Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
177KB
-
MD5
647e8be91abc9f046771b5f8f358f43f
-
SHA1
69b312338fd4f8508f7ef6945ff8a8a357519512
-
SHA256
60c10940b7fb591eb8797b3ac409e6e82c70878884631815a379cab32843629d
-
SHA512
2b73814342121c3844bb8cd3cca6c912bec673b1aaf52e246a0236344c728dbf365db352fe2cb7bd50466d2d9544cbad2fadf67bcbc2f083f6c27d4fda7af4d3
-
SSDEEP
1536:CBxHKjmvxdAOXJzd1mm+Wgkc30+RowVoXasflx6YxxiQDOOTLL:SxHKjMxKOrpgNYeUv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433443553" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000004559f356fa00a2b3c1394b4aa1246d3c5bffdd769561fe6b6abb91d8c0c05e32000000000e800000000200002000000070f845783b7ea4f0ac2eb3021fcbe65b551e53065c1584350fed92097185edc5200000000ed90ec618f6c4b9072c98e530013833b9d9527f3c3cd0a72e7bcdee40bbce2c40000000a86946bc8fcce60b0d4949356a825b49756e24e8572abbd8b4dfa6e8625efc083b59d458d608d2ff088b1f3c8e018cbe8e9edd4183ae2caac098e62c2cbe8074 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05ca337680fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23387671-7B5B-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2432 2428 iexplore.exe 29 PID 2428 wrote to memory of 2432 2428 iexplore.exe 29 PID 2428 wrote to memory of 2432 2428 iexplore.exe 29 PID 2428 wrote to memory of 2432 2428 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51a84d7c4e4a8b00c92b313389bf847
SHA1d7a8bfbdbf74b600b78b58eefd6278fa2b5e0fa4
SHA2560a89c0c9a86844543fea2023ad6c4679019515a097d58c20ffe345e182ff7c65
SHA5126c1e19369e96a2323b4edf666bd192f41b271d0fccac6f2db63542300573664d6ac51cdbb700088f8e1017627949ca1a987d39642dc9f1da1a298346d2068de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f255ef4df49bf0ac7476bca609ffc6f
SHA1bfd08379e95ec1b59fa9d0e1c81663183324e0bf
SHA256f245b56093854e7cda9f3e75f4a07856f188ebc8fedd713bef8af80e0a7e3e9e
SHA512f9e6d3165fdb55f0971d35ac588a3517fd2ffbecca7e9fffc78da479a9de97404171f73f793786f7326cca30e030a053e3312d9b4fb4cdc2437f1fd435d80802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb6aed6e053c0bf00483554bc0889a7
SHA109d6cbc4c8bbb6d7f4210b42c288c10734d3f983
SHA256e5cfe2f8b413b7309e93e1dffb25a8f0d2af4ecf74340e24e86f7d9ff2c202b3
SHA51295fb56271ed7189c8187fcfc93a3ca19d8c9e552e25f4ecffd94080114234e9bc009209f1b0d8bd19036f9533f1d358a2f8fec090444f0c7106362eb69b1f117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd517cd0bfe6a4d74dd1cb121b8873a
SHA1407631424456ede6bf2d6c9707843cd6453345bd
SHA256b57e8d6266b5940a3fb97381407a249e810d756c7814577426ca66fd1602fde4
SHA512befeb5e786fc81311e48fb325f9627deb2457c1764afbcdec5da31a43f974fb96576a61bb004a93d3809bb941bd616048f34bd95324d67519dd188e1a01a8b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4d4fdbd2d4aac9540a0db21424b5cd
SHA168052c026b7e45a6fd0fcd08c409f08fd195db64
SHA2562da00051b7ff5caa21b1457109b02a767bf9daa8f465a67eb9d7821596ecde3e
SHA512328299f3fc78fd5b87177e4f4d460b1831f53ad2680963362a6b63af020e929f69458ff82197de9d7d22b96263d46a0690e5737c4dbf455751b9fe7e2b7c5b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e069d452e1fe75f708a0b8648d8cb8c
SHA13261d02acc63cf6f727860c9a8190e621033e21c
SHA256a568eae69f99e41cfbd5503dc00f60195d73d6734d1728901ebb6432b3164dd1
SHA512ce706187816e8d0a6643879d39abd4a297bd50db8bdcff81a10a35dad27e05a4ff8b9d9da3954a953e9f5adfa9b8f6b4e4668e485c5ffee3713914c9f4cfaa05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86a7e11b7471d3adff851d5a43a1e06
SHA17c3e08f636f30d2a58c886f38a21ae7c51c364eb
SHA256b80af326993ee9af0107b4ced2da1e9abc3671fc1995f7bf3f56002d76079a58
SHA5127528d446ef0094f9117d8177d5e12cb5a0695d84053a30ba5a85c9ecb762c8a105eac7752f4f61fc7d77ec71bea1fdaad79a4060cf74922483dba3c617d0ac4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52950e72d9832a5ee9e42885ae6830d8e
SHA131726d7dec673d445d5ec7447da84e2f555cd05a
SHA256a7d5a9263e56a8d1dee691713c66e0472face19277b6358ab9a7fb0b8b06b8e5
SHA51259896fb0d13ddb9b84f7b73aaf57a2d3016168d8aa02ebfe873e89c73acda316d2c3962b631f32d39eb1a298153a031a798bcaf2e199be522f0b4cbcdf91c10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389a5828833ce4ccdabbb7c35102b666
SHA1ee86a5e0ae6a8f0a5745fa2e455b68cca1f37caa
SHA25691a7acae7b889ad9c8764ef48ccec450b445cca4e9e3dda1afb7da14f15a3ad0
SHA512c65936cc1f516e268d000bbc96e541179b4e4424c1bbecf2e831b10723a4d2e3aa4268e586b05d3ca168df5b9e8615e57e3480a0f6d702ce79fae958855e804e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b833e4ca9529c135840a21c6a9fe3f4a
SHA17e8e1d806915d8ac6b2d6232a06eff54b824b66a
SHA25698ff91c9bd347ff014e9a3e5f76e75d5b60b627212a16fc9ab48e7df7c0a4404
SHA512597b50e24b6ea59d48f38cc9515c108238ea81a307eb97bb9adb0cebc7030556cac0566ee4a9a254d6f768272e8e57da6071510ff5176fa3732172329d3e2236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a9f310a58b33730a7c5ae07ecead3be
SHA177d0b7281aa8be165b210ee0a1476df48321a255
SHA25661f2cf2f0762ced8d23cea9caf30e9edc80e2039a2ee8be0f093e72e8b6b345b
SHA512f891c890163ea5ca0f8fea8830c68b54d1956b836c7a85b4957aff6b4fb1abef4ff800d549c592e4a58448b9259288520f8fff1d9fc4fb3f8cfb23e4b37debcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6971c44861a531e8329f19ae8794e0
SHA17ad9b2b42f68851300fee2362b1ecfa4cac04335
SHA256b054cae81279dcbe012e03a37da45a5b00b80b68c5d30e7d1acc9745e0a4e9af
SHA512ca898bcae9052a76287c3104cb060ae4406235a1e15f18d4deb693d96961c65899860db8e9ddc8d4a2bad437d27765876f0c628bf2e5779c749aec6ad4012467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3a131255523a18e045af0dea1021bd
SHA1cff3cd32aebbd1ef08467c917616ae023acb39c4
SHA256ac528a02bdd6e8f5df878d18c75b7e97c62f323a8769416cf2b654159645a630
SHA5128764edd022104295b68e456b653b1a258759e2e8213262e406490ef69ba15fa52546c904d25749d668a9909a09cc33a02e9dc491b812d6844d50fefdb66518a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c38e1cd46eec686aac0c30bc6964c6a
SHA16793d8fa06277cd8f9777bbe114bee44094d5e8e
SHA2562e795d022756b096e819b10ba6f42e5087bc7e3e9c47c9e41a8bcdd16d008f07
SHA512f5dcaf88f902ce5df7b18b9e68103688f33f1f5a8a3b1539ebc7b5e3c8e7c59f19aea67d49a5d19c35aa9cc6b18d39223cf1c316df88bff7c0d934ac70f4b0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e200741cef6c11f7b4dbcc2c20c534c
SHA14a7ec9957037b14322cea810f75d408b86b576fd
SHA256acb89b5d3886aa0164bcb4b0e534e8f031d6744c22c4f5c6b9ad320b6cf1f85f
SHA5125df3e6111f9573b0624bc6c58af6a1d5e38f4118e18e775c27d80f26156fe8a1650d30b9eb16947cda72f508ebd06cb5b69c9aa21f3257d976112d642a07334d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5ec213f8582bb792fe1829c38af5f1
SHA143f60ad5f59bae29e8e2d4d0271ccc6f69b9bbc6
SHA25614994319133ebca51b43283f8430717bcb6c6d5c0f84fc60e6ae5700008626ff
SHA512bb8a1dcc605c4e10414d6e24b2450fdf07c00ca854820cf405ad2a256c77d9bfb5648cdfa960c1824d72a83c45a12986f87d55409b61e7cbe048d7fb5bcc40f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b