Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
218KB
-
MD5
e4c3b0386171facda71bab512372f0ae
-
SHA1
45d684b64a806ba9d8a839383c9dfdc98850dbec
-
SHA256
c1b1c5448fb6be3085e0e004b3335bb322222f8f83cd6696e72ebcabe876d0e3
-
SHA512
7f272fc8d4fef9c84b975e13cb286f71ff6c2f1de384fa9f1d1c0ee0bd08666470abf70cabd5efd35abc7f02306142ac2fb6b5bc85c6bd84200fa9681c410854
-
SSDEEP
3072:SvMBIyTP5igLyfkMY+BES09JXAnyrZalI+YQ:SvMBTTfusMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701c9c82d312db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B7C0911-7EC6-11EF-AC30-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e69dd688ac4e0b1598dbc7aff7aab07b1b5336607f707a827bebb6da85fafdbe000000000e8000000002000020000000a54c618423b118a6598fdd1cd410a8f2755160835893f52fdf7938a25bc6c03720000000c842770f7a3baa6cb5d6f49bdb79a99e3ff514ed782ab9330271e47f9d659d66400000005f2cd890468c0365b6cd9744738726384efd606d7899ff57ced91dce92adfd095b180e29b259c958cd2685621a3131627f7a869d13122b2ea0103768e95e96c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433819486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2892 2312 iexplore.exe 30 PID 2312 wrote to memory of 2892 2312 iexplore.exe 30 PID 2312 wrote to memory of 2892 2312 iexplore.exe 30 PID 2312 wrote to memory of 2892 2312 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea7dde203dc5447863a524036845c1a7
SHA17e655122cb45b587554e0325732c7a2fcdf203a3
SHA25645b6e8e6276bf83dee0659bd8856036cd0250eba75ed5698369153d2eedacc95
SHA512def03e8418db9ca8016acf006c6cb4aab55efa38be32c8287b8288b6ee6ad2009edb647c84e03281a0b702edd6eb5369b12671ffa4e8c13989a9fdb5edb393a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105795b26e3e5e34efb2837c0bf9a8c9
SHA1ab945f27e50a5b82489662759a90a5d4c23e829c
SHA256a421838814146f904b86b6f447f2cb127173ae4c2ae10b0467f1deb984bb42f6
SHA512dfb6016caf58a9169f5c43cb3e2e9f68e011ded409ea3e722b096d395b28319ea8f0ba975b8497b472d43153771a1c51b9f93a11f44170bc538e3bd6f5539748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1dc165d013d1c85f98729816ed2fc1
SHA1b3c97a3cc214cd29e0df1318343c4d57f2168afa
SHA25621fccdac4cf637efc573721dc5a77f648ce258818036f0a2e82cee4d1b7a4a8e
SHA512f56ae8ad82bca26ae89fc92bbdf89accd7ff279511081b277049241f9c4337c4ee6482e388fc8d4477fc7d813946a413337d5c4490a69a4cb660a7c061f5c5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df978a33f38a37c2ca4472c5e9140eb7
SHA1c2425bc625cdfd1dfc969c50bc469235d1e0e4b5
SHA256ed15eaff4b4aad21b46bd27d161d09c4895ac5ef287e29641ac14e22e5c5d2bf
SHA512d7588c92954429a46bd9643b257535f7a9635513a9a45fbb02d871f6414a4c31b6e4cf5794696bad4b886e5f041e19d7581882a8aef5c51ccf3638409a8c3a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540146a26aac99d4202d21e548cc8fc32
SHA1bbc332c62c8a09e9efc81548145eee5e7a254984
SHA256aee6bc51786e762a23c349632690c6907f639646b0512b410d495fc555e59967
SHA512e1ed3b51b92a2d63ee099b5fa6428370a356fc6bf67ec266dcaedf852126d4a3e990bd79c2e89378ef9878d7703a65f47e9eaea16da6b112191ce5a26b03acb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571aa1601563efebce62f0dd2d8287247
SHA1540acc894a3f154de5b9a99c39043f735562f7c4
SHA256964fb38849328a0c978a518e56a31898c5adb4e4633a65f23765d5ed61d49a0c
SHA5121e224fea32d7f8ada720179e7c4704a11294cda27c4186b2dd6e0febd175cfd39cbb0462a360ed3a9c0eeb03ff83752beaa8b16d024c904dbb1ab44728bd932b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac9868086d25771617c2ed9caaeb320
SHA15ab9aaf6ff1f3e8708a7f88ae090c3f6c31158e3
SHA2567115ef77cec285c5e77afd643519697a9a2410762e91007c9846589f6dd59b27
SHA512945d67ecea7ca3eae7215ab51ec09dd062dd3dcf1c3f24c4780a25dfb73fe2da38766b8128c0e45e78c74a07a783ec39241237d1989cb0d3afa5adabb5ed44c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515313fb0d9163ddf2673d96b9307d2b6
SHA1d0f9fea30ba3acb1da5f5cff02ee0860cad81b8a
SHA256b3f599b831228a9f85f34ac49d5b013a582893031fcccc37772fbedb25b42f87
SHA5127b21463b248671a6ec01e1e1561dcaf5983befaa61b2520a5aaf10bf6316664a4afd62bf9d11ede4a81a8235b57d2e833b7155d33550c5af719c8d671e6b8ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f362c2d5d983d5bf45cd8f9fbca9dadc
SHA19c2f615550f453349a821578cabea4c1af7acdc9
SHA256970bc546f423ad7476d5e415c4b65dcd088c501c51acb5e0e1c4e7393b4b5787
SHA512400adc47b586d81d9bc4a9df227ec3604c325e6b6c278c14d2ca0c9ee57fdca2b521cef480ba0606402231226d6e107a8e0e4667104594e265a5fcf5758db4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d8efb5c2a84ac294e607a7a473636a
SHA16cd54a39f5acc3b1a29bc8238991006db3e425d5
SHA2567923dee6b46fc8ce13a2ae62b28f4b4a27f964ba4005df2a316899d02670ed30
SHA5121b8d387c12d877d864a8154dd3afafe6b502c977dc34467fa1e82e1a4e7375f1a09b1b92c27192b427712223076a5b103f42f40429be5ce794fed3859da4dcff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592128d774ee0d64e7b32b325e1e803c
SHA1f927f247fccd130a0adf74106d432462b14f8f5a
SHA2564064d2aec9be55f6883759dfc181b51e536bf26c069464e203a50c613982cdd5
SHA51293150e17d40fd0b9065fc67983564ae610c31b73cc66255d54b806187e65b6f26d0b7774408e922bb02aef4659bb70459d806b853c302262a8919a1659450d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57531abdcc7d11256c1fb65b5db0263fb
SHA1d54a9d83404c57e1c605ffc781049106bf851539
SHA2566b9c77ebb0eb22a82936810926a0dd09c8233056179ec9da8af0d5500502f602
SHA5120d8e2c300b411cc17fbf7871bf3bed95bd7c77555ff14709ae84b9cdfa59668925113bbd6f07297d91a2f2c8608b520b687d6a888306ab810c9b406d34879cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b39ddbbfde399c211d946bdb3e25ca1
SHA185c2b665ffc18e89997d2c408f3c6e6ffa3bf643
SHA2565d54b404954bd4ce734641ad1d19b4c938c81f1081f9a50610840e7cb4c08067
SHA512f4e63988f4cebf860a4037de61cb81f587e06e0eb62594025d5c8cf6ef69c8fb65a351bf2f4ea9d72282cdad3da4fac41fa71e8643f9b0754b0f4b6b96393519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448622596ebcf1f97c3c2edfee0b4a63
SHA1aa3d5e19697146bf6f9480b2cf7f9751bdc8fe29
SHA256909f394c6ce58dc17a38aa44cdd1d6a28841d8d1e3db1b45a771b48e66f57610
SHA5129b7ff427322049689eb9b7b34a76ad279746bd3d2096ec776808130c5971056ce1b8fb0c1ab26e9e9a47ac766e20d5299402dc8959c2caec7e3e14f27c90ac89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff9d0acdc2a3818048558f9bad3ab9c
SHA112423c37071f12cb1e5ce1a0cbb84729e27808d5
SHA25690d0338a3b6f1bee29eedfa17378aa1ebde64513f678ee86b1249774db2a8f32
SHA5127518b675897cf32ba95094880a867d4312228d244a0a759c5e9e1753b4c1f821b97c586569af222e6143962e310ea01ecd43eec327fc7a8e0ad0bfae60e3f531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d61dbf3a65e03d2d0c894e48b2d2c0
SHA19843ef5b41bb454458f0681a5bf4768450f01213
SHA2565ecf82020aea99128a201d98f0c1e1a22ad1b8d0a5d2f6d461c90fdac8dec50c
SHA512bdc934d0c2e4c584e7fb3f6a8b3452cf3291d0b025b3fd4351f5f908ea238d355471e9793f9f006a52b0567d8d4e2abfd8af0ad592d783c400d1d863e5ec0af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31ef665e035db0fbbbde6d12034bc8f
SHA165d37fd574999c04e4b4de5c6c44e96d957f7841
SHA2569609bf3ffe18f894bf7f141347f2a8c39528d4c8f975ef3e6eb195639ffc3ed0
SHA51257f4809de11a9f602a25323202ea8d8061cb99c03e78e3591e785ee705d606000f034cfa6f40811d9ec3bb1f98a8db481ab80fb719a0f67a2e3f30883738476a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c1a10dbb2ccb64dc66819116d33962
SHA1e156ffcc88106d735d5ad9ae7b0a3f6900a7637c
SHA256da9d88a0aa90ff9e6023fdf58a2e21ad9d9a753eb94bc21415f9779b16862f20
SHA5123fc0d03a14edb06bdb6c221500347f8933d68ce44c10ecdf046af0686e2b0c13789320c2d68f2bf20cc5a2f919356b10c07b897f861495bb23d1d070c95562ed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b