Resubmissions
12-09-2024 19:57
240912-ypeejssbkb 3Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240802-en
General
-
Target
.html
-
Size
42KB
-
MD5
9116c5eae052897da7f18116cab31caf
-
SHA1
05688bb7f8cab8a0af8d926d10c1eb63428ea18f
-
SHA256
6312180b7a198c4e5d35725bdccb22428462c7bce9562346faafa2dfd0d5a205
-
SHA512
399cc02cc65b61bf20df15427e709a73670f66edcece285c9ceb0b81a59e294646c03e849bdb75daf17ede28668e6a01aa5848a24c7260c36abc1c059658e68f
-
SSDEEP
768:idpqme0Ih3AAtEpA7IxP6P0Mad6nTBv++nIjBtPF5zfJkPVoEAdLTBv++nIjBtPd:id8me0Ih3AAtEpA7IxP6P99nTBv++nIK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000006d00cc2929d6174e5376a204ef1cd8da1551a7805c48dd083a134444d1bda6cc000000000e8000000002000020000000a08ab104c35357e023716f373b87f21aef4b5530418a6bc97ece95566ad452862000000086100c0d67df6301aa5c9ca3edeeea42176b200a9fa67ce63324a28af099a77f4000000027c5902360a5618d357446fab2f18a32da57ae1a061ba231a2e5789c78c0589b4da3ae28e88791d6e3e11dc014f0a970ba58c43d137c342db85ba5e2d1dba11d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a2e21a4e05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432332930" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4574ACF1-7141-11EF-83AF-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2984 2664 iexplore.exe 31 PID 2664 wrote to memory of 2984 2664 iexplore.exe 31 PID 2664 wrote to memory of 2984 2664 iexplore.exe 31 PID 2664 wrote to memory of 2984 2664 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54532021701a860aec50307ae5b6abf73
SHA1834bb784b659a464044cba5fe8908f61eadabe47
SHA2565f2d9ff06f22068180c3488cfa9c976fa84d117bbe0af21ad8656616a4c0c55d
SHA512c24b4b25fee86252ce7ecb0a68d2c5f24f523e8f540aa3db2cb5f072eea6eba6e358ba525a1155fe01edd4939d6a673a35ff37f37fd609ac2566bd0cbe3b2493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566087bb4b2b3277a43418408a9b201b2
SHA107bc2b721f2ca953a7ea9a1562295c860bfc6fa3
SHA2568ddaac2beaec334a501f5d2a9d06804b6948d686a0dba65295adcddd3e2a8a16
SHA5120bf9c255ab431e5a080f1995eb484ec59d7efca613a602926abc797768ae6ccb81d32fbfb657d220a184e4a63506a5d2aa65e8e3e65d3a25827a5612b63bcd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4820a98738cec8f5a9b66530d68a4fe
SHA1c1998f9516333b2215b8262520908541c1880eae
SHA256b769c25a354dcffc905ff3a4ba5d20cbc51b5fe3b25346b5b08125fb52dd06de
SHA512cd152b80ab055935578d0229c785c47def5fb96112d76f73709f66626cded1ae53ea1778af8925b4dba2744afa1c38bc200ca4bede0be8afd09ca9def6601164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221b1e33e69dcdc3a1d1cf2ed54b1639
SHA10ba338f9bc04793b4837027f596949bf8cc7d00f
SHA2560e5e3e44daeb5fd05d313823c7fb0e84056485488aa6ef97abe9f5858e38551b
SHA512967cf0b3e90925a0017c8dc5d40e0978c7c1b84c18496fcf2f60449b1f61c6014a29204c6d86b6f634424c569614be726b04a3087fbd061e4d4070dfd1d56a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c339b86d16d893b67a45484420422a38
SHA169a6ad1a5b4f8a1c22e1952317ae202f09d59586
SHA2568e5e0d0691b3e47d06b78f07a5adeef46003d92bd49708008e3b4a6709b84f15
SHA512c9316290ea4b1009722f4874ea1c125ec6aca5fbe09731eee00b17f7c8dd093a739b3846135d5608703a3fd85583fc49957fc0800465857482d7c79fa4edfa1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8665ec32721e52796e3a1e2ad44ee80
SHA1af8deb4f2fdf1b364e9baa07d79cc0e7efe9ffb2
SHA256ffd0f80752b093e4c3415fcf5157a49b70544379aaa91c76017a49376905e73f
SHA5128dc3233cd4c0bdcd7816b31eab136a152e596509d07c247ddaf877d2ad807c00a0b43147b62577d05262f18be429faa79c5561cd02c8f40eafbb32b374cb4715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edda2a65c733501f45cf38d8c5e2dc39
SHA18b508c06ec7c921a3ca1feeccfcbaf55c17e0881
SHA256f06823c762277a9a3ab837397a4552af153e3378087042a59f10829eae95e917
SHA51231f4821da9fd01fb8b1b439da2ca19ee71abfcd7b89065b1892c9a3d4021a79340d5d6928098d8c31a1b44bdc8eab1be27733953857113817ad3651f26f52ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2432854c327fca5238b60e5754e73e9
SHA142ee0f571b5ab142fb9f529113f3e814b722fcd9
SHA256a7b66f7d05c97a0f3924cf93bb138aecb70a41cda3d52693e74fcb423d20f1c7
SHA512b74357db53deffdcbd7276352a5415bbb8fcea38bd7249eeea290846a48ec8dce532788e1e34cdd593597f93334fc9b23d4ab6bab36476f507be50f1fb8526ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5337c09351e9b19c1302d97c0193d7a06
SHA16338bfee6e6888ea4b62f7663bbd84645d18d6ac
SHA25668bf1955203214e0936d7b085b752f3d95edae2d70f414c87e0e5788136674eb
SHA5127f811fede40f827a51f34c41d983fc4d4aee846f39a8a8a63ffa245b00318752bb14148e199642f56fe163a549b70111b5987bc18428d19a9b8b12851466b1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549fe6b0cedb7c6ee77cd88de1cf32d88
SHA11c81c1cd9ab3f85532c9adbd6c190983d8fa4812
SHA25615fc5983dc5a39a7afcee0c65b228d350e759704772757de91b7f9b5f24f4097
SHA51240d54db92cb6abc4aa232d88fdff9ac95740afae0a4ad2fae5ea3583799d8dab5727adb08b4e8e9fdd0dae8c404c9cf7baee29574d3b0c387dfd0c055b4838a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569266369bafe90a5dea62d690158ad4d
SHA1f2fded9b26e5e9e274563f22718d26003d08d360
SHA2568e9ace8dc01f0288fb0f2f7c4653992a482117a2a637b117987d38a938bf6b3d
SHA512c3dd3f0f1a257912b4fa0e33f5ec76696829cc9de591f509550cc3da425fd74d30f8d1a5af49a802a61d8e063c5360ec1a9f5c57e0e9e87d7d260075d0e8ac6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2270a0c2ccfc07e1ccb4ffffb07f3a
SHA178a7c4e77b0666f8ef252188b3f0cd2579c5bc84
SHA2569524d3b408bc9a531ac62d7dbf3223abe265332265e59cc23e1b2b04de98dd38
SHA512867a3c4cd8ebfa34d1dca0869f61740a3dbe52a2941974dfb6f5312570f6d8b0ea6b2cf5ab2013eae82ad96e9b9819239706cc3a3779c78393017c54f27ccc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e898591ede65510ee0d421f53e5709d
SHA135ca71822afd9195d1fefcf5e2ab781c0c22e4af
SHA256b39aca3724e2a274432186f31a79191e55d727adecc2225659c9725fa88035b8
SHA512c9186b0e50a63e72b7fb17961abefe01c82b6225b92e18ef823bd28c676477453d2cbf04fcfd20a7516173e76001459c6e8df7123db5de9189407b82d74518a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37723b35c2e56d57b5a0d1fde6a9fd7
SHA1868747d35f5e3fbf832be7875e235efdaebf5005
SHA256f0168881dd2d7aa81a3af8c0edc2e122c35c08558b7b2e3ae8fd01487689205d
SHA512ecba0b8148e1d58ef2488dab9f23ea8fb27113cd3cfa66c3c035a32f3dd7f8a52100d0e6fe4c83a7fda852b53403ebb6341302b938c66920c4995ed9c8ec26b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c49eda3df86a803110079b34199ed2
SHA1d311d228f518a782e06c0f703f4f6dee03c6699d
SHA256c1bd7e76f20264196737f97eaca2ea16f8505d85880967394fda6f7a8e333177
SHA512805f15b329deab5b4f105dc5dbfa007f7229a84850f496ebecd1588c3fa370076c90629735f42bb58517885d9b4b7963c1d6998d26db0a4b67035b051198f605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7502781a1da559b74b87e9695610ac
SHA19b085b9e1d65c1be80157b8262d9447b81b16720
SHA256272374410e97dc8692849e5088f7e6968a672a6a93e1da61cb433cbd36d549e7
SHA512aaba90aea94833e1f1b8d35a5db9faee41a3034396afcc716967b4febd3560d65a3b3575e9e1e72b4007bd85c1a008ab5a87a26cfaf7953999f25075879d12b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e5ed3b83b57cde20b852329f3816c0
SHA1e53c22d035129bf1454b7724e1aa8d1e84a5e296
SHA256fd09ef4760550294c0a2f1deec2dac6b96d81fc7b60e01cb5f77c24cb30fec0c
SHA512c9fa5a524f76a2f4afbbc71817f03235f679745cbd01bdc55cbc580a82816cd45082683d3e6101a1aa1b661576b86384ad5b7992d374a105105ab33920f34adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7b0ef9dc20ba777a3428629a8c53ac
SHA1d58e60850d59d526b24f985a9cdc70021bf3a0a7
SHA256256eee81d88c1e6248b1ff9cdb7a1b4808fe90e6e584aea4aa898b055a4c930c
SHA512892af895740849dfea491bc4cefc05003b39ec76f80bb3cc495fb9d99a151d61521019a13d01d3e6a2a9aa6bd6cb60b8f129f59c1d306961611a28dfc207ac7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca24629bea37baae500f4471fe78e18c
SHA13cfb389083c240a950f9b0fa85dee550525abb53
SHA256605d2c641c61eee61c2b58f643595ebb0a2b85d86d05b0397047ae83003104e2
SHA512d303f570e8a3e24c2b80b31a4b0a340848499598100825d23e9e2402f32618226797644fd8545505ae80439980f0270ebf041b8981a4e9f98ac7c8d89f3ce4b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b