Analysis
-
max time kernel
1565s -
max time network
1567s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
Copy of EaglercraftX_1.8_u29_Offline_Signed.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Copy of EaglercraftX_1.8_u29_Offline_Signed.html
Resource
win10v2004-20240802-en
General
-
Target
Copy of EaglercraftX_1.8_u29_Offline_Signed.html
-
Size
14.6MB
-
MD5
808156e7ec8daa3b2048e11026972566
-
SHA1
d7b87a018d142f296ac37c830d048be2b20bad33
-
SHA256
3484c921723a32bd5f63a7ee2107f698a485ca792683cfd6a7db6f27a3bd3f19
-
SHA512
f5eb181ebc672796e1f03941128c18185fee20be96033c3f653a018dc15f496d08c17508602768baec6cb3f963cc1f56a5e4aab5495c93cda2eed0397ac84e91
-
SSDEEP
49152:63ubokvsHdffEZPqFXQNCSveZ7PwFb5GJbheDNGTuAYi7Qw7dTyJ2pI9ir//Mtj3:H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a0407324e25c410d9ec8bd25fc37c79496ef874c57d1955638b847fc11daf1e2000000000e8000000002000020000000afd3ed29097089224af5011df010067d7d09e89b4ee1597f9e17b93390cadb1c20000000b5c0394085970dd334bae3dffcc27cb769a2adeacd5bd8c6ea8c6599717c8d4e40000000ec878a4b498bcd3e212200716b7a7922a9dfae7dd381cd490a6798868f3047461dfd66a75b4c470c0c0342d2246ce0666c3b31bf5bca920ab6ffdb69791154c9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF95E7C1-7ED9-11EF-A528-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9053d5d4e612db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433827890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3028 2096 iexplore.exe 30 PID 2096 wrote to memory of 3028 2096 iexplore.exe 30 PID 2096 wrote to memory of 3028 2096 iexplore.exe 30 PID 2096 wrote to memory of 3028 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Copy of EaglercraftX_1.8_u29_Offline_Signed.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221b4889802c4638b7d4837e73da8569
SHA1517c5fdb15290a02698d3996572f647dfdd9914b
SHA256d038190ef71539f93bca93424d6da2988710e717115510020cd66dfcf1fdf2e1
SHA51247deba382ad990de89d8a0ae553a73ce6aac2e11182d21f51f9dc1389fb2789ddf2bc119fa99d73294561cdff723af065bdaebcfb2526c221655e0e96aaaff0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c17c29653e60d7a0f79d0427768d82
SHA1cd78421a03963bb66e5010176853a841c200f4b8
SHA256f48c8326dc9c7d8de844ce31319446911c9d9144caf65c9e88a676e76cdd5cf4
SHA512325bcab2480758adf2b97d58c300807a73ff3810ac8d20958f1f93cc970242229b0cee32b881f57e0f4ede9c1ec10565863586028243d1c9d50888b5116cb7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c52fc83317849eccfb6a5cb296eff4
SHA18642c2109550da2ca6d2f7063975f90db8ba7ee2
SHA256e18bf6ed673e3ce667ef3845ef18e625e0cb099c07af36aac5caed0fb64a0167
SHA51223995c317e7cbce593c327c8c9e87635ca06bd62503cc3277bfce9682ea28506456e57a5bc8a7d0ea7c785c0f0dcc1e6826b4b2c700abf870c98efc2685dcdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30d340a7e020fc1ea9b876d0b9329fd
SHA177286b236275059817a33a1f5eed28088e806a43
SHA256ab950ff56d0d0f3116ea6691f2f4710e121dda4ab8cbd7f5e32b3aa623ca0d4c
SHA512ad08bde3dd78806728abb8f7a1cd77f35d721f7d9468e4893fbbc805d926e7858d7caeb761ddaa3f9eab668f7c6a2616b9ef378e2229551653e15ee85fb2305b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d01bc27fde0c3f0165d85a61a92935
SHA114fecd401fdc982bac0b17f9c3b4dca756601558
SHA25660cc46014e59ebc44edd3f36c7e5f3569ac8ebc843ba5168f0f2ff524159f44b
SHA512d6b8d1989637aed1e884d2df07757e88aee4e145d351811d7da573ca1dffad8771e64f07061ead13b181a70a34c9c0966a693d36d25da5d2e19f848876a368ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd402e27c6a7f7cec754b9588bcb76c6
SHA1a4ea855d411db3f396c504ccfcd26151a82c705e
SHA256f08f70a3cd622d32df9671f45ecb61e34a03fc6b85430a45ab85743220c6225d
SHA51293ecda08959ee20d7b0bdb7c92c22e61311c3a3f1347aa0c07213efe0ee1d8b03390f271572e616eacf5818918922915a6ea8b309b51268d8d7ceda5e0277a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594831f92b6429575453a38498708868a
SHA104b3e0ebd8218f30ec4fe6468b22f11918dc845d
SHA256d6a92ee6f5e35c25aaff9cab12ad164307701f00286b64e71c0f28de299b2418
SHA512de5a2d1322e225fe267290fb74f503e9a4e694971cff8f2721a333b7157c9c1503692b75fccc597e3eb62e7a1b0d42edf0de00ca08a068656a2a5a2c24234e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa51da9f07426f09a156f169208a0fba
SHA14050e880979e8b9f73bf26d3fbfcda8b4e63c7b1
SHA2568b6a6b907c24ccde52a89a5f0765ea176268bbecffe8a7394ec7d111215230b0
SHA51283a76c031a72cffc6489e296982ddca62aebd2a3131e15cc791b9453b7f0985b08a0bdcb533af13fd69e34350379f42190e217ab8bcb6a9b71678368f760ecb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59b9dc5b235ed8ad5b621f02d8786ca
SHA12b8e2817187d8cc9516784289d31cde085a0fabc
SHA256ad90a09e0984e8e17ca455f5b8d2a9f9aafde1fa07cde9f3c153b13e5ae9a024
SHA512c83ec7fca910717db5dfeb4c11913dede5ecf2af7c772596790cc140ecfc2d594a0cfcd473599eeb4b82e65edb41c5e02412c92988bfd90c57c2f5949adcf21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23aa21dfe2ffd4d1d487814fff0b697
SHA1b67d8b127b35327a9d10bfcdce6ab9bf73529183
SHA256f5e9d09e94e0e1fa3ff20a916ec27de009d3b441c7dfeaeac65b14aeea7bc128
SHA5122ce98b41d755d5ccec9b0508d20c4cfa9f2516e94066532609eeb008c6b4f06bad604931d5f172481967627d9f075ce5a4fba65ab0a9d2333307dcdd00923d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736a9a4f018cf023f91c6e68d132c840
SHA17d383ebf01289203d44539713da8f3a9617813d3
SHA256e03cca30329c94995024f02fb978364f9db3a0c31dc536cfd4fea276da88ffdf
SHA5121787e156fd695442b880521cd3257f3681fda704f54b0cf69a902f332f1d05b1782959274653b9e6180c4b333735043aa40665764af3aa491b2750bc38296c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54affe34201500890461d5d8c6ce0f9fa
SHA158da2b1ee21a1e735e28d9ab4a41fb5f24123256
SHA25661f8d9cd59456f03fb06a28e17752ada5d959a134ee7786816edd9ec1052a0d2
SHA512d3f545cd873c21bbe4836d5f80a0ce851ce3417730c12075838ace3e4e5e84e970584d04465ff9812087e8b7ae2c11312c0b86f5df4a31d951c4078fb6b32876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89bd447450024f3f7eb004b8853abd9
SHA191ebf58b21c80bf36632a38bd01a57b2fbf08442
SHA25649671e91cdde16264eebbe64816915b09b2f04e5e9a9dc19c30a0c9fc6d8f252
SHA512e20b1dc6d1656a6caa801eef3b1b9f3cbe80dab994d04b5966963c6355f4e4abbb52cf860e3e33b909e1467d92f5a5b22fe59c4c2d65371dd4abf94bfc735752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d5d814980429388a0225b5ff0f797c
SHA1e49d440ad8895e3ee050fd4660f0263b24e84426
SHA256b932064a406df3a5f4fe54d94eaf4865863e3105ac0970d8ff48a2b3e77ef241
SHA5126709308910c331ef8780ba7ec461b6c01ad648a31a960af6b49d6dedae965cbe34b1b3adaba86f47e3af1f925628ab8ced0f9f7b17fbc1c01a71e6bff308e09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74a57b717f6369add98e231419be536
SHA1d18279c6fde4772b118a1db30924d1f602118d9a
SHA256a1d532856dff4ff1e6111823c8d6cf29ac51dee1712acc727e1b2ee6401cda16
SHA5124266ecb5f2bd977425c9bdd3fa6cb1e0467859f6fc898121f13d30afa4ec377d9e8e55a536c731a1af28afd616dca25921df21d282e6fd941b1fc1c8e19a4bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9f2b2bff70f493c516ecb4bba96131
SHA14fbf0d4af95f916e3c3b1f112347dc4e49e59e24
SHA2564280f305fa327e376ca56136ccdd971a9b2dec5a8ade49be2eef38c43a704240
SHA512343ea8b040d5740ecd4577bdc1f9fbef3f42062a5fe01221a23beb9c2a8083b5ee84be6123e98d3385aa42f3b0c881590ac1fd1779c4b9dda4e48922153d9604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3b408a356bb05d68e832942dbbf547
SHA16b9a3eedeb2d6d2d56e70808bd850fb5fad7d0ef
SHA2568a26bf641a0f3b622e5109997886b0a35dc6f8158a62ca88431998470f001693
SHA5129515c3df6f3b4a00b47c3d7c2ea94ba080de8eefdbfa1a7235374f5f688701cf00a7d3ee453245a0dcfdc36c6fa094cdd89bcd8c591ab7d59d9a492dede2420d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5df1ae71b468414cc840a5f98df85a
SHA15a7707b3b094072075e04ed31793552bd54c983f
SHA25692fc73fd86eaa4375392ffa33da02ef49ae0cece78c9b25a954fab4bb3ba7a0b
SHA512ca116e5995db50d5c56e67790b66055025d942c695f585ba7c6dcf6c96a17fa379b2d80f45bb5bbf243fec0385baa84f0f2cf6e24d91e9ee17583b35c44d0539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e4704937b1d025fab004e1ee9ce9d2
SHA12cf8c65621811c56a17b756fa7b73f0d1cd7d19e
SHA2568291f4fe8705a83b6a4a7ed1d039172f83d3d632bd3f7b0f9931152c113e74bc
SHA5120387c591434644fe312320c1d81ed653c46cf2af7d053b9cfff0ceb0bf7af785e7c21bb6ded6a3b197fbe9bd4cd5a2108613e714340382d5c7d47855380591ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b