Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
149KB
-
MD5
95897b304a8fa70755c1e65b0001daac
-
SHA1
48f9fcee0e5923c707c309b6bd3ff0282146a6c0
-
SHA256
70a04a25fd2a6b0ce00ae620d21aadd94c0654d18238e6d967feab25bea27480
-
SHA512
b7ba2f2e9bc12f1ecced9e52fc08d6c5ce64fd01248ce4f1b4737dee3f0770d303447b9e8ec728b608678142e9e75ce2b85b89d7a153197af4a1f537ae4c0d72
-
SSDEEP
768:Sq53RvDCjSJD2sZqf7FKFwlqGmP6uhmL+EiGsVZJ:SqNFDScrZqf7oSlHoYaEVsd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433693479" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C65BF01-7DA1-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1058fce0ad11db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a6f3e25615d104026f2c1e8c93fa5b528a01fba896ebe66cd31a6d1309b62641000000000e8000000002000020000000475adc8cbc15b61e1e67c4cd05137aa769a1ccdb3a7cc90458ca03d7ffaeee3d90000000f44d1542138aa55a2394f8599f6190594e81c725c78b00ff45fe542ebdb793caf126ee8caa9f644545c23e0e9814de9bcc195c99e73ed75e9489c4b8df47f5b35b64ee549008ddbfa7dbba909346da9ed01515fedf7e9a579a3015ca0183e284dde1cd57e6a744fb5e46c033c9464732b8ab569fe47d2b0cb3491460ba294a9eb2c6578c98f34283b2c36b0214bc4931400000002bee359c4cee8d57378ed75e98405119333ccfcbfc0269a517fac9c1dae45a21b490680ac9c865212bb672a7eb3ab78ccaf98a4cad732941bb27a29a7e9522ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000942b1cd32538cfcddb74fb2df829b3f979643325cd3f59a116115dcd63aa73f2000000000e80000000020000200000009616e68660c014935df9e6796619fa8b091d38a355dae95610410d430bdf6b94200000007a5d0e17f11bd38123a011a75630edf8e38be25aa6389f80663d1c6376e721ae40000000adf23ad7f608649a6130eb7fc77ba760c6d2741f28a4290e9fcf2c5d3c0c030e10df5973e00410c9a613b1d1e353c6b2fb6823fae788598d45410cfcf8f72bcc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2800 1152 iexplore.exe 31 PID 1152 wrote to memory of 2800 1152 iexplore.exe 31 PID 1152 wrote to memory of 2800 1152 iexplore.exe 31 PID 1152 wrote to memory of 2800 1152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e401837302550b1499d3c9f340f601
SHA14d09c2214f8532982ebcc0eb535c49f48850a131
SHA2568ff9f629dd509628d907347654b9d43a34c2bc15891e2894b19217233ffff80e
SHA51249703d56eff8d3bb1f775eefe01dd471574608e5336558d97efcbbe4824181eb301d667242f2418b8551ec2985e8c511ae5a31520ce3e5f88bba1a30faeff080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d716db5966cda019ec0eb10390e7058
SHA1053afd69d8cfabb8ce6a2d11ab11d98d15f49dbd
SHA2569df80c2f9fa0f590eb015b41f1b1ccad993de9f0a0b02a884e2d6266e11cf4c4
SHA512cd932fd38551bfb431ffeaf70991e742bdaa14d24244aaa2afa08f9a3c52f4faa55ed63a00390c5227256097a6d83edfb998a059485f5266cecdf3f901dc979f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ea9acaac7ef8dda0af148dc9040856
SHA1fd730a337071bddb8d93202ed6729698f6ceacb8
SHA2560f87409727d6f786339c594410d972f8baeceb4435e1657de32d2a88a407064c
SHA512843ead95bc881ccde330281b3a158fe34e24450c822f06c706d542f222ce2ead2027437b58b421aac2bb0237292757fd6a2dd5bf9abd0b328ff6d3d505db8be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59deb79c629e2ac8822ba9e23ff11f4b1
SHA18720bdcaf7aa31fb0a9f9fbd6a917f753ce133a6
SHA25643ca85604fbef1f7df81fa37d506acc0715fecdfb66b9a4f6360fa3bdeea8a5f
SHA51243663f6a647af35da01c0956f132fe7d72307cb438ae25acacd9d2456538b9ace3d0b1b1bf199efc29fc037d09eec90504287dec5d3bc215728894b39a0dcaf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56973228e128479434e5bf89f31665167
SHA1af4ec53025e725c88f05498214aa0ecfaed931e8
SHA256ff075b1c7a56eb776b9da3d53e84b7301af517f63d9a0a3dce9299f6ab0c4cb2
SHA512d5b74bd84344348b2b1db51795fade57ce0dbac10997a9c6027bc1e629ad86bf7f9762f623c5f9519428c10711d10ee8f16523eaac02939bb580bfd1bae0554f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe19d3db28058c774f5c8c1d9a02cd97
SHA18d79c3d522a2e814dd44c4c538f05a67389438de
SHA256fe667e02d7c4a5401af0393abd9cdf561480810319669b39bf196ba8ef084624
SHA5127e8930ceb3dece8529a2bf5e9e304be10a91bfc10e214f25aeea4f9fdb5876a1cf469af6430190f9311973870f1c537f4dca935200ddd2328f935ab956074d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bec8b5f6990901d6b16a89ab064aab8
SHA1408985ea89bf165ac2fffdfd17f89bd5a2b44ba2
SHA256fbf92608f5cc1517b057e9be2ec5a0a9a96503857f7e674a7464de734b2a946a
SHA51201f217e318147cf4c089d2eaa98b9bd3fc02c98b1cdcc4d243e4f40972ba3350f7f26adbc8b9d833f7f797ffa6caba0e03c271aa49be04d362844e02cb0de239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59900d2cc7cfa74af4d0b77a62e1067b0
SHA167e5e88583b3fcab6533e1ded688dcdae9a9741e
SHA2566c1cb7ad05ab5e926a3f519ed07312b8fa42798c6f528e4bc4cbfb93b303c70d
SHA5122b154b6ec7f78229aaefdaa9fcbe69443a5432fea72e88caee5485cf9a0d4444380544be2db8653693a9d6247dee7e961b871d25d75fe824d9b77090f9679ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e7f61048d82382ab869cc8d6e5b55e
SHA126601c9ccfdb64d9e0437d6b1dda9b3a20f2c106
SHA256f2b733255b692444be89aa971f705c520f33f2167bcd9ca2c9d82badb3dc211b
SHA5127cbcc8325893c1509e48d862284b031f392983691f618e4059e426666d23b1158cb80c835e08cdd57dbc1eec04a90d564d51c2855a878fe63a35e8c30274fe43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6fb9822f3ad1344ab4a41a0581f587
SHA16ad50d04136ac5b88a2fd7cbb20000a25c011528
SHA2567d610899b5b7247cb80cc4f86d8e05914c0f8bdc912a96cd7280acc5db559a47
SHA5128778cae3859fad4d6210f59305645da10a55ba0beea9ecd8456f76e66d57939e440a90e6ba3830f29b4896c15dd93c705cf789f6bf9b69a4834eb584409b9328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c62434b55f1a2d8ecabc6a4cedbfc1
SHA174859b1866f02a331e76fbf4575422e3ed530e0e
SHA256ef3baba82fbcfdb14ca6e67614e34928342a9e95f2b0181d015bb0aafbae3fe9
SHA512bd23b9402dbe05b58be3d1887cabe8ce5e72eaac2fae7ea7394f3117afdbce3b9f1fc1cb2bcfc09aac99de5004583b2cd0126ce832f707436d6625b4bae4710a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7d44861c93756d905bbf7e5b6e7ef8
SHA148131b235ce287ac2af67ed8baf2e1a8d5f4168a
SHA256d68fd8f3b72fb9e13dd4220aba7570e3ed5ac5a3c2ec28619f08ac877a7e1cea
SHA51224f0f1b91ee4e83cf63256e7a1ef9da2add5f0c640fddfcbaed57d0282d64bb2d06b039e0a6623dcab4812d9e1f1017316ecb450eb90e9538bf637aab1ed48aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2e085ba7dcaefa13e7d2779eba52d6
SHA197b6311bd51770c168b11054522d96f5a12973a0
SHA256f9233bb2f267266ed4493ed6525d4c6df884da0e23d29383fed82b47cd221bd4
SHA5121148a763f386f7bdc0fa1b7498691d000e8886c0cdd170b63905985fb2c4df1234c9d422101ba6050f5061566ad11a1c77c0c26dabce8d2a85cc28afa8dfae3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355005e0aabe1d46a04c7509be04ca87
SHA1b7a66e712b913defa90df6ddbb34408c66e621ff
SHA25643d2f2d725ecff0f707e16f617928d0628b2d603d8cdbdea90e33c8275b37add
SHA512b92f091b94e479c6207c3d5b93b90b2713f3d1c0e81a98ff1b7efed23b4ce6e0fdcbae53e63ec030c5f35f680b1fbde23662ce67ee07905d565d070735fc09b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8ccc0ae24fcce367f5c843eba8a77a
SHA1f0868a814b9bdfa9d17a3a42deacba6eac5e5e38
SHA25638b4c14704f7553ef6ead3d92370f9e08890ceeac397c95a731b2589f3f8f710
SHA51284085d756009b44aa82255341d37178ec91bfb2b8a43a17e22451ce78b24fa6d7d87cf703ecefcf486e92777ce7eb493cc4640af1c2095429347e0f15a88eb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb952f8ceae40863c2118af3c9005e51
SHA1ef103b8c80bd39ab783e66a355bae512142824fe
SHA256772d9e0912ba967986bb9cb0f7db728748fbfcb7eabd47448946ce2e250f8ce5
SHA5125fff0816816d7dd37a66d34ee6565f34ef1eea7615616b15514355c5734baa22c33e0137e1c4b711ccc8ea686fdd650b407638d12c806ce1ff110be78060ff69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c474b5d5463acdb0448d0cab25e41e
SHA1b5d6269bff7261acf14129d56418ac2f2677f680
SHA256bfc464136878fe80e70c7361fd5bbe3e7045eeeaf220c2b01223ca94f9f02b5d
SHA512a1607b4867b5896a2fde78a6bf1aa460e2b53fc07f2a7d1732a0ed364cbbc7a6cabf585a109ff935cfcb02bab94f2b376e82da25c9f34a22c99edb618e84d02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53127ef5b27eb27bf35d556ca307dfd
SHA1a2c0c4cf768077b86886536f3e160697a72139f7
SHA2564c2c85f77e3afd2d0b7b24a88eba00df004e8a130b3a82054669c694fd6557c0
SHA512b4fb653ac0799d0c1da74c761c2eee73dad2ed356fdf63e7bf2b6ae58c7851edfe7f1337073049da7c3fe533b27b80859a52a16eaeb283dc24c6cd93c1524dd5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b