Overview
overview
7Static
static
3LEGEND注�...pk.dll
windows7-x64
7LEGEND注�...pk.dll
windows10-2004-x64
7cz.htm
windows7-x64
3cz.htm
windows10-2004-x64
3js.htm
windows7-x64
3js.htm
windows10-2004-x64
3kf.htm
windows7-x64
3kf.htm
windows10-2004-x64
3xz.htm
windows7-x64
3xz.htm
windows10-2004-x64
3yuantu.htm
windows7-x64
3yuantu.htm
windows10-2004-x64
3zb.htm
windows7-x64
3zb.htm
windows10-2004-x64
3易模板.url
windows7-x64
1易模板.url
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
LEGEND注册机/1.76 连击版引擎注册/lpk.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LEGEND注册机/1.76 连击版引擎注册/lpk.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
cz.htm
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
cz.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
js.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
js.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
kf.htm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
kf.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
xz.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
xz.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
yuantu.htm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
yuantu.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
zb.htm
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
zb.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
易模板.url
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
易模板.url
Resource
win10v2004-20240802-en
General
-
Target
js.htm
-
Size
4KB
-
MD5
67d2a0acd73d340131905765dc41a9f0
-
SHA1
c90c9a1218cba9c0c2ede2b44d8693a0a3cec7dc
-
SHA256
5835356ef7da67e78d037c77059f5df6b49b324f496ce4187035a410f9c018df
-
SHA512
17867a67aec530f1758a14f7c7e2efe960bd5efad5d289ab357199bdb229ae0b3c07ef8aee7c215fe1a3e12039bf4c020273bbbe6774b08144edb6a30fe3e9de
-
SSDEEP
96:SeuKuMv9XKBso7ntTuyxF3PAUiAcAcAcAUUmJJk3tgSYqEnKviqs+7MjU:S6xuo6KUmnk3CSYLKKqs+7l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10915071740fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433448903" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000fa746d52aedd06c069b51185577a78d72930698e6be2b3e7bccc25cf64816022000000000e8000000002000020000000772366f8d6f511a48da24077a9eecce0addb5dc01e03fa7365910a157d7b1d7f200000007d8c118d2cd0d6a662190637555db0d137199dab464b58f8ac3550024b1f960d4000000016e4797415a39b80bb4e2fd3597a16f938139795e8fc64a26463c88f61ab808631e6debff8a747d1575e89c7a71dbd1643233091655abee3303e018932af09f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{989AB391-7B67-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2092 2296 iexplore.exe 30 PID 2296 wrote to memory of 2092 2296 iexplore.exe 30 PID 2296 wrote to memory of 2092 2296 iexplore.exe 30 PID 2296 wrote to memory of 2092 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\js.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871d24c23930a5f3766b95feafc57808
SHA1fed83d1a67690d9176d18a25c369b85920a5ebc0
SHA2568c9d81b065ecc9bd46d0ff86b2efd2c73659b01bcbee2b553f00b95232f6c0dd
SHA512cfa53d10f0b1561d23dbd0c3fdb49d8236ae97e5175d65c68f58fe890273b172c1da3bd4623bfceb15733d7ac5d582a87567ab8643096751672e0fc5de571b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638e32c6f91c3ae12ae5f843261b0d1c
SHA1b339dfcfb94a69b14f0150bd276392fd9fda4372
SHA256917895e560573682f06db57e30fb5bd47ce010dacdd3fd4a8ae12eca4a6c07db
SHA5120fbdd223dd0699e05fc550cf728688103c8d5fcdc28b296d19c7b738e8923ad35d940b86aa88f523811999b632721d505cfa29b9424f355cf679f175762a75da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfd2d92e652bbcf1ed3cf9a2cc94ad6
SHA11f422224a5e70759bbc141ff49f14f628e016265
SHA2569bca291e362e3afb9de7e0ffcecb24b81d60f28352a70138d89a69a7beabfad8
SHA512dfc6fb09735ddc96f718b7d0b475ad9bf26a82bfcdc51c33424f2805405f70e16e54d7d8c12ef516230ac62a7b07753afda5156d5034d30c71fbf656bebb82d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4cbdf24b1093627faadcb9a9e48fd2
SHA18b57245612a1338993b1ae70fa2227bed76b4209
SHA2562c62b98da96c273eb5fad1790bcde95f7049ac503b18c8cb61ca8d0f8c0a3ed7
SHA512d02de85923087459ab3995671fe1c8bd8bb830f783611430cb39ec457fe39aa128362ca74a344b3d9ffa157c978f12cc9e77eada03d6c0bdf09fd4b297474ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5577b3f403c9b9707baf3698aa2f7084a
SHA1015d01a8c998bcb629454ec07486336fd811c5c6
SHA256995c44493a1f188cb3cb826cb2414767cbbd66743a09ec97bbe6a13db97e61b4
SHA5120810cc81980a810d8d7ffbada3c98b2c4664e70761ac341991d25b9a5c2a39a375657da5c148649872324fc74f7217a4b650019d21d2dd9ba6b6471cf8f4b29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50fd2fb19a19e62e5cc8f937dbe9435
SHA193601d72bcc1bab43337aac419610a3154f8b9e7
SHA256efec5efc696fe16d65009dfe7835b83d2e24a65856784e398c411c245b65349f
SHA51215cfb45046ab3ad452ea0380488e3e5e794f39e99b20d266660d112dd6cc7d79478f96cb5ef1ea49f47dcf83a1aa24264294f4da39b0b73b481c57dc4498b3f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5323af90018d62d37f3c95769e796b6
SHA18cb44102e5d1beb7bfecf1877744b49747f9b46c
SHA25696d870dacea9797f6e969e4009c2ed3e786585f2711c439a28cdf768ff01ea88
SHA5123fa506b3865f5ee319d42a818f1eb22ad9836ecd2e0e059062597344f76e2dd9100498c70758e569a56484365a7fed5e001b295f0e00fdad2022d9bea78b431d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b436b8d6f4a7dfc264dc76de5e45de
SHA14c5c304d619c6921fa0e95c76b75fca6c7ed9eef
SHA25648c5d5bac6b7f85d9a751ce75cc84d3e0dbc4098f0264535af614595a0c88b63
SHA512981ebb333534811a920c73448ba3da962ff53ef695f8cb3f5a1bcc996ad431b8415a456ca687b4b2129b9623a36c1330c6a14a27602905e3a9aa6244862b1d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254fc9cc7a8f3a207c59a84a998a80d9
SHA11c1a120e1cd72ba09628dd06f132a82fc25a779b
SHA256e1b4baba6bbd4989af34b6617ea3b77955f0b40b5f8390843e57a8a1f5f7f866
SHA5127c4a5344a291fbc0e09d22af55a8f8e42c40baa76da7850497c54f13e60197bc4072370d3943535d0538cc4931d37774eff5b4c85717ea5c716da34e896b7823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d075a2a048b384c5f70e55885634155
SHA1dd01b13c0d0120936283d32224877062b441d049
SHA25636221bc2c774424e6817ee276310b297a392f64eaaa0310ea879e50c910ba9e6
SHA512964a6a2b9b5a765e7731c0af47b336c021eb07d21dbe3b4b8d0b49ceb92c7251df1dd99e3599b6112ef1d5927275a2d24b89b37b24f97479d6e2baa8acd22eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512b4d6046504ef1f3c1c69362546252d
SHA15147232784a55d34673cde6b6fc3a5075df6f29b
SHA2568812585cd68231aaf6ccff12dbc62f6e740841b5696687c85fdb7d461a39de4f
SHA5120ac256c3b5db81cfee055bf07f4a73553bfed30c828db40fa456042fa3fa7b6fc37dea668a85805a6f48991c7a7841178fad38055b89a62d97a9da9ec7eac68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa53b352c6eca881577b9e3833909f4a
SHA16b0de5230dc45f4ed462062acc644c89a3bb6ab3
SHA25601359701f595eb5b50b71a51a8b25be6a00941642bdcba6b90306f4b73785767
SHA512418f11295399f184230e56e4ccfb2a01fcdbaf66886463a8afad140894cd56d1b5805ce0e211df80bf9ac41cd8c37569db02443efd74a4f5c6dbeb7f8af54274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350087be653dd602dd3be7c94675987a
SHA155d7e5770ac180ff3c8fee24c50781f6a389e93b
SHA256ceea174ced262325f5bf81dfebb01e921b52d8a1b9ab6d4401ef7110405bf4ed
SHA5124d0d0395b17a8089e4e5b2043f64d613b681976d5d7dc45d9968c3d385924c7c554d402625067ffaba3b88591f1c0d867300948cf94c3932870a73a15c507ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c28f5c123fd2244a048c7856d35dda
SHA1eeeb2c3a6d4f35cd84f9a15c45de63a493be3432
SHA256acae6ce2d2e852e6796c151a5054c06e37e6e14a410524455275fd158bff0615
SHA512f1db8613fd1076d7515ecbdf5ba114815461fea801809063ac579c7c8efce8da0918619e9a0c92410e60d0e166e7e7f4a80a1611a0c127e7934cf30fc3ecb6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb677653351db0901ea0df1527ad6b9a
SHA12aa96c93dedceef0134412f7540179b66acf31a8
SHA2565fa3d80dce1452b39e752fad0d77890f35aee189eb4b0007790e1988aab42892
SHA512aeefa5032c875cf6a6807390f1c38c695aee249d81ed84a13e3a94faba1de5f56d3116c673ea951921c20e2b335c05680ef42064edbdd37f261d93f546a69093
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b