Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
220KB
-
MD5
fb1fd4936b67fd957f4558c8b95fe941
-
SHA1
5dc557037bc9c96169c996f923b3350076e9000c
-
SHA256
902070f4ba7b3e5c0c0591dff5cdb75782bce2e5d23d94a50c73894814a14be3
-
SHA512
a3b15b08ecef96b7ec02b3eef946a229c2fb82aec20a1fac156b963b326003009cf0c54eae3b513b7721200dbdfad91a2df6951197ff984e230186996e41f4cd
-
SSDEEP
3072:SvVyJQk1wsL0VxD5yfkMY+BES09JXAnyrZalI+YQ:Sv0yXxAsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432334246" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5665A701-7144-11EF-81BB-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2348 2072 iexplore.exe 31 PID 2072 wrote to memory of 2348 2072 iexplore.exe 31 PID 2072 wrote to memory of 2348 2072 iexplore.exe 31 PID 2072 wrote to memory of 2348 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cacc7f7ac0565f93f8e4c151e6471a02
SHA17ad1278438e4195ecd8028ddae4404f28795738b
SHA256dcabe7a318a7a80665cae01b957196eaf0b01cdb22e585f8e425e68c90a97c00
SHA512c1659ec21a2facaf473d12d4ad6b374afaf9a18a6f9d189d61675a21998cbeb4d943a8aab7c1a97401ac71d6fa2cebd0fc54fafb89e9554800a06f5e4c56ca33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec2381abdd6cf49d557ebf13cb21f91
SHA1c56ad8c05926489b150cbd1ffd486c4d130c8d2d
SHA25694f0422f299e433a55de40b869ce19c49eb86b0ece83442586d0448f92700385
SHA5121de3375db63b859d929bd0136f4b92a36f6a5de491caf0bc0ee39444ef50fe715ca5cc153e2051a97462876c7f05884e63a17f4d9b2048da30eb3e0fc4717ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421aa4c7d41769215597a3beb9d5bf34
SHA127dd2e814bb6ae82c1c03ef43294722d1d391901
SHA25688b2125cae7cd5899fbdc6a453cb1ee55e7d7d44b599b595071759d72dd09e59
SHA512f7707f9dd2cbc633ad801b234e255654f066bbb6d9c6edd26db3a741680fb9185f3295f175c22ffd3d5452fc7b816346e6a05bd320fc828319932389d1a56501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59993514dda6e9331251e6367bcb285e4
SHA160ac79622fd56a9ab5c5ffcc8e3de4c173a6d633
SHA2568e89820feb8c59f47f27a69112110cdf67e2798a6e3a29c82f8c1bb40cc337d9
SHA5127257e09c14bbb9ac6a6d195106807610e990dfdbb9b9b590954b67ba325517869362aaf161814c7ec1b6c31dd94a0604f686f45b67e208e728d4cfd040597989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235e369dce06a2ef3ebdf9ec4696a1d7
SHA1ad66e7b5511c0bfd3c303e9e64b46b6830c20ba6
SHA25636cb130d026497cdc6ce6292803e0c3ca36211b7465e58f5e65cc6cd3cfd4b86
SHA51205c795b55cc3f15dd041f14111aa2d3c8ab90db0a0f3a861b65e8e574bbc17664703241fce20315c07e7482ad4b5c6fd9f7dabe770cd53d3121fee502c662d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf92d7a59961a74aece556fe6c19293
SHA1cae0fc29b9c54da5dcec2e19571e7ac679304833
SHA25639cd26b8879bbdfc781c04c5395b81b44ffc0c135829062db899184668306a15
SHA512070baa60860824b5f648c1927fec1ea4355fd36ac56e98bd2b4f8f49d214246ff110eb8f188eae43ead55cd8e31b4d18b223e6cbe5a1bf097ab5a1ac836b2fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec54babdd69eb14f79774fdd6891564
SHA1d89d28db53cdca6b838fd4cccf6eba94e81210bc
SHA25643f04fd70d2a91ef160cc604b584f70a8528deba9f1be043c0b709b5ba43f365
SHA5126d5e175edae5a37dc41804c0abb844a6691044482410b858d60f24331722c221bd69e57e2c96e5b173376a597a8bfa0fafd847cedbd5c36190e84370728efe62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031ac3c9dc4da985404fb1e3836dda32
SHA12299d208ce3a00c2b4266ada2ff23043f8ed4259
SHA256181117ed5137530e3b34ef3ff30456d94af3cb52de2437a91352f6e5a6687631
SHA512545382d50f9714288c8fd655f1c87198681513201c286cf0ff849446a08d931ca2c311a8fd43bb04886f087f1cefa68252b43e55c739e71fdcc163d0938a31c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5e8254dc1f0847fd8ac36e81d93c45
SHA1d33a070c31610dce490556c535c15ff15aef3993
SHA25687d725fc172a1f35346ba57e3f92695d24f8c15ea02c73a75dba94b00a53a8a8
SHA51237c1aac67dd2ab1ec3646ea8732a18399fb317cc8dcf16dd675a9979f0ebc6e6481bc8e98e24e1619959b20b9580ff34c1daeccd6161405f604d786890cc1bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d50701b5944e7dfb731fac53dce09d3
SHA1e151b7263847850a5d222ade991afb5ea0c79bd8
SHA256def9f90f6715f495fd2ca7527c577ba8625e25a61bb904c0a2b3a6ada4e27ec8
SHA512fa3de37d8f087e6857cbb2c1316c4bd13d8044410cf13e4cd16f273140b012bb769b6db5170f8da7592b29264c0312fd3a3e7aecebd632fe0698bffc2ddd9d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57748bd7fd90230b96ab868fd3f30ac5e
SHA13476989f5c62c5bbc27632d5fd5997cdbfc334cc
SHA25610e35c9652b4914495d3430035343de619ee33c4c396e384a0b840060596ce2f
SHA512c305cdd68121302534d7f91e679df4d86c11e943c56ecc994b212c537dcaec4decf38d5d3870c00fd8e4d8aee5327aef5c73632755ed23cae3217d825765f250
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b