Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
218KB
-
MD5
7491715090e122ec0263ab9fd9104ff7
-
SHA1
475dbf981f23ae9783e5a727b05f9cdf5c0a7e84
-
SHA256
9b2a571a37807f26f4a7e88caa33f79a0892edd82af802dbedf24ec295820f45
-
SHA512
dea244f33b47d7d97a5f1d0e3b35cdd8895d0fa6ef36c46d99027e101761980ca8b877bb98037e6715f95b5475a3abac30e20e2f7c8bf2382d75343f45d4720a
-
SSDEEP
3072:SIFKYSq1WSyfkMY+BES09JXAnyrZalI+YQ:SIYTqsXsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432857408" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a16cafb91ec11013133d59034a26a491360d24c3fe5063e34c7c93916ebedde6000000000e8000000002000020000000588e64d113936b50a3d7d94d1e667818e8b1af1a0f1debb645d0f5670f296a6e2000000048d25f5d073abc6554e33252c8d644c317b171bc3cd0ffd71e0f2f5d3da9100740000000be5d18ba30b836fa52ed0b9bb96cb47d6c7618f7e9e860f98537a81a6118d78d39adf033d9f68cfc7379f42ba1967f7348384cdbe632b769ba50def443b48ddb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000050c9fbd75113e314bd07596878b74153b3fed50a2e6af4f6904423fac4ef22fa000000000e8000000002000020000000768859d9f8a1d905a071fb819d8f8b2f8de11904dfce3f576a2c71c8e3778fd490000000985db8732445d0e7ff09e9d6512166a9de6354fde1f8aa938f0eaf9d73c0e20aa1c3bd1e9710b395a32ad62b9a35613dcd6663340848d66b879cbb233278c64e1688d15af718fd0873f8232f4da5043d3a3ac1988db0cd05058a0997aa93ac8a5047b7b6fefbd29edaa07c179df3a6ab867495b4396414360f701bf29c4e85347260d2e0713d6417de5425d06bcf8455400000003c73150aaee82144faa915145ae31cebe09065e74e089f04df46c85c58edbcde2a0b6caadbcd039f5eeb77f827000688ab2e2490de61f548bee53bf38e743e1a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{684A93B1-7606-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60eaa97f130adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2912 1876 iexplore.exe 30 PID 1876 wrote to memory of 2912 1876 iexplore.exe 30 PID 1876 wrote to memory of 2912 1876 iexplore.exe 30 PID 1876 wrote to memory of 2912 1876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599dd6d295ca07113034bc8b66737682e
SHA10494765caa2fd28bd779496e6729fc7b6886b753
SHA2569bbb9ec689be573dd66669d4717f8131263d2068eda68c2839fcc69318a680de
SHA51281395c59ec43750dcb299a566d147b4703f9d186165a06cd1662643bd779b1993797722b72096b910d6c70ad444dffad827d83c3b53940541ac807fb5c92c058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58073572ebdd310e4feecaec822109276
SHA1b3beaba366285ebad2475c3f7acfbe48e59fe359
SHA256416cb720e1b23a72d40ba7e0ad4f7da2bdb9dfa5da502946e12aee7d2265b457
SHA51229059f755e80d1cba0d876555c0f29e7bb4b884c3f417b3a2177a4bd1fc2dbcc56d38aae37216bafb144001d7ce259b64ce6f3603854da842db5bf295a5bba10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5369abcf0186dbfd8cd6243d8c4e4e532
SHA156ecd1dd525199a7078294b35e3baebfb3eb5d91
SHA256711a3b10f7000ee8212bf99c802e88a4b4774e00b71ac635124a8dc4a428fc45
SHA5126c9d9c92685d8b0cf4a082bed575ae2bb73217acdd4b892c299391d86ba69eb215335fd3e006a29395372ae81d3214bcc27040300ca2cabcfcf91f336bfd007f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda1efed10f6d8a917ac144466bf3119
SHA1607ae797e43760b453ce06eac1bc95faaffc46a2
SHA25611116eb6b9d1f6475ef85a9a7bf2bd5d3ffa9d596f68d13216bac46f6c85d794
SHA5121d8962bc988a5d530c8ecaa5e1c8b9253eeedaf6d58009c79a8127c5046c085070792b2feb6d3809fe3b9bfbaf5855aa1d3dc7f3f3e7aaa91f325dc4037c3556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f7ffbed8a3d963a65b49baefb3bd10
SHA16e1ddf3bd835345de8b9bbc80c251b39b2718e83
SHA2569a0f3598f39576d8c1710294cfd040470b1bfdddf039a8c6e61fde074cac76af
SHA512b726a43b34b0d2187dd425ba466d599685bf1f2b963e675e2db41e059863dc4d8ffcde386ab61bae9ae433baff023a50340f102de0ea28138afa70208815a353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b07b27f95a33b58d34c3b6dfb60ef4
SHA1d8c0bd4418f973827c111a3b7bad143abb9c66ec
SHA25676281c26c398768cddd968615028f5ace1c40ed13f4fc134d055a5dbd6bf89e6
SHA5123bac6221dda4c86bf266106d213382f2db4637a5d79440cfd2f260848c756783d625e8257cdd00ce4af93de62cc0edd5a53c4e9b9e369d1e261d1ba4a330ab34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e893f1b221fb829b92de88bcbd5b98
SHA112c20b39df3e39f05ce8987989527427b6cdba93
SHA256f40ca804e923a5d07ce558c839089d8c95f0fcb5c59841462fb6334dd5bcfb19
SHA512ab7ed1a5045c7c44931eb6b95537f6127c35c4b47fd09776722d5f47b0242ce49ac27ab2681394ec40507f6bfad22e018e45a0c36979207cc57812884beaf04b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb093978fbeb12090fc8fcde4cee295
SHA1d8f31f0162aeb52b04144827c3e92bfbaf07454e
SHA2568f50f05d3d939a319adcafa4a7b5eebd4b0796c02d47d9ce8f106a5246bd9c01
SHA51212ef1869f0101a3d6c1d8adb1a384a78377485c518b39644ca12acc5132ef05176b11af1a71095c47a9ec02472ac8ea5564262b6c12292e838285dd462db930b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a7423c163a5075f0caa1a66e733399
SHA16b9c1ddecdf7c9f77b270f781981de9c61dd92ef
SHA256c8fb5df661d4908c6401fcd0485cbab56694232593967830ceb5292b98ac4c6d
SHA51248054b8e560cec58dcf5d0cf3a11bd25ec02a3134d6f4ae10ee6ae2a14c7e072f7fd38b080f0828b1ce22c8e27a1de3e4943e1a5c2961aa885df8c2b2c14aa4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5413aad30eba171fe310d5229a2d266a7
SHA1ac101eef40edbd599fb708a9e64fa0519336c8f6
SHA25610d1ad831c01b2d1bab7817f93dceaa9c455fd7722b17e73666fd2bda859a3eb
SHA5128900439b040740177b06519dba9c2b5f5dd6d31169a656e7f645a802a7bb96f21b7144db7f597dedaa227e901580dbceaa83d460bbafee2acc4293c70e72cf35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd054fe2b2c9175fdc9761eded99931
SHA1a35e511e7f6a62355667364bc706938716ca5614
SHA2562a9b1bde3c01ff21870775f0ebf9495ec8c26fedf71731c60821856014c30c68
SHA512e5aae8c9df5e2ff1067eb3f2292a13d250ad3a6662851c771383166c57daaeffa51022c2ee0a64846ae678627443f8d4294723f75e4d8d1104f1159455523e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4ae7ee8622b806300ac21e6a09a281
SHA1438184a27a820207e4fad417a3e73a900610a689
SHA256e8542810fcb740e43358245fa421fdf82af4ca72c260857d5d2880d9ae942959
SHA512db6ff4bb8a183a56e8a2e9a984c36d685ea93723cafb9bd7717d8da54202ef99bc983796b26b3e82e030f9a41f7aa723b72c70f92659b3053d8bdebf235480a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efea16775a28f65004a4651a39b826fb
SHA1a7595523d722f5b974b041eb61a0370bf939fe5e
SHA256a71e199211a0c768b0b4c6fb5eff29967eafe0d7e3cd408103324f8cf9a2f95e
SHA512c55e62ecfc91f2582b8731bf7d395e44716f890169e7eae6e69de43f144f361815e1a7294603bab7cfd0733147945e16c0c0b261561dc8ecaaafeb3d1d449165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c65882df3bcbadd96714e06c2562478
SHA1d0d096a01a3fbe60e04a2b97d33d50ad8cd92367
SHA256f9df8b3e96c916ab71a2ad93511729aca3305fced8b25bc5f83a00118cd47773
SHA5121e3bd677ba291eafbb6681582ddb94318f135d4a3e7bf033775b948d94e339878c32e6f15046f8ca91f0c340798295b156ec618140b7ffbf8f56867a4a3b1769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe833ddf74605c6f3991d7002c8ecfd
SHA1c1cc5d3987afb61cf33f84c4b0504ffc0c0aa039
SHA256192a70e7ed6606917489268a154298760c53fda01ff0fc3d2dc872e6cd1da6df
SHA512614d4d03800be0d872afe94e9aacc96d6fa3b950bd7019fc330ab1fa3b9383ecf67b2cd58afc6e694e93f0d71bedd47df30d2aeba9fdff9f35154aa145f75cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50445abf2636385dd4a4614e41a1b554b
SHA1417b19488b69f0a09e83559d0901b544ed065211
SHA2564619c49684446f16f35724b3999ab99d752eb8f14eaf04ee0e4603c6f51a851f
SHA51265bf9e3989f9a8a721480fff05a99f45b36baf190566f0b22aaa627f44799ffbd3c4e5bd0da6269185e3332deebf20a703b645d7bb0ab7317fafecf28d1042c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b