Analysis
-
max time kernel
119s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
ba9c7963c60cacb70b16cc0a4003f95391c6adfd7dc45e72a8ef39af6d674972N.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba9c7963c60cacb70b16cc0a4003f95391c6adfd7dc45e72a8ef39af6d674972N.html
Resource
win10v2004-20240802-en
General
-
Target
ba9c7963c60cacb70b16cc0a4003f95391c6adfd7dc45e72a8ef39af6d674972N.html
-
Size
1KB
-
MD5
e654720f60fad04a6e0fe8ce60d2fd50
-
SHA1
63874c4ee8f9a8c7712b3c76c4024d4ef5473b44
-
SHA256
ba9c7963c60cacb70b16cc0a4003f95391c6adfd7dc45e72a8ef39af6d674972
-
SHA512
c536cac7e5e9ca26ce24c1b105b98204987999c468a1c66d80c3c73d4ab2ab55258dd7d3248e9e58c95bb37dc8e390c71092e3f2936549c41d2da112779353e8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000066247306efac158a3cdbfcba945d19e198e962ebeac7ff268074b5a6a4b2ecc7000000000e800000000200002000000053cd015bdd223220fe5f40fb2a0226baf8c5fd9e2d66f38e31523b727601fbba20000000139a62e22ab699c379e686cace41c62afa93747f920324e4f61538b84872b9d040000000a1bc54b90c47238f1de447b08d7a861fb122e57f17aae74ff11ebb8f672a240926c1e143b5ec84f035df1985508370ad8b22aeacf31d867519eac378245a32d0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432928056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50db91bcb70adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E81D8F81-76AA-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2796 2172 iexplore.exe 31 PID 2172 wrote to memory of 2796 2172 iexplore.exe 31 PID 2172 wrote to memory of 2796 2172 iexplore.exe 31 PID 2172 wrote to memory of 2796 2172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba9c7963c60cacb70b16cc0a4003f95391c6adfd7dc45e72a8ef39af6d674972N.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8077bea949228971143730a539e641
SHA15d3d5dab7c6a64d1d88c7396b824a9a76844312f
SHA2565806bfb044f15402c3ef093f073ed7dbd495fbd32a5ff396e449a7cf00359a52
SHA512aa844927858051b2e5031d86e589ae35ab3d15f70f773d9b12f1e4fad2437daa3f9f69dc5e0507f0f6951847fb7be2ee772dca592de9d274a1c1b443cc780573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573597e77f8d916188e4fc6ca163ba4df
SHA1a0c1542411a8d53c9f483abb8ffee28de1095e17
SHA256132bbaca3c3473f0f9e3850704459a1f19bb19a5bbd40a6c741def9faba0469b
SHA5123e47fbd622d0c23561605cd2817112e559e7bd90814bf553b3b38d45db03d99884c7161773ba7687729fa34d5bd2905e7d4eab1779a3cbb6ddc1a9bf9f9f7864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57372bf4306c4a192c88f9d61aae56896
SHA1b2130f815d4d6ab70c171747e43ae5dcaa777efa
SHA25657b93ed37cb00cceba0cfbb03bd0d2ed500719701e6a107612928ca17fdc7e48
SHA512fc7b51d41a217bb707346bbf90e45783dd2fd8eb91b7f5a96ae621f2e9e1f3e32ea7d17d2107f85fec4c628adf8b0d82e3785044b5a74a78b1254ffb198d36f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5de945dc62b828f69519bb0e33570d
SHA1b75cff947e80072d2dc2c5e65660652a45e2ddb9
SHA25656a055d9d854c3b362eb7658196a33d7cc1817d41cfe3c9a1a648394ebfec853
SHA512e7f5ca75bdae6cdf8758b5bb11185f4c9312a77b1f6753de1eb109d0ff4333d125a927b19fafa66cc63094846045de83c3f1bc26441529597d643fb560c9f58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9595d09c96f4771674670fcebd8e57
SHA1e59b5ce0ef2abc5403e198cbd9f50180b16c6149
SHA2566b3a726ec0c3b40cd666db63f3ee479a563b9d6ba5db291d1dd55e19a6c719ba
SHA5120b85ec0f499da51b6ae5c959025fc1899bbc874294ab25ad6abfc5e11ac1153200a973bba23eb8e02c3ee7bcf529041dbf9039b1fcdd966acb4bc60754ba4c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7eb987e19a7230ec6407720eb98ac9
SHA13b42c21f1578660f66e470606421e7d7425d1290
SHA2566fa043a256ae0fdc1ab22a6cc7184b7e7c69cbeb122fa7be86a81aad93bff094
SHA512028b9b3cf60aec7180c93da1a7956a7ed7fb8b21c8b70da9ec8d2de3c70a976fd4577e9806b02ae1a1325f70a24316fc80df5401b845d21f765dbf620677b032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dfba36fbbeccd3fb87bb36dddd2f6ea
SHA1bd9e6aa6844bbb43f7c524976b20503dd94ace82
SHA2569735b39d5f5a051fb0242a6591e242d3078e957ad11927bff8ee31950b63cfa1
SHA512aca38e523d685712285636d79a84f6cb00db42b348d8a8a29ecd7be7ced7f3d8fbe285d92f0bcb8b5b94069989fe1b056e3034e880f60b02c482725f05d6e04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1597c9e10cd9c87a0e91a1d4fab2fc5
SHA180f00ab215ed84c7febbbf924ef3da5cca84fb6c
SHA256eb1449dc3a4d0cf831b00fb797c679f6c938a833a80db6a994000f7a595b3774
SHA512a775d6e61640b7a74be5ba36a69e99ecb43842ace780059fc98a267177dff5222258124b45e46b9ec14fcf64d32e3558f025b01aec86cf9b3733383c8dbbe422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532bd5d44bdd1d5e3309327ee3e215deb
SHA10848fe0525dabccb6fa020b4d9cd8cb42c835c7c
SHA25690b996565aa247ea264bc0449614c004c14ebf96cbca4bce736e4ebe7001f06a
SHA5128b3954fc670f08fd3284e224ee5eed03a8a66abeb778c9bf98273a22667af97579bd9b2241572089f5310ffb79950d6decb4a98c4ddc583654d3c36def06b489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160b129a7cceb2a9c7c64940374146d9
SHA152d1f21355b76a18feca052e3d112d4704bad470
SHA25609c9766943da803fc22b4dbd989bf80b08629060168e912ecccb6c0d5403393a
SHA512d94e8fc5dd71d0914dcc478bb084f992965df6f935865803976f752be1404d043706f54beec1496d2a91ceb50ed358f708db0410300f1313202b1a54461cef93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d1da9fab5a93cbbf8cde7c370dc564
SHA175cfc1d258d6c301a6eb5afb143bf3ee4952fea6
SHA256c970cda6124d2d683ffad97bb852f1941ebabea0a6975417031b517c348127d2
SHA5121aa92ebbab11a7dae6a88fbbfdd5159c63f61409d035cff2892a80e21107ec16289548ef0b43002fd26fff9fe7ffdeadc68867985457fca70d243301e8f05d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50380f447bc693cfa8320cb775634b878
SHA14666860c3703ec6bcc0e4ae4d27de42d2ac51d17
SHA256a49cbfdfb284d5fa6e54947aab4467dacbb8feb8892301cf7f925e3e17fa7aed
SHA512a3080fade6b55c6259b99008e98405c2d4a1ddebf115a7d705f64f1c37ea8c510ec41c17b6f2ee8e89c7b7743d9f1a96acc581894407f3bce844efd1e3678505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c49b747334106157d4b0073da1e342
SHA1848749bb756fd770eede6f6070a3b9883abd5811
SHA256b6bc775ff782155a31096efd1fd3f33deba75d2c41681f23101f15e9071fb4f7
SHA51256de803d5b672866d75006b8d082abe9da6e44f4436614eb0290d5ebff8cbaf6856ff7cec6c92026a538b1e8d3b41236d23e3e2cb190512fe7f6cd03c7e8b767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7bba82b6f3cff0cd1122b84a765b454
SHA1c4e87cf398d96a98aaf0effbd43bdb1bf8888fa4
SHA256474f1fb5de1c22e4869603c95967a48fddcdbf3a307be229fd8cda4a4ab4b49e
SHA512110dcbc2f505d25a48d04b7c4fcd32b3abdad797c9685478cac6b70bfdb672eac79adb85b1dd72d04d16e792e50b3934c69fad520ea9d5b47a279097aabfd9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ccf69c710e461dd01ffcf8215d5e4a
SHA168859b2a4051534dcff5ee6b9d02d2f1edc3ef09
SHA256208fb948631b436fb19cf00875a0b9ce99ad6876b750d5c30a25eee734e78380
SHA51292deb2e95db058b4912a4cc9f4e93cc7395275df7344296fca5fc58ab1ef7a54919ec4149addd6e12f0650288341f69515726058a69a8be61d191c30a8e2eb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c9f427f0d339b925dd5d3f6cc07a94
SHA17260addb3ce2a07538df4accfa736567c72075e2
SHA2563226ce465ffde51d265af3cca455cc32264aa62782a065376442c2d11165d3e4
SHA5121fa8a46ad8583f709dfc10a937bcff56ede1a1c9f3e7826f64c6e84d4652b79714ecc2e0f0360e4f67961ec3ff1492d0e3aa0cc3be20d8ec401071dc15a8479c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1cb54478fc3f938209790fe475d414
SHA1c19a8e125541fa62f061ddc14008acd22c87d892
SHA256bcaca892bb3b7cff979c81ffb330c1227d55430b2f837d95d84a888c1a3e3632
SHA512272f25f71b462e8c72a0574a852f0a6c394ff485af2116b3a43a4cb86ce9e3c95c8709e3ee2c8e961a6377d3b0f6417e80c1b4e29bf81c49c109f7d2e9af55f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e10a6bc414fe1e2976c9b643dea5c9
SHA191e46d63e3fa3d94631d65223ef1941ae5b50c4a
SHA256023d00df0bd989f81c963bd3ae8d68ae20be5cb6eb5e067602cfa08318a457cd
SHA5128bc625959af34eb063e0f1163b946b81d5454143784faccb8fa93d8c448f44202fb01dacc8f6a1a620b189ee383fa13fb95946a3994ce90931f72c4c7e759789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854207c6524f64e9bfab4c235df63c18
SHA12b836bb709962826d6e11a7141e2280f17464888
SHA256e27b96ba26d047f788a424884cc81cb24e3ce9f9ab79368a170b3fd152b537cf
SHA512d278715325f81fb5b99650e201dee15afdf069636c6aebd04c5af23c2d16ddaa795b41eadf5e698e85ba7e1127aa3171161a915100288fc66e24df0bcd86f92c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b