbd30b1eb484cc0e13caf2dd791429d8e9fbaedee77dce2a5a8e31e540
-
SHA512
4beff72605bac7d12fc9e9a6ab9c7f14ed8d80224b12aa442e2dffd6e07c68b5f546b372e2d42a362b8ccc93ad625843faceec58ac016d7e32bd6d2a9395edca
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a5c651278b1e47d2a5a1bb3c9e8ce5a429cd0ee86a60f79f4dd5e4fec7759a7b000000000e80000000020000200000009a24b63921ba67787cf6c58d5ae850c78d86cfc0865adf84578ac5e1517a307520000000438d987d4cc93488cfbf68d90d9575b3b562ba1f0a24104a04c157df5ef78ea240000000ad80f61a3d7ea4b92efe6c6174df45bc0b5b56a13020b9ed1cbd36aab17dfb4794c94927ff972700e7457ae9943f60533d97cb519e10aec4e1c4d1c5b9019b66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B7B4171-70E4-11EF-96BC-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103b6923f104db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432292996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1856 iexplore.exe 1856 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2688 1856 iexplore.exe 31 PID 1856 wrote to memory of 2688 1856 iexplore.exe 31 PID 1856 wrote to memory of 2688 1856 iexplore.exe 31 PID 1856 wrote to memory of 2688 1856 iexplore.exe 31
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Logo_Modernism.pdf.url1⤵PID:2220
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3fded2b12a15cd975c211ea1f3cdd67
SHA1864d93817e6b693c38e500dd90a0b19574eb0da3
SHA2567b7b739ccec77a58e2345baf926a047bd24ac516e7f00082e5b4cbcae21fef1a
SHA512f0498a35ef03eab0258d99ceab055b7bea2843f6f2f60a0a36efea32fe7383b004bd88f0c2959a2de012faee0d97debfbb21fffcc5c10ed4afeddfd21f291110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54737bf2bbd0e12ebfad296413a84d87a
SHA19137c7244fa18b0e2adf3b4591131453d77dff19
SHA2567cc48e4182af3bab198f7e2b135f03772850c240ab03a1f04e888180b61ec770
SHA5123d8effcc494c1a54d01b2e2e8fd455b7aedf623f672d36ea69ac8b5708487bcb7aac8752b23be69b4a9269beb801044555f6dcefe684d6c43c960c5f2073fb18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53908040844fcce7186db95fdbd93a230
SHA151dda027a0a48ea3289592042d96c7f0aaaae736
SHA2567aef89e97947575928c53eae1ed6b5ea0e816b223af632d7e929e9ee2a5358ab
SHA512af0fb9f9a65649d33f48f80aab5e75d929e960eac15493a9ce7a83416c4b15ba39910c649da3337c05d5ca179ea82c57bdc17b37a96e3699b0aa85b79fcd759b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cecbac5c395ad767381db4ec71d96ad
SHA1506414f3fb8146e7c2446766f75ec181aa59d2ef
SHA256c819847f154b7aa78d91387d8ac6a1e3023ceef4805ee47ffac369fe73a8efaf
SHA512c29cf45489f7dc7c7391a23731a6a05ebfb93512c4ceaf423c49b5c0cb72328623eacd4dd14dfcb16930744ebe3e547f08691171669ba80cfda61225885e2e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e133b7511e985f0d5ed2794de7136d
SHA131823eabe8944f66a0e4199beaaa3aa58149189d
SHA25650cd7ce2aab3f7f5a1af3ee7dac5ad59151eb9f52314f3168d5b592124d6ce74
SHA512f2e41dd3e4c1d28ffbf2c4082069b864e0f853e731321aa805f58f5ff7da8483f3695243674795bc5ae6906ab887659eb219461947528e4fdfa679f5a3c0c02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383b3fe898abea89340f74ddbbec17f7
SHA1aa92d02134def1ebc594e3ca861059d819792fe6
SHA256706d82e189dfa83c70d7a4a4c4127e94a2c3742779e06529fec07a139ad101bb
SHA51215ec852444e2298a5c3bec6cb308f0db814b7f85c729e547221a2217d62b9febfadfe9e6e56d5daff61b8dc7cd9547985c848bea92a5f80807cef19a577e259e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7dfe5e00fc89809953a6ec50da3c284
SHA19f6055b7d011cbf8d39c971d231bd628671b0958
SHA2562a41b8cfd5bfab59bee1383e7f3e1da816ad141cfe2bad312b6fd475959aca33
SHA512f7c1d6f48af20e5329e515ddf487c6b9d8ae832f60c32d0367e383f4d557936689ed7af8bbe724951728bec8e49efb08c85433362d2a254b37898e3d28b65216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59109848dbb17b2bf11aff6d68632740e
SHA1e948e1c830f9036493c91534447a50ee340f7581
SHA25626108106e86395df4af4027787874bacd67fbe50ec37eddd1e2397c511feb630
SHA512ba20552c3e0ea4b0fb9358c7d12f5393665c2aa94799a6a71f0f0e616027a286022b697133e88d8d7337058736ff2c2354b69a65faedcd9e1d5327aa28b7e290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549fe34c6d2ee307c97820e0bb5547646
SHA14801abe99614c01b7b529311c38f006f81b08bb5
SHA2564826cd327f5b15a7d637bdb14859e97ad49c8028951a2c70e7663214f719cc82
SHA5127a5069f9d359eee00d71965f1cbd952f074a7d245765e64d0e4e758b9f25a5211a3ef6c38909f16f70196c608398aee7e84fbd2d58d951e91175e6be74eeeb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedb691def2d0bef7957a6f39ec3234a
SHA129673a0fcc304e28896adda640ebc45a347ecd1e
SHA256b540d1c68080425ee8360adefb38a6859c45ce09cf99842b43bbcf40ab3822a2
SHA512291b94bf965b78bc26031f2835e5c12fe761eca0ae2a37bee65bbdabac27612b2dd341674352cbb8df721a4296ef7a0f0ea61b6daffd3f5545fc0b63a279347c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d38ddea117cbb8d366c366b989dcfa8
SHA19fe6017a8fcbc8c28a780b5c7d2ebb8993b91a00
SHA256855614d977f4261f2b9fc51f06753c647ba4e51f42152d835dfc184ff976c7df
SHA512691bdc01676984301cdbef23a5a255f75e1b6cb4ec4c79abc75f69598874a43a9ee773f3080c145ccba669f166ea9c4662f8ad138feb7e79bbbd4d0fd769964c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b033bb3ccab88531d4653af8a37fa048
SHA1253582f66929d75bb84b9b25c87fe92d02dc5cac
SHA256c0b860a7648eeb40840901d42981df64c1db13408700ddcabde76750b3e5c663
SHA512ac42f351cae32f3f67f99f5cc693c70541a42418631f0f618852b41d20d449b9ab3210e57018b7f79cde553ee3ce5c3017ac4a778a4d627fd7820aeba942a050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6990d9d57bde92b89a8b7e29645fc7
SHA13b14ff8b81a553600ac3be1882ede57fc230380c
SHA256446ddfe082a451986114dd76ede86b8b1a0482de3d59df958df6bcd62015dcd9
SHA512a30c3e3aeebff5c7ce15e3d19a2c9d365004e5fd782b4f915770eb7b72ff56b914d578bfbe277c92685884298fa14e33b876fc419b8906ed706ce00b2729ef24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5496fd6f0fe420e5c43ae8004767a1307
SHA144220197dc24c143b0f26bcc34882f58cef5c020
SHA256d34235ce647ce426b858f8fcd4b7d4275ab59e96a5c0e20cbccc7a733404e728
SHA512f6c307b649ec7153365105f85ced6575c1ce7b9883947d2e0a2895022b5f6f96d7e60ce0face350fd2710539f1cb9c89d7e860022e9d754899770e40ef0f1a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335a72315918f1d1a686b856431308ef
SHA1cbd904f3808bd11e0f6665345a64547aad0c3bc7
SHA2561ae498a18a885f84d9f292d0e4e1a76efd7882e4ab2768ee341d982a4fe27033
SHA512ad8403ab144d1d7d5fa42e455f8af1904ba1207b900b7bf0a536b73e7825944a7f8c47d8deb64c3576a931ef1bfe628d1c5f0d867fc8644212e0d99726bf8817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bb66b503450898574dcfeea43fcf3c
SHA1a28d940a7341b5cc4b94b7bb79442a91db4c8ee5
SHA256a05c4570714124816809f0d875e9115d2d87c3cc099734ad8eedafe8c6263230
SHA512beb482f0e0d11488af0a3946ae73d35dd9b3f0a946ec4ffb4acf5d43b97058199db3f9bf7b24ea7757ce50606cc15050134c5f8028b449c044b7a45265c6f6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3524a852e6aca51eee337b76c7a1f2
SHA11155770f533f8edb2f51f4ca67c35b1c1ed59f17
SHA256da017264cb676d2d04206c16be1e58c1c3461bb29ec0d627a02aa273b1689e54
SHA512bfa2ef3de89c10d55e9f184acfdae2445257f164efdea1a60e6ca4221f6e62aba7d83207e77452fdb3be231a1573a7ccf1e8226d3ba1e18ab1e07a284be8efcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c083fcfea28efbdab68f80f86c7ca1
SHA14ea8fec73b33964423bd3ff02e92e12babe2c306
SHA256b46815d39d2cbfbba5009dba3173b4a919f7b21a16391c5c9cb8ff4cbcb4e264
SHA512949a739bc9e20b98d26ebec0fe8176164e4f1a2c46a95501ffe7431b8fb692b94f5cb51d93d657a7cf87cf3f8b73a4c76af4d494bb45997679cffb0724d69a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c92f88ec6fc3b6528e3ead43850fa03
SHA1ca2ba267c19f76c40f911e599dc06e1a84887c03
SHA25642cc658586d86a6cdcde3778af0001fe7148e381b015d70ee41a5aca968ab9c2
SHA5124f4793cd11dba9fcf51d4ead63a970bf742e5bccbc5ac4fcf6998256f3a63375ef814748c0cbfbc43625724745dd9bb82fd111313cb1258a7845bf68c32280da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b