Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
ffeccb58c3249b8d91cb58c5c519bf2e25e663033960107d046220cfa729fea6.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ffeccb58c3249b8d91cb58c5c519bf2e25e663033960107d046220cfa729fea6.html
Resource
win10v2004-20240802-en
General
-
Target
ffeccb58c3249b8d91cb58c5c519bf2e25e663033960107d046220cfa729fea6.html
-
Size
2KB
-
MD5
7ee84410f7bec6cd309368e9a97cd69f
-
SHA1
1edc612d7060fdaf96e53ad8b2c3e23f39d57771
-
SHA256
ffeccb58c3249b8d91cb58c5c519bf2e25e663033960107d046220cfa729fea6
-
SHA512
8c400be4036e8f5d0513b81c65267bf9bf8d87be467bd284e233e1c84d92aadd6bdd04a2d630a21e781229a2dff4df8565afc90b18296ec8d67e28e4cb3769a6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6ADE7A1-70E4-11EF-A5E9-FE7389BE724D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432293149" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a90b34db530d35605772f5521e311b5a43ecbe4abf7508b8bd508dfa5d8e2da2000000000e80000000020000200000001b150796e670efed4d34902a500acf66c73ddc9d79e305e5f0845b0bd929c8dc20000000149e8c42eb2db74fa871735e354d2fc14d671b431b45356b4ea371bfe06db2fd4000000015393775c29b974b9f05e63a0f6a3e422b939d36a9030fb922a48603249d44703e7b74c3f2bb7aecaf4162ccd5e9f14b73277cfd1b21a76147afea0a355f920f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303d307bf104db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2800 2652 iexplore.exe 30 PID 2652 wrote to memory of 2800 2652 iexplore.exe 30 PID 2652 wrote to memory of 2800 2652 iexplore.exe 30 PID 2652 wrote to memory of 2800 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffeccb58c3249b8d91cb58c5c519bf2e25e663033960107d046220cfa729fea6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4445379b61f7e77ad9cf7c38b1a6902
SHA16b1ce8be53d197bd67b75bbdb7e231a05712e881
SHA256b09d91a4a6b8eb1d2edb5839499dcc40d45c7a0607a50b927dc0fc930ed61031
SHA512b5edbaa6a1e237403dffb2296f44314a36b90a0d0864247bcbaee1c2554925fa64c3c908db05ca4b3d3034537bb737a42d2f3a6122653805c7b06b4841146aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552be17ef7e7816e35b42bdfb45351de4
SHA138baa3afb08b1aa1bdcd78feb2b7edb3534ba5ad
SHA2560d217e43274cb232b367dd05daa85c20549528c1d7e78246537d786ca117817a
SHA512a5e55beb99b018e198b69f3a504da4665a7f183240866758161a186dffd8cedc054c5286ca3f87838eee903eb9ac48b39a2eb21a8adfe49ffe278d52bd13d44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d773bb21b108721506fb54a456a8199
SHA1af51868a2ecaa903be2846f589f05be905f7e9f8
SHA2564b1f3bcff7be71ee9d63fd06f191f0345c2d5a1ca7be1e03a2b2767c8104dcbc
SHA512f275ad1b20b4bfbcbe1d6790ce9ce92ffd2c563ec90694f5ea71efe27a169778ff2daee46cae6dd732fa99133f15dad92fb2dc9c5a07d6a8e157945bb695adcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5885fab80392b4028747a51e16e2c2995
SHA17cda21ad8795aa32f465decbc4ba38ca711ecfa3
SHA2567a7886fd99a90ef173cf9a6cd6a2edb99c04df589c025c5549a4b6175695edb8
SHA512213ef2c6df182847b85ebcd5dadf346feafc33b99f296b2586c60a819922a7581f5d0bbf2ddad4b1eb76ef6902ca00428a0a1a3cbc8fe8c93bd703b46badcdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f23fe60c5de5fa86ae9028dd5952c2d
SHA1d8cdda1fd88569c2d9ccf66d57d4c0861570aac6
SHA25684f0898875c197d86454b3615e832ba7ed379fe31d38466b5eb986a0b050909c
SHA512833e86c598f0fe1b30de532e3414f57ffd3555f61a172030374e7c9611d0ba1954d4c7c1fedca545d5e6ceff2b65e5552c447c7c4bbecfcc4fbe85452f56e0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ede08404f620cf5f095fbc80474a34
SHA1e48eb1a323d99a0d6ee0b7781c46425252831b9e
SHA25674a02ac9828e0c175be9b328ca61a814fb279c62f7e42788b62b98e81be41729
SHA512a64357489752974828570417a35af634cd0e0de833dcd2c18e9d243897e6906bfd60b3d078f9d14fbd72eeed42f45abebe3897d2dc9381c3b275d15d01e33941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d115db5665eb8c4633accc7bd30a50
SHA14418a8635dde3f681365b2d6d0d298390140d67e
SHA2567e204a6e840f912b9f2b999af7cfe736bae8090a0d00255a4eb69ea6ef87b1b7
SHA51230a6ee1d73fb68394237064dad58b351f46a7558e952892ab74f418aa126cdf78aac8ac452cfd77d98f14c4c46fa5cd67979ea1d545eeed2bb66c07b1dd589e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c03c7246e3cb148eaa0b701d4138c26a
SHA1bf76307f2a909f20b25c3af090275eba95f5ba3e
SHA256e4b81a7b993c5946ae06ad6834bf1f5fd0fbd053c14297485afa182a25e093cf
SHA512e932623a8e7155e68d9ef1e9ece894e7256c00927da34fbd6b074a1275f936a4e6d9610075d445ac23fab531d0a473e5302ed8f5ebde309cda7d4245d2a9300c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ada50098e9a9745ca7b4638914145b4d
SHA13eb9c7f7a2d64678a48eeb39337c5ef02a6a3611
SHA256ae4a94deac7caa760be4d3683829bbaef4c2b5dc47934a6d8c644d48a580a218
SHA5125ddc4186f23cbd00b2745c182c82f3fd2372fa32407bc2116734a27d2ad748df5791f6e1e629def574533caf99b2d3f9122e59294d2416b76ef284d0df335de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90f69256e87d3357dd008e65493b4ea
SHA169b68fb633ee6ed1d578cec71344d048050a8646
SHA2564e910d31bc7e56250908a30fa9a1552525fa3f22f0c74ba1e661a54d45b161eb
SHA5123bfb23c3202946dfbfffbfe9ece4b410c36e07cccbace81cebaa00aeb78374d6b8d32d7b7d53b7e92541fd9ec92d05eeec32eb007b94a210383ff1855f486ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d7ae04df7b15c2928cb6f6dcc43a39
SHA1c6be3647841415862235c230f4a03edc02301b53
SHA256e21a8279d7a8fcc0c2620048897591d4efe1501341aeb333ad55fbbb98e659af
SHA51248b375f09df7bbc7881c0f50e9fac392c0ed4b5ec68c16493190b59b10ca55a513641eec60aa045ee3c443da8fa83456ef39e15d6b02910ed7d536600d7b0ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d673ac1274074b7a2c2aaa2f2eda1d
SHA1ea9540f25abc2b9fe29dc1a11e15686cb0a5d0fa
SHA25682bc5819d28162f884cbe1c64c251192a5ab9c3bea4451a36fb893f2e898f166
SHA51204bc9e3fdece411c1adf2f785da5804ad0af59913890c3e7b821b45070c32f93b4c3d1e9bc5fe3c74d72578451b2916c6ebb3b8314ae50c02ed3254099bf1a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054e4599994bedd3f9c2c8ab7af61d4b
SHA1831d62a6e1de387c8de5af5c9e7e4e8dd46e612b
SHA256ca701f464bd3931b40cca6fca09c9a0930ed285b9e60484a09ca75bcfbe9c8bf
SHA512ff71f93a127a00f4592e525ca5547e4bad930affab47712284983a63856fff34312e4b169c3fa870beac0bb4cabee645fafad7dcfba8c79b96edefe6e78aaebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d98dcedfc62aee68f6c51d56872e005
SHA177e533d7de431ca7ec74d1ab4ad196f1966404c9
SHA256660e1e09b78b3b1a9ba3e6af60c93c5a5855365eed7bd7b976e88805768fb007
SHA512d1386ec49b3641d8258b00470a3b75e1f0fd1ef103d2e72a87a1c40e7c76bd31a3865a270c27ea07179ff7d977e5f45e0107e7a3bcedb083e9d02fb26b628c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523949b05d73f87c8291bde62490e043c
SHA1de94609473434b29d5e89f4d8abd3e680f9c5ba4
SHA256b173261aaf8bd57491cb2442e210140d723dc1f89cc4358f6e13ce46cb5966eb
SHA512107c2e83f397420d961801b3027301f61433f600c02bd96af290e81d7c2baafb0b5d858e6c85bea5d35dcc2a300123f255a4d1eed04d9d3a3e14392774dcc122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7783d645c95d8a4009b828841a06f30
SHA11ae48670b76f2c7ff000fab03b88427c6ebf3bab
SHA256aa496dc2e4f9372d85b11b4de9379c5d48ff533813970f3789e4e6063e370cb5
SHA5125354ae736429adefc3c130d0ad9d0620546fe3c92ac9b58853cf09c92e9a5245ef9cb6bd6ccbb1fa39d510b7d740eaa4060e825173b9a1680781521946244bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c0e821f03803f91dabe8f1ace158d3
SHA1969f16e3f33bcaa6643174cd2e48cf9ae41184dd
SHA25667231d15787bc3256fe12287b71e697ad67d4cd01a5b92f84b7b8dc53fee346c
SHA51216e488e98295ebe547d06f15d415b9c4bc93b32755eab9565c18e8683ba95c718aeb6d0cfaf6e2f4f71a631ef060fbdb91641299e6ba4e8cd6526ceb038c84ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbfacf4eb398dbc1ba50e3bee0eb508c
SHA1c01e52f12e0e7c7cdfb0b639c1b3d573887a08e8
SHA25604615f36ac1b069e88fabfaeb7c19e597dbc9b5527c5590c90d07110ed0ae77e
SHA512230ce9411267aa6417e35a5caf3da4fc7b4dc4d1dcdb0f1e5dcdb7fc1ca0b6dd6fb3c16245273e8e7400743b648c907a26f708069ad4ce6389bc43fb7c7dcc4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b