Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
218KB
-
MD5
5bdb8482c6502b6b65e1ec239da898aa
-
SHA1
94bd93c1f9813bd1f3a984b312e11ef300caccac
-
SHA256
c00309814cf7948b7a66914106adb762e6c4bf1594d6dd2c887df95df96ea777
-
SHA512
1e344f16038b10693ebada57af3c2b69e2dfc7e64d8bd3f7519710355df4d2eed64aaff58b3ab98100f8ed617320755bcc8d56c6d46062661028109a4f35f346
-
SSDEEP
3072:SouFbgs4EyfkMY+BES09JXAnyrZalI+YQ:SouxgPJsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e69da47282e21e83cc180954d7d8136227024363c95ed76f1def003c02ce6e4f000000000e800000000200002000000002d603715a3232e7c316858cf19c8780bf64b235d9638aab0b9bfd93b5c87fea200000000e1d073e60eb174b9ea85fbb27e8d356ea0e21d009d587dc84448bff1e38593740000000db9cd9005b0a761717aee640de11a0c5650d176013f07d8e661edf249a6865611064a99bdb5e9db881ca626ed4033d1fe72075057c491c67fabf8e617ed262ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB977951-7ED4-11EF-B6DF-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433825712" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05a6603e212db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2616 2656 iexplore.exe 30 PID 2656 wrote to memory of 2616 2656 iexplore.exe 30 PID 2656 wrote to memory of 2616 2656 iexplore.exe 30 PID 2656 wrote to memory of 2616 2656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d105eead5173f6c8a705f112bf88292
SHA123b3b9149ead4eac199fc493d05acddba38027fc
SHA256dc3cfdaac10d7678b5701bc5ce70be62087711d77a5b0aeba65156ebec7f63a0
SHA512afe6f05d77222816fb751d0d4e062bb94b8e3df5b15a39ed801b1f90f08c7ff3b61c563c5600767abaf2b3fe6a29988bdffda0ca987db6b3f76a1ed0eb3e7b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f78b4f523a996dc841c5c4fb62f613
SHA13bd3aa7fc31d800863bc57bbdedc3d1913ee2067
SHA2569ef68006e0b3f1d843c55332653a9c8ed637afeef97b11e106068785dcaf6cd4
SHA512fde854189abcb76420bc934a9c11919414e221d03cd15e115a39c2eff252931ec7f12a382846cc9e810ef68dd4a06ef996906dda24442cca333fe3bcb50bd48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b683d38ae33e3694d70fe75268017425
SHA15c9c29029e7da7a09a624254447692e22aaac80d
SHA256a23b54fb887e0a69c718f245c5e034066a76fef128f6da479b0dcbf7ebde1ddc
SHA5126de449863590d2d17713241a461b55bcde348bf70fffe79d2a8c172830b012775360b4446c83b03497919505fe428420575936c3cf5a33edd297992b26d42b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f9a695feffbfa02a2a45a26989593b
SHA18e2a74a398e6a76cf6d78808aa7fddfc2eb24c0a
SHA2567e1faed2088debe971dc0cfc707557438ec33da2327b45b95b7002840b5a0ddb
SHA51289e64bf97d960eff13218a2e0e6bb589b0c0dd2c946031dd7f7f9c35b97adf1a0680cfaa949f4d5bfec363537c9ad7bac015d3e4ad9cd7d74e2a229ed2705a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542372551c5064cda0d51624cd90cc729
SHA159fc829a4b4fe57bd79f833452777fee83c756ab
SHA2560510f59b3ea3be7bef705a5fa3b975fc015b553d95ac852da9b0285e519cf231
SHA5123936156b58bb3c883eb76431089c7a64f4da1ff6da4fc1f2a6491e34bb6543b4f13f8ac2236338cb3ac5b88fa1400522eb5b4c56c0aae73330e15cf4096e45d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baebd01056a7549e17ce182eb066cba7
SHA17017ab39ad6ce4ecd03593af52a5f200857361c1
SHA25642669876a0c79a2623907958415b2814d2aaa71f914990018a003df3695be8db
SHA512b5a8b850e57d835c20dacecc0ed025818c6fd8974c9222b70e71d9209d5b1d02827f18680978379da681052f38134ab49fa2ff970d2883bdece3abdc11db71e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94b663a9cba7551d9a46704c22716f7
SHA10bd974e08c2c8bf24aeaf9e35bb062871a26faec
SHA2569e36befeb36df2feaa678e889ae69271cb672e32ede0980672fdee888373e59b
SHA512c7e1fd17c55684dadf19d8e6e2c3c4244ee72c1ddbba8840f2881e36b708005b870362be17e13b47ebf76ca27708ec2883a98865efb8719fa419fb4d14d9f6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537309f865242af72329ddb2812cbd78
SHA17c8bff7dcb5b3ebeb31fe653e292683d6aa17af8
SHA256d407fc64308b4735aeb629a73d3ca643c3acde7fdaef1b8053d632174a62bfe2
SHA512871c58f8b942bf39ff7859ed350b8d9166a160f37fd4b8e8c3d78e4e313922cad8b70726757ec3e20fe86d10e933b8708df33d734a13176ed9b686709eba2096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea70443cee0e5c75d4fde64b88c54de
SHA1ed1720578537943c7c2172f05fcb1b5231ee1d81
SHA25683d99c79b983a3e3fad0109d0dd8498d11e1c69d46245f00e59b24d2b7f76f5a
SHA512bc5217a89ead13ee1d78cbc8ae4d28d7a725fcd42e05c127d6c5c8657386c8a8ae576127a3ec37c7e5b58618f1af3236106747901cc43b383f284979a65cd034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d5af36e29d3f9ec7abf703301100abe
SHA1c28dc6dd2e18fdef7696390b96e1c2fd76f99389
SHA2563b69102825d65c7759193801c08cf2901876380a82c65382d9c2c52994f58881
SHA512adc2b6727bf1cc26405a5251f0b0be8168e13a331fb4d6c2bc3ad8030b8efd5a94508583d40193a51deb46278bece73fd367b956c6c48da3facac083aacb63e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec11aa54ffc7bad8fad5b72c26e1f8de
SHA13e34ed289e74d81b86318ffbd92bb99726724433
SHA256f2f6d686bbe9d86239ded699f61a6f713cdc6cf1e08d1c7e1af2362769552505
SHA512093b60718ece192aa9e5a1960d6f273f4b1fa54a8cc0fe0bacfe2f78a74599d80ee642785f767db17902d5a64565f9e3c0494c0dd0ad6cd332523d0b0db5594e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4a49780f60e155f5252d25114d611d
SHA1b035018f725a5326d227cfe90f4a46f5953e1d82
SHA256e1f77817747fee9ca12a926b5e27f86db2ef681737f700475fc3be121f7627a4
SHA512d3c6cd989b250d328cc88b0280d19db8623ea99456353dda976f1d2344307c49c96a805ce145d233d62df7aa7f5026f66cf49af4bbaccc8741c8eca9ed647635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1364b568ba1f2f1cc5c858e3c2a60c8
SHA119e1bec3883765cfc5e6eb9ab0d4f57189c62775
SHA2567ee6213ccc3ee9c83dac8e853829e0b5639412aa070292a2d2a9fff0a5438a4b
SHA512aaf4e085198383455e3d0725314598e4ea1949966136468564fed8feeddcbd7a8884a62e7eab0f79dab9bd5e620d0e1790f39cdd589b072327eb7b42875259ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d95f957d984035daa3e2ac2b39574b2
SHA12013be45538adc978f0dfb9397a44da6bdfdf647
SHA256fd4c9749aa662368b2f56ee76e4cc40ad4f54b55596dfc956b0de56e3af1ce74
SHA5127cc04b0c26d55eaa5a40fb1600fbe63ac06093f5c1c2ab431ed460996d25598c5aca5b8e3e4f75a87a3047dda28d2fc46681ecf0558028ca613884b714702b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4450da730c2a339452a99ade139290
SHA159bd32b0bc38b6f9da3051f939c423734df8b89e
SHA2564a1657244893ec807cf24527173925eb1572a568520f3d6b099b4ddad704ab8d
SHA5121f85363d3e81f2df1db6898df50757f8d43d6671ae793d207232b769a4cfc51ba8096172da7e0db376fc2e48c25b3a28d3448c26cc33332710dfc8a2937486dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3163cdad3b9526a599a7039ec1cbf0c
SHA1322b6b602b3e3162aa3275dc303f283bee4d9d48
SHA256081df3df16f58b641c86b3a0794bd83499c73507c0151a74c3d7dc2019611385
SHA5124617f6e712c5181c67558e7fc56875bddf4911e6f49c91d47d6a9342a3c539fa39182db79dbbf894aba24ff26369ff882d0ad4adffee5dc5217176659de97edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431455c2609a97c1fc9a488bfcf8a2d1
SHA1bdb28e13c830e336ff620b8fa6b92d90ce25877b
SHA256332225977dd48dcdf463f7cd5a844c87011dc47b1d46e1f74ac1ed82348e2ed1
SHA512848f5bbd2b2422068a71f34622781324dc98eba0bb0a1ac3eb60cb2147f65c9de63e32effa971458474e738f34cc5d6b30439dee2412941d56369315ae183866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb8cb263bf7b468c2317a84b7adbd90
SHA14853c0eb327824bc470e39e0e745d6646dbe22ff
SHA256343c958f639f59678dd74741a7e5edc4fa9d135458ecf648421e0f05f455f97c
SHA512628c3ce7836938f4f5d5193e7f56470b2766659f1e9c63065676e71f25b954dfdb66eec92e45fe12dc9d6f5fa976360d483aa31cd423911b9bbfc7594c1b6921
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b