Analysis
-
max time kernel
154s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
AT000005112563923.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AT000005112563923.html
Resource
win10v2004-20240802-en
General
-
Target
AT000005112563923.html
-
Size
335KB
-
MD5
46e2e4f986de87356f85431a7dd20ab4
-
SHA1
0ec25cd81cb6b908d76e42e30f181f06c770d137
-
SHA256
c19ca3264f8f5c4d8194c8844f77951693bfec24ee2af41fadcc2b396ff4f30b
-
SHA512
dbeaa42fef22b0cb057ada4055f0c6b4a6962d5a7039e85dc74d8864fa3e14c24a0ae75dae84c22f6fc0bc0fbb95be25ee06a688a65a5094ecea9e596d3e4a74
-
SSDEEP
6144:PP1WE6z4vp8Xi5bC3n3pwnj/8EFNs0HqDM3C61lJRczCfCPZQfy4rIt2ASuzU:FWnUvyi50kNsNYC61nRcGfChV84Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432907738" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000301df9e33e902c609623cae8c8929d3547241e0d7c4eedf65e2364fb4dd39e0e000000000e800000000200002000000010fff5840b40b6221c78fbb51451fb2d09dddf3eb9410f4af0eeb07a24328d06200000000f1aff0addf610593ea9ecf377584e8e48d065027a11a08198572c656c5acf01400000008be509a87c8765a711231ac62330ec2da363fd491ce67be2e7ee3092efd8987b77b088e8b5aeaef8e23001d30d9ac25041571b6718d69e256a5528b4b9d886c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99AA6A01-767B-11EF-B221-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606d3b6e880adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2680 3032 iexplore.exe 30 PID 3032 wrote to memory of 2680 3032 iexplore.exe 30 PID 3032 wrote to memory of 2680 3032 iexplore.exe 30 PID 3032 wrote to memory of 2680 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\AT000005112563923.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1ec5701a7cffa8e5db58c35f1313b6
SHA1f9071f7687cf79b0b16fd251348f748a7e0787c9
SHA256c285b746c0b247214ab6e01b2864a464ee2f523d1bdfea19172ea603ab2a5fa3
SHA512fdc71f795fe07aed2e7f797489087f77e4ea8deb2a3f3f25f784e891eb679e600c3cccdbea50364e690342f8380b934584fa404a0154c2741720362a7d9f8800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc68868376c46c85eec1b3b685a2209
SHA135e6553ae2bea065f385a44601a92717f18bbc30
SHA256c619e25081295bd32493259d93c0e96958184c42dffe02ab8aedae858b488b5f
SHA512f72290da2f1e4f9982e07b368fdf2d8bba3f6bad10290b0695eb01b18543ba087dd711d25432b2530521fe8d6753b62794b29ee919c39cd867ab7de6b70d6d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b3741ec7b0feed425af7d449c74094
SHA176742a0fd5810c565eb1cced2fa0e44a08b8d04a
SHA2561ae64b3d67a3007566bec0f57cd3358152494ce6349f618cd21473db5a5ac0ab
SHA512016d2f8b633313551464a7aa250859fc026332d24fcbc9466922a270a06e21713f27a7774ac781afde11004bf861b16b850c24ce371f6fef08cbc91b3097a64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f412154689f26632d79f660127937bd
SHA1bf52ec15260b508f8b0d8d1fc3e2503431b99745
SHA256e3fcda9f272832e6bea58c5d5b09f3d37855ca0b5bf55f18576a2a133880bde8
SHA51253d7a36036c58340953f5e766d91b4a6b3431f1f525d20592b45a1edb15f9419714856f36e1d773645f9eb79f3ba840a83c54cfdd8e3f58b472cb219c329f656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772b57671e0280faf18c895d6078e0d6
SHA1cb82a83d70e561fbe65f788d7324ef7a5957eb6d
SHA256c97c043056854776c0ce5c1cb91175b6741ea2c94683fc5f85b1bf54aa12fdf4
SHA512af930ee0d1e2990e10f9592f6cbda2a7a2546f9fb8c9b32e90de9a7511503bfad5ef260ba088ab01340bcffff2d9beab2cfa319d955896eecc1c0c6ccc785ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ef5e48ec1d02c540bc000f7bb8fc40
SHA10e0967d8216ea933fb33139208de8ef560917eee
SHA256f67e2fbcfb14581149f6961cd0eb200d919916ad8246657a58bdcadda1a70287
SHA51289a6367a36756ba57443ff58fb45335b964af087b8a2d931ebbfe42b4ccc5a0f4e3b2f4d9cd5771271f24cd2d0ad347019775a5855f5f06019df7c5487b8895b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e926f8a0aeec0c67dece54c48fbab79
SHA11e21c1e430768fab2aaaaf68ee7b3b81cfc2308e
SHA256e0a7d7e991e3903c9090a2bf0c5a86a96e292f7a2f2dfc04052e8b225b572137
SHA5124f684b105f73bd7185a48d81975a87249446f5d428652fc6e7a2f0fcbd8c69b6fdd93f548987990c730419c4e4917558479feb0e8bb9c8bf4feb59f559758039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351d4d83ccbe62b6f3fe5b1a942357b6
SHA161efb08d6b3017c64c5b69961310dc7b153e65fa
SHA2565a206bb1c9dd89e50e9fbce115d63c67ba3cb5da9413aa10b02197590e2ad52a
SHA51292bc45f2a2f9229252a925ab8ace54bfd9e4d7666cd92c78bce49e4a720f72fb150b091f1af93d105f56efe07c8491a54a47d99dc0dc753c95a6be1c75fa8f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4346e0357b5ed64cd9b0a42dcbd7f6
SHA1160a49e07c6edae82fa93f612bf4e254e1151158
SHA256ead1f8232922b43c483d68e94e2b69bbcdcb6161021e1960b7ba7e5a0876c9f0
SHA5129814a8cbb2450eba1b759109d196501c480914079c24cd440254d8073b5b513dc9cf85dac8f6512ba5fec9c668a74ba84dcc2a1513a358faededf1975f55d6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163b73710680f6c735e0cb33a59876fa
SHA1cb768fb7075269c695676a35d34760bda3040cdb
SHA256c95a27c92f5b61fc78fabd614e2ad0dfc59158f8d9727437bfb790e60f620312
SHA512f19952090a9a33a65f197388b42b4cb1c28c549225e1caa01ff8d2dceeaa189735af71865b7fe67ba7e51e2a5744d01847c05eee864674ad8eb3e1648411b6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565b9dc4fcbb33d43a56e648ffb71586
SHA152d423d4af318631111eadc54957a34bfc01f748
SHA256eb6224578e6b139e0e6ceec0eda3a7511aa329d09c9e7c4cc2c493aad62458b3
SHA5123ee87043639380551aa3a015f8664318277f08a7f6c4657109cf259fb7db2a7534f453776958b86c5e828e5e88d7dca823b1c07304ce74582006600f10a17754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb498dd4307c3389da6b59bd24362f8f
SHA1f5948d062d475befff2948c80137c3f6148eca56
SHA2564b3032350fdf6a548ceaa2d1cb69c1765809648929d9287438359cbe5093f34f
SHA5126ece7a5f8538af2cd8da8112951d8b8569bf35e91af91caeeee9de188feb6a895640758b6faa1b638da156ca5af740398e38250257e90469a73e77299cfc92e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff255c2e2128509d27530583981d66d
SHA11fd996a4b142cc087856425e5516d0435a5eb099
SHA256b5c959abca4a3fb4014e078710e0758f6d56771ae44a035f3436482eaf048f85
SHA51297e33675f678870163474d300f044a4b82b3751c49763ae7622c85ced0c10adc744c9db4e6917d7fda315cba826d79572e44a8573f1f9d843af464eb85320c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dee303262b84f1e01e84a0785523735
SHA1d415a92aad2b01aaad9ca9bb6a01ec969208204a
SHA256e701b5dba9f181c2c64695c35ea487c7c182e3e2495666aefb044a292dde2ed0
SHA5124c2e278cef09bd80d26b9a467fcaa587ef187ab9cb18838f75d9661309e0d397b99858b1b67ff183703ef98b5e5f210158d2756dbffc78e2b850756d2b1c6800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db32733ef24221875e97afbe11d96a14
SHA109d6734d1e42f1fb0479cb8b6fd96650929339b5
SHA25677dc02ee5a1d005a68a1c37bb6e2dfe0d8e9b535ff08168c2f695b24eb75e42d
SHA512cfc3557b93d3752c0a261ac17d9dbe1b2a5f812b504f0b38256752cc8ff9aa9412fc63d20dfb05c14158e9e76a93d722c7e3349c4195a62b7b60b2a0b5d5970c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2db902fe529f7d1b0973d8d63ee23c
SHA1c01bbd9e6a1d3ef945814df124775c7443220fbf
SHA2560a23b27d439d2b3c415675b529e25d2afc45d4c470ba565b012058895a20e787
SHA5129c71f425e60365fa0aa80832788425b9bdfba844bd2f2b0e1fd16cecf341bb0da7f43e0be7c24bafe2731fa717590a9f1266a6eaf40bde6c5020063e00f18d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a3597e827462add499729306cee6bc
SHA1a9653ddeb8a063df607ff015c6e74a2b824b5aa4
SHA256ea03a36776d4c520a771e8ee212f8931af6701ed6dbf33bcd394d69ea98e3d34
SHA512dba0b26aba51d6f624bb9e2e09542de00ed2896e1234649a94f012c8df19aa8f12a00d46df24dc9b8c3ecc50adf08f42cb18d9061e6337a54974662d114743aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded6eee2665933a393228482c35afb18
SHA11db2a4afca8de90f231d87ca614f37c9594b4605
SHA256424f175e917e419cd57aacb65caa6715b604906dac8dd839bd0514bb5ed64d7e
SHA51257b0b9f74e98a442573a4cdc09d5affb7a019ef516b79ab4b52a0b1f3305b33decae4fa8d258fe481d21a02622c924a57e0fd9d14d9327c1ffe3958f5d605763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df06749b734d96e7324ff1565a58d73
SHA1e487c58803a0fb37a3a2176cca84a8105a8af74c
SHA25605bc1f892fe89a03e20c49651ce36d1491748e14b2ce8378dec4a9acf91d745e
SHA51236e7132722c3f8742942f828dc8fc8d6ecdc6756d4a6eb1a2dd9afde7e8a6d12dd4d0159b4b2547768c34a0cb8e4c0e1c6e886532b9f3c015ebf531c2cd4a251
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b