Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
0b233aee9031979babf1a9ce2f105ed3
-
SHA1
88006a5a7b7b282826ae5fe12589110806c748ff
-
SHA256
bd5b45d7169085611dd2657e098d44f35c1e09ec6e3f7c765fb24a39c5dc23eb
-
SHA512
f44fd7f506153aeaf80827e77c9b0c6b6c0c9fb7d13d2132bfc08e8d6763e62e965a6ff39fb6e49055dee0f94e7806790c64489d0a2be958dfa39968d61f450a
-
SSDEEP
3072:S/oK7Pm3dIlyfkMY+BES09JXAnyrZalI+YQ:S/zNQsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433572141" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88B50001-7C86-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1092 iexplore.exe 1092 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1092 wrote to memory of 2556 1092 iexplore.exe 30 PID 1092 wrote to memory of 2556 1092 iexplore.exe 30 PID 1092 wrote to memory of 2556 1092 iexplore.exe 30 PID 1092 wrote to memory of 2556 1092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f485e5310d2428081e9c71a1ef8bf9
SHA1ccb2f06946036c4c7c715bba28052f264734339c
SHA2562fa241e1a1963ea9421bf64d698cabf81f3a1c57fd698ecc352dc761680b8bb1
SHA512eacddcf3fdc420dbf464d204ceb2420913a7ededab59d6fbc7ef8f52387abd1c621f00bd282f44c68229c87803ec85d1e0f543a7e0918c8a1ea025fd8feb7889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7545b5ba6a3b222008b8df44603869
SHA1a8551469684fd78ec3b1acea2ac3f6ad3b8ffb27
SHA2563d2cb0930d82c9c401771aac7860f9d90feadb0f301f4872c255b69d9c2ddc1b
SHA512daa1028f91c5a28f340ab42624799937c0160185760076da5afe11dcc67cdf91d906e311cbb69ffa2ca3bd903c9fd08d3fb55a051571931d478aaf7b9455bedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5807085be7399172081edf0661f40f
SHA13479e1e4d3313f27b4cbb5b63a49b248a9e0c216
SHA25643ae23df47bf00e336c80e9e56d67f1c40de7df2ee4cf05bca875ddffb632726
SHA512933856e3497c49c8c0583f72f70905292db4ad42363ab8e1ec4542505d3ead1a69fc79b93a173c8dbf0103b9cf56ba0851ac71297e6ab10a20f1b7807222f9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12bdce3829df641b55ab96fceaeb272
SHA13ed768d09960535451d4ff22ad521077335ef16c
SHA256d13c36250a61ad80a218426606618f0a73c35b55854692fbacd17da786a598bc
SHA51246203c6d40f9c8faaa4d53fb8458296a3e70de4c1e4e5e6f80d04144ca903e067c6354c7f0302f5f9a604f4074a0ce40ba2eb9775619636c6d17ef97299f6d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b53db11fb4b03dac27f950272eeae2
SHA1011331cd9a34b7c618cc99753de3d5af985cacf4
SHA2561423f476fa7cc846d5d8285b2870b2487ce4a77c41dd825c66576a12d4f13e41
SHA51299f5a587bf57a6c8674f35ddda135ecf56f9e760d16100d9f1ed70141d02d927802964be0b261d635ffef6a17c16e445f594cad55b0a2c726c4a314ca1f4f667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b33dce721949e50eed93d375e2e80c9
SHA12705d61a5b37159a10786e8a11c46ec8fdb4c008
SHA256f4a7e202a4723aaed3310b6f2dfea636badad8f43dcdf39af329d518787a4d84
SHA512e2fe56b67569ca562eb8ec8aa9af9778b15fca4ed6a42e03705e286129f41082ba9d90f55fd0264cd3d60e05731007248ce4e122de5c68b566fd57a230c535b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5ab0aaa30f25a245473f2a88298b28
SHA1f20f9783865eaddd076f13ff2400a26631c8553b
SHA25635a4725dd8633c3bb9da30c48f6a19feb47cc215977f56d35b5340e0ce919e4f
SHA512d28519faa12602166492e7cd83d5c884d98cb805837f121ce60e2a453eb3763e8f18c222cea0b17d68e1c20d8f30b63946ed75800f57590b773e34d27bf3c997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d396d817ef1d65f83447df8c47eff164
SHA173604a1ce8d25f64237f8f05b9a03078dc79cf97
SHA25616e97f229f155e94e4dcab0aad8c5e2de4592947e179c0a8a20be0120d112f97
SHA51239b11bca8ae674798707dc8d02cfacbf6963cbfa90d40c92ee62ab02ddbec2438563c15dfa208d4706429a630852b5fe1ccd57bdb0c2c55b00e95dbce7a115c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3bb02e1479cc630480fa9ba10a5a0aa
SHA10ff52b6ef9478efad890457646f6549cfdd62581
SHA25630ab3717695988610046be9b43537b2a2a30aeafb36e95579e6ca1c3e48e3192
SHA51249141600fe176fbc8adffe77a66df6e0d6a58bf1e11679ecb1a5ddd742499059357b1fd99a9238fb79fa2fe75f970780df2b593cb36e005c8bfa49f3b8850fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327e26b94a49db22336878faf591f572
SHA172e1e387b1594fabf6a99abe431c5e801c4b2880
SHA256bec126c13c351dd32deceb12f8ae4f9a41757bc80d1b8fb621bc957c40d28d57
SHA5129e9c2e29307ec87a522d881cc2e40477adb2a77726d543f9357aeb52f35fa441d5e357c259fa0b6ff0f3a4ae33841f9256787e3449b1cc3ea8361a55d176ef10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c38c46a728d98827ce6436386234bac
SHA118193de2637c0deb5a0f1bd44ce0f51e09a56ae0
SHA256238796b040771d7d8c19d9733a9a908fb4332ec0e46f00f8aca360a732ab88d9
SHA5127764a24334a7e22472139d18097a5c11e5cb7362f87f4420141a7e52eb59a9ea6a73c2160aa94ba76da14d0fddf2054a894ab5fdaba667a5e0203c4f41f6c2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec7a4288380746ff0477cc1856fd90c
SHA1c126219accd912c3d96d7e6a1d576ed11e00e3b1
SHA2564785ea3ac83631feeb749df5dc7278bcdfb801354e4d09bf7a063750039113e9
SHA51207bdebf774a1f26bec8a0b1b1642e14f43cea2f1a5cd028f9a6c93f88ce630fa92d08f08f34c45140c347b4c4f78e5640b9503f3952d5b88ccd8c243feea2843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fcbd4b0db2c2959de55408b95504eb1
SHA1c5ff609ae4912771e47e510478fa10d3a58196b3
SHA256f63e95827533909abc3d209b56f1d97b5fdf375ae6aca43fb6e1012f36bdff3b
SHA51220745dd4cbe490f9cce5f73e6f59da639990ffea993ada80a8e947730ac5d348acdc70e791ae4d60b047ee62b416d40d03b3b5fe6a26681212cb003f53409155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5320d54fcde34562042166965d1d829
SHA1eb1e7155d93d63a529b902166108e886c90dbe8d
SHA256bd77b71017d8e74cd2c66131b4345c3609484ef0a9fcd1f31d236b0f4a584c7b
SHA51229b57418dfccfd04f835fb1600110c4a8f06a20136b803dd54c1c7f008b21662cc106c0ecdda32363f5782bb2723f0ec0b149dd35a7b5891e3ace093e3cebbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da7a4d042456d9bf918487f56819815c
SHA1b4a2d591837b0377e9fb5ce0426fdbd466735da7
SHA2569e4c6478cc6bd84c2a4e819047a975f541958a2c4bba97d17cb0fd38f96772d7
SHA5121a800e5134a9172bd3432e9ef26064fe8604f7282cb733710891763aa11b1cf7d6c06370ecb4daa9c5b8d848081c928e1655ec2e66edefd4b41ed379ee51c4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510db6b4b66baff81a2cd2e686bd6bce9
SHA1431cf4fb386a7af098c3c47efe49f1006fad9a16
SHA2562fb782fc81fba9f76514170d8f75b32644efabb205d9da75b6c41828bca282e3
SHA512f737abed11f563348e68253a04178627b4820009b75da4bfeeaba4022f35616735c4bb7f157d846e4669ce5e8c94db30cd913f4c8cfc3d62aab8cb53e12b903f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106999449968139317d9789b817f11ed
SHA15787d96c872c4832e3210596643ba810be872fca
SHA256b99470ad2ce2f384478abba2491bfddbd15992b39af4ccf95f64c5d5bb092fc8
SHA512dafe06965e0b7f9d719eca7535984ce63f54ac89e0d3d4ccee55a3c944172cdf3c7f891082e533cecf4d5a18688910c9bae32769e4511c9895de239d65691cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2dae4f79828e0245626b27668811a1
SHA127bed760e6c672cb2522c2fbfa4beaf3c11e52f0
SHA2565737584260bae7cbd13dd29d37f90e0352488ea0e72884ed5cb28996fd07b72f
SHA512c74ac1b865b68bed53fcdf13d672f549cea1afa867b4ff5a393ea703e180f603cfdddf74c1a8e624a6747c4be1d7cb967e8c9d68ce28659bcd10d54192d2893d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a30c81d20790aae86ea5898a2c4efe04
SHA1264ed092a37419910d4f677fcc2f0bb93ba27876
SHA256b9ded875836d704a79701e42d4a7af7afd12cc5b31e8fc1c66c2a133bdf866d8
SHA512c6289dbd45baccafc21decfdc7528777679ff8e478a12ee7028747dbcc35f9d36a7659f212d2c3109a29ba824effe941a4c02c6d5f98be6afbf79c104757ec80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd131bd35ff1a209826e15fdaadb72d
SHA1162574691665fb13573c3c7fb428f7088ad43ced
SHA25621563e8254742cd093e47fa83b15174448e840286736a8117bf790116d66be24
SHA5120e82119983469df7d284b38596f33933ccb32ab050f62c9c0e833a172059feda4f1f2af46c1a0a9d435b538221f73dfd38346f1ea600efd1165f1e0711c7b657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567cbad1433e816cec2007cc7736fe149
SHA1d47bc6a801e073fb9b75ed405bff897af9112a35
SHA2562aa51a6cfa6e3c916c84daac3327e25b614b3b3e43fd02f983ee0e5c5e42fd95
SHA512561913e04a30e52326c42c751f557cd4572927b0003c23c449c756786c66b5e3152b38c9a3e05b1d581d6fc7d0f4b0c34883b4189500cd5ee849f5a58795f655
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b