Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 19:10
Behavioral task
behavioral1
Sample
Crackme3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Crackme3.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
R4ndom_tutorial_8.pdf
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
R4ndom_tutorial_8.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
tut8.htm
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
tut8.htm
Resource
win10v2004-20240802-en
General
-
Target
tut8.htm
-
Size
631B
-
MD5
3cd662c0941f401450772203bca9789b
-
SHA1
949c37b1655f41de8dc7da94ffc8ec878517fcda
-
SHA256
8b331c5976c4ef804a5241e87e8ca0ba957ce7e058a946546a04ae6110a61153
-
SHA512
8ca85e96cb5395449103e7f9405fd989e901657341f52098d32edfd206ddacd09baf9679571f7a3c6c518cc5e98f9947626770ec4b8e696550035fa43ecadfc1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0655f1fda11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49575AA1-7DCD-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000059a3d7fcd75937fafa8c78bfa397a01a8216bf306fabe06cfd0b35ec3b5bc272000000000e8000000002000020000000ba94e329c97864f39e195a47d16a74157ec46bc1fc239c5204e52345531d28b72000000041145269694572e98c97f759b427ff141eaf8b3c5bbcc52de021421413ad4d6040000000dd8f48cbe191754d0d1822f7f5c9e076e42ea1b3f2779d91e9608ca185b31a0ee58d043bae513446e8b5726d91e3bf976cca3b61840bd19690ebb3684e0df8fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433712480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 800 iexplore.exe 800 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 800 wrote to memory of 2232 800 iexplore.exe 30 PID 800 wrote to memory of 2232 800 iexplore.exe 30 PID 800 wrote to memory of 2232 800 iexplore.exe 30 PID 800 wrote to memory of 2232 800 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\tut8.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d083bb1acd11ffc640b94f9ad65f7d5c
SHA1a6301e10d09c52e2eeff12dc4901bee156dd5906
SHA2568f82129f625863b167c414f1b1be76d78df18ef843a8ed0af6c0575aa603c783
SHA5126f51caa4a400c3bbcbcb59919dcd6205b0c4831a00996a8e9c0643999668bfe753ed494b74bb2cf9981d7e4d77b11fa5da8ccd1882239cdb87acb51ea36d4c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ebe16d992a3c0206e3ba96d71c3a8b
SHA1ea18baf3d43b05a9555c83a022f4c6dab3894a55
SHA25665a0409722e5ed4e48aadac6bf194262b7e6dca0aaaf9f30a9ceeb7999c3df9c
SHA5121525bf54b53ea40efbe16e5f7aaa5a9143271a816540f3db232795ecaf165c3d2c36bb006e1085f810beb2c956126d1cc1c6bb2e65a1108197a21f107c06f4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59085780baa008480eb3292850e7cb455
SHA1eb6728667cbfcb40cd0cd57b65ed6561150115be
SHA256305776e9ba1943e47f64c1a0619dcefc91208d91d1ff4908b5905862f6b83f81
SHA512e862b06044f8630fd3a87b0ad075da29c1dfbc999d828ae9f67085fb27c40398185dba2e6ecbdfc0fef3f920f5234693dc316082ab7f7eaa5f5b3bbbdd7c4a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd836bda08fdbe59103b80ed819cf6a2
SHA130a7a5e8927dfeca0a741179732b207e1b40d47e
SHA256083ba618ee54f489bd6c6c866534db994d2c570a965e21db174e1d49a12f9a4e
SHA512a6d3daba8651d73f1852a2cbfbe34f1145c55975b3d0470398c23f72ea991a3c4a2e95f17e69b2e832f6b1b95c98fb7e537df432c55c68d7f7393723e92e16cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57dc421d802b142a2b04adf21fb2278
SHA13b6687fcca7d6032a265d940eb054f5727b0b8bb
SHA2565fb41cd7d9f92bf207f207d3ec1f2fc8101a824ad1acaa63532227e13b7b48d2
SHA51269311d6a8ba44b50385429a0aa8be9e315cfc1865e7e160fa21119c589f64306b332f910d11b1049362e16968741ae4e066c1b43e993bc5fa9f6303b612865df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52983b8bd6836aa621ee8cb600e7e0c73
SHA12281c7a936f7ae399af7b7c884a5dbe7545ae048
SHA256712526f3dc1ffbe0789858d5cc00b0e564436a321b2095843aecf71b76b2dacc
SHA512cab3042c8627f108182823610826469e992b2996304d2e046a7b2db2c0c30acfcaf6383057f3a563dd6028ef7e1bef61420e82a78a679ebec5e94f930989a7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb3559ce74c7e6c25e29956fee923c3
SHA1be53c5b454219bc9aaf5581c754ea8e5c98f0c34
SHA256080508c5e4335367fb39777ae79b94944578cd1f4744b8b84075799370c10f5a
SHA5124f2fce5792153238405ae76221bdb6a82f571f2af85a3d385e550168c6fc368b9bd3d8b24396a74cf2514860932f97e4491a3fe191cd1c0852a294618940af11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d5995fc742f4fd3f649045eba69bb4a
SHA153fb102f9a265a2a59a3549649d3533c184709ef
SHA256786fa39548b2929029ef98245ad3c15a2833badda3354ba8e8715d01b92bd627
SHA512c467cd9b61465f6608a1306770cc4344a459dc1a85f77aac5044ccd725154036a0ce217ea0a79351b8249bd240b420f68c8b82f0398766e2197dcc99697d60bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56786ea483a825db29941f3cb935c002b
SHA19a3ee64aaf5db39b808222a554eaa09f66208e93
SHA2569c8173789313ae47da3730da5aec406fd0cf2779a1a74587df35fcce28d7f6c2
SHA512251bf7ab3a6045316d0459f3d4740063b430981b747a27d08293af430ffd89fa6f889cfc91409206921cc5a919c38ae60024f41549d3619d45e1b5d5c9034aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e99cd0bdc0c5bb9019b000752cac8edb
SHA1271a9292815a7e6d9394ba213cc0c89cda703732
SHA256b2bb64619209a98a421a62edd87986f8ceee8b3903173884c5c58918ebffe2bb
SHA5121ba71bb1701b15c527044fe318f0bdd2556e326b0643257e7598ea00d781228a6675df92f56204c23a185fca66e8454d9dcc3c26de69b7de92df2f471b41d246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a35a8ae547f0625497a71fa3cc6a441
SHA1bf068fe0d30cb9467a757fe1889e7df8ca618ecb
SHA2562d39be8c36c73e2b1addc22c320b58edf542b906637a9a2bcd896677f85ce35a
SHA5126a5f4395361333061da22c356cf40bb04926dc6f21e932288982656b38d4123857745ef4d0891425ba0df45cfaa784e97bb64fa6c34344a64cfa153083caf461
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b