Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
40KB
-
MD5
9b1bae223a16ddc3dab3a1b818b04b02
-
SHA1
8cb3ade033f95a8eede6ac2d08235cf3ee9592b4
-
SHA256
3c23ac83d8783013b7ac54e61a4068b00b9494ee67dc381e7dd29a37ebea5e84
-
SHA512
2bbd8a8b98a5e80d49bf1189aecd462d063236b4241a1eedc19e0bf4b10961b239d41136f18758ffd64db1be5b3242b9a57e37247f2aa44c20dfd86c245138a9
-
SSDEEP
768:SlWiOrtyqJkHFe6MoXYXxO8yLGXeM+pMZlUykrrUOE07oDF2+XdW6As3MXtYRuua:Sl5+mm5zV4JI1aJ6FkYaLy/HCKRLqrpv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433988712" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70F9E8E1-8050-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000009d0eb4ee72d059ff040a620d83bcc94d9c96d2993a5374076c543f0b2e80db22000000000e80000000020000200000000ac63f98e9540feae700a263a7b78fa75e53136c2441468c006ddb63e13cbbae2000000095de4d27e9f45bcb9325b2438d3aff669a952e172c9be9dca029043af2ff12f7400000002758ed17b65be7a9fa0edf2abb0ebf310e86c5bbcad159b325edc0fcde76dea080e0bda2c1d1184ebbfecf6f946a53dc8a4f7b0c5748944502bb149bdf1561c1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0355a475d14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2060 2352 iexplore.exe 30 PID 2352 wrote to memory of 2060 2352 iexplore.exe 30 PID 2352 wrote to memory of 2060 2352 iexplore.exe 30 PID 2352 wrote to memory of 2060 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d77d92f1a194e1d58f8d7c67eead078
SHA1404f8852fe0c4cfdf0a1228bdacabe57c84452d2
SHA256131b90bd463f0d72b16110c93ea3cf0b00ec11bd61916c3d110d1e62c8426160
SHA512b9223e8762ed3b93c6754c711c46e30a22ee3a1fe4bb0fb66b522b6a2b6226fbb1c88d4ede16cc1c7739d441c0e0527f96ae39a9e162ddd47f85dfbbc259af85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea2ef4ddceaf4a22be78494d3c824ebb
SHA11db4e80cce7942982cc7daf1fffd440473bfb3f2
SHA2569cec54965650cdeec1f71ed9d44b76a4c7ddaa8c73a03985d3f5e4061333ed45
SHA512f26ee3f449a3119ace64fa5b20a9df036ec486e4dea60f88cb63bb6a903b3599f0e7342deb1413a4ca87b3d81ff201ae6f54bda4e9cd1c88ce56a050d66543ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537c7f9556ad8e579866135b6c07df01
SHA1d9bc8ca4ebbbbc7b9efe59c3c2ba4943f3867f7f
SHA256d7c1593fddc32c598517bc8c149e976f2f892d6f652eb4096b67460860951c78
SHA512e30a8567378c8ad7c865a344a993ae7e2e41396025823c8b846b07fcd70db23a74e56b218ccfe194516dce086dec05a64d224d38f7ef978f1c3b756ebb8e51d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63126439b5c2a03ced9cd17bd0ff8e1
SHA13f250bd9119723782d17b6e3c275b66323dfa1fa
SHA2569c59e212c67ffdfa0f7440dd60b96ba4e82a8d32b137a741a676add2cb8fe451
SHA5124fb458081fd474ae3302ab92ebdea9acbe631210530e75ca40d35cfbf21375bc2ea1cf83b469da877b9d9a2bf4fdcf516b0f2fa3382e004df3ebc7e5060b6ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd42dcbbe86116b2c56eff5bf9d3076
SHA1d1f030fe801e97758b783726b6b732eec04ec905
SHA256fe341a22fd6d6e2189ad33e81aab1ceaa3724ec88405edcf96b718215b64230e
SHA51255ae4379b9932672bd3322d3a55547e0e2bf9da096221d6b1ae5b7c67352991d100a8269f95e9b05e3b66a8ba50fa2fc2d087b316d3a56e6e507f7fc1d3f1e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc798fff826226db8bdcbd0b758491d
SHA197c9eab056485ee3c3c9c2f717842ed73cdb6a55
SHA256355c43b07e032bac03fdad6bcce8c1acbf8bd516ef172e47d571d1a483b9080d
SHA512369a70391ab7d6b5f6ba0bf109fd84d4e019a0a216bc42e85e23abb6672b55c8adcf54c5ed1ac94b130ed44b17a150555792d87a50cdb67ecb6aac242efc4e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdefda8381036961b3c2f606b1f7165f
SHA128f266f8ec69964a814e19585c1f58f6d4a037d4
SHA25687f1e4b7515ef14dbade88ffff08acb66251d5978d1f747f3fbfb79854ae87c6
SHA512e2faf306dcac7199038611c7b7eae8138f4ede66c8f969608a4c12c419dc5e16bf6bbaa2a64715dd4d6f616f8555c1c02e4981532d1cc7bef96b274f6820fa2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542971aaa83e6adedb0dc2323f5a70e2
SHA16e88520b6430b000a3c7c595d2cbc8667de592d2
SHA256f3b7b809333ca8887c42c6ed77488b6c8c1e898f945d1ecd558c6d30e68339fc
SHA5121987e272f7a86382315945387ddf44879b957b0a6e40210c69cfa80f9e3f356b78941127ed6bf11a7d2afb3fa45e17e7cd9e0ecce8004f76191307524d6ea4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5a5dcebbf3812070ef87ca8283e7df
SHA1d2fde67e0c2fb240a3d02ad5f37e0705a5c626e9
SHA256aa20d8b29cacffb6f4eca148d1406402e419ce9582edfd4c7fcb59dbcb87515f
SHA5128a17dca6fd590898cb828531a07d8b990cc98d05855236a77afed8f1c9280d773c5f39c1117d6e1ddf379b59b59e09858ea9a609ccd4dc0b42099a7f79e7eb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65f0888ab0ab0dbdadc915436065e11
SHA179be139bf78112b07c8c06ebe4168f78c28638dc
SHA256c04a29193e337e74de09cb289a55fb0362059a79e394f971a401a78beafe9d83
SHA512c7b4d4d5200d4b77f4d4fe2f3862820d3c98f5919c9d428e20b4732b8e6be405ebe96c4a7930e1974582e512505074e4d2bb5aba4cc28e07776c138e0f527724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ef37cc5fa51734bdb017704894acc6
SHA18641b7afafb12e920214d75f37fe6a3cd1238595
SHA25663028a88e0bd02205dc548a79385a55a3a65c34b639f65f26b6c14501f74b6f2
SHA512b994fc7ddfcdfa2ee8970f698ae7d11d1c570a8e8bcfe1d4c78a9cd8b6ad305bb81e7be1bde3e4ce003c7c84123333c2e9b9cbc2ec03d4decf44c79d273b8e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc47b028fcfb9bd7ca32d6890f25e68e
SHA11287ea2d550d803b10665aeedec34c5466e369a1
SHA2566a517f1dea1fb6ee5850bc2e985465adab67489ee684e8e2ac66fdd44bf677f4
SHA51248ad1c04b59053ba926fbe395412f695fb32d3eaaa3d0bdb6c2dd6d56d9a577db275d02e8fda65985ab12429bd7ead8fff3abb833dc7007fea2f0a0d27fcfa77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1309952cb3daa7a9a8b7df0c461179b
SHA15fc4c3c5d80af9ab0cbee4efd1cd3f04a71c2de9
SHA2566ba7b84dc9906ced561815be5515fd97a019aa79b1f4bfa2d4d63f60995ecaa6
SHA512e8c2eb38c07361d8dd00946f6bd6ed541a86f479de8e409f6f5fdae6f70f4f459da7cb5447fddef8b7e9bab98397d24e994b46d4583a556ed1976445344462ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57950742466549b484a52d42a20628a0c
SHA15ed1ef1ea21d7c6092a5093f990ee453c4e091ac
SHA25677cf4d7efa9dfbd2ddd51909ca00bd7eb670255a1ac424444486bbf08f5c2d0f
SHA51253954de01286d8a1dc6c44b7933a7568aca9ea59bac089a7e59ea1cf635c4bcb6b0a6e37d4e17444aca8be03cabd2366b2f21aa5ee312548f6c8ad54a903137e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb22b445a44f8533f29df76e283e5714
SHA17e802e4a0c41f1f1f6efc290430d66cb2dbff7a8
SHA25672aa74288a0c80da4c1fc7a5c3af3eba48e49067cc3119a6b77a181d7d6871f7
SHA512c591c4f9713da509de0a24cf34735b24da599a65f8bb56b1112eb6b6f8fdb1b5c607741625ec406c6a126baa07990d7f3f60188778bbc8f7c32cccfb55fdc63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed52db05e305ff8260d04cbef0bc8ee7
SHA1e1d86177a80934e0f89378c93220b65567c4a83d
SHA2568d6b1964a6ec3a4caaef2952607bbd20a86b9cedf4fe662ba694228f8902bf9b
SHA512152feacef8d16e3faaf8e7b1252bfcea5b295fa1036c97001f86ae896f48e339d0d87d10b5d9b4d897966341a76cdeae17ac20b20ad0c0689bda5b8e07e2e81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16a13a11a88fe63e8fa4dab4cc78167
SHA1c824a1760ac15d967c2363ef05a9f130d798894d
SHA2560dfa57bb368d864f24eca5c49e8a433b976bbd0b1861682fb68810c16373c0f3
SHA5121fe1316a4ea885862f8bd7d8e44d99fac13d01c7d842a43ed3e6994b620f83f92cf7e93cc9e3b3ae1b88576b2e821eb76cf56c9d5f743115a85f4813a00e06f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf463dfd49aa790fa9078fb58721a7d
SHA12e37e5600dc5d2f03a88e2a0af320760f5224a6a
SHA256802a46962900d6730fd2a35a33be55fea49524ae86996830ac2a193d9f73eccd
SHA512ed261875eb42ee2d49ebfcbf3491e07c3127913fa2dbe1b1eaf20563f404f204d640fa66e97d7e4d4986e50db2322d3c6ad7e5afc7a7e4d455993f866783b72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9283731f8f72f25f65e90ce7c5c2785
SHA1969ad64bd8ee068167110f4c8258876b85f6b4b4
SHA2567a87218fb6cf978d1be1466941597ddeacac6384be9a573954d156cf9b9b7920
SHA5129f1f2f23678ac544b1331ba6d2f6f4cf8db391241ff01338a33da01a2e2fcbdb60aabb1b66d3c15fda6182aae3bf63d74e939be1f5f2b4677277d8ac0dbf4fe4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b