Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
coolz.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
coolz.html
Resource
win10v2004-20240802-en
General
-
Target
coolz.html
-
Size
4KB
-
MD5
d6cf62cd5bcc5648859e27fb2606016d
-
SHA1
c4a80be146a60113c8b46e6737620304deda83b6
-
SHA256
8013d5880cf4d224957fbdf914f414db4afa9b03dfcc4fa60a886e2fc9b93770
-
SHA512
489167cedef5bc4474aa96d8ba355ec2cf8b04e6e058f1387967b928a133cbf2e2d71164c645c3c115aa799634a55c55ac27ddff6080057936f0c98ca987b69c
-
SSDEEP
96:1j9jwIjYjUDK/D5DMF+BOisHA2ZLimRrR+9PaQxJbGD:1j9jhjYjIK/Vo+tsJZOmRrw9ieJGD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a8a332dfef61d7d4e885d4b3c426aabb63ee18e369c53b7c20aa8cae38a42360000000000e80000000020000200000003f7b1b6c75a6020945cc03009d740efbb8317c630107e430b876b3407875ce4420000000dee1dbd5cdf98d86bb1953cbdc8c5878b90d0b061fc5e7bddad4941c36b2d42c40000000e891c14415dabb95da1a4c27b022f883341d0c238853c8387842356cd60a17232e80bc5b0eda56b94bb76ca9c0bdff8f69d842deacc1afd2c2fffe5eae9c3df2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7083d7cecf13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433927954" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA5DF7E1-7FC2-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3056 1696 iexplore.exe 30 PID 1696 wrote to memory of 3056 1696 iexplore.exe 30 PID 1696 wrote to memory of 3056 1696 iexplore.exe 30 PID 1696 wrote to memory of 3056 1696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\coolz.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8e2c6b90a51c428ebf7e10bd7a9c4e
SHA1ddd8c01f4a65c924aca1285964836cdc4b7d192f
SHA25680384891ff68810a1ec599358a451b3495302cfde128e5f18657fda4f0ded914
SHA512a2612d540856f10c562d21238522516d25a2d781114819eadb757333e77a1b7c3bacc3a99d975a6b0d076d8eae7d2f62fd41cdb9f9175768092f36ba0380994e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1831dc7bc6afe8f439ab0b9fb35a480
SHA10edc70d96474e0d01211837cf39f95e763f33f05
SHA2569ebae4e0a60b088679abcdaef60ce5e8604f15941fe3d263386d8e59ee650661
SHA51284447ec4a8b615112a6e65348ffd7139c328724b2fa0d1915f38be99497484bdeecf8919749988e3d5644886d02509025831416da350dcbc6039a6a998ce51c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf1c2a899aa9e11aaaf301afe6efdee
SHA1db4b50469fddf32d3f4eb903dae29123b7b398fb
SHA25687fd1d317b47f2e886d1d7e5dc4142212005bc0ec3031ec30b88a9a033b5f6e6
SHA512d38dee9a3e58750c7a4ea0d5d16c412bbf4afaa1b8c97c7a4aa240c443bbe77fc239f3edf526ebd40390dab42a72b4ecff43187acf4ed30f13dafb6a5811e31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abfecec7a5b453300c2f298a2880e001
SHA12ae6061d77e987f34f228ef1e2bf9786e99cdb04
SHA25690791ec17465a42ec4fd9cb0dcd5971cf1a71766950b9f24e0e9b6a7ac0cbd84
SHA512835f86e4dd2e0564b50e1861f600b28092cdb201fa00a269686abbbb7a8a53037e6308535bdef97623df6ad73a63f1c462708d5987ed9062ea20cd4bc75d36f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e770ec41b0493e2c581e15e98b3122f8
SHA101894af12abdbeacf111b1c634bf63d30abc1321
SHA2569cab432c4d472239653b3f65a5ee9cb834ef2f3b5e723cfa4a4d56421e4987fd
SHA512a648eb5fa8a041dca318a87cb6b9797aaecb9fe8dad79b39441ce97990f27caa1c65ab9076b1d77120ad63219d7bb741c561f7b0c7040f349e5502b0f7560125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d45549ec06b5f5194e0c4671f91216e0
SHA130f1ce08cad7067023bb0e2c8335c601174bc5a6
SHA256cebc3e362de3d5dfe2be5b54534a22ebd41607682d38eada996d17569dc41e53
SHA5127f243239e1e12f15dd34dfaf74b84f03e3ca9cabd2b634c0c2fa8820f024dd0d23e7ad65b61e8aaf003434e32dfcc7ad5ee6b4da70a8ba8a1b32a6a7b0f01e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecdd2a62516514351b6d66649c4e434b
SHA1b0aa1ee6eb7ebe807c074e847b11fc834fb960ee
SHA2569505ba1376a559e9afc37ed4f6505546db6f4cd6820959b892a399a76f6180fb
SHA51244fd0b6d6c11ac3286b69fbe7fc38dbf5edb05c84cf311095d313a5304bd87f9b5dadca8b24c237fd94a048207a88727e1a3104ab20626e81d05ad351370dc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da064010f2dd6959a8fdb97b63aed54
SHA1158ea7c2d4a9fcf86a5335b1e8785b699b723ba2
SHA25649cfce8068f626338640359fa8b36c2ca63404ce875d65376e14f4b4ed97a52c
SHA51281c7de81849d39c958df6e371e43affd44b421fe9c47af6eb914d10d846a23e770f48686f1c3d15a3f62023b33caa58d2b2eceaba80812964378e32eb184d62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564238508232373fa6e734d21d9ae1119
SHA13bc2e50a5f5fd6d2064fcc7fb27f6ee9541e5953
SHA256cd07a480ce6d410bc880b0e83927933229575467464fd9de8f0c15e393d0d268
SHA512cc967d1f34a3f05d34cdee1e31dbde4ffb1934b5653f8423a7f960f4262924abc65cb4d9d51f9250b5538fbfa1f0bc2ce9e153c5f5f6ca7c299ffe4d97ab6f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49f97fba6f0a842c5e3bcbf2fb54911
SHA175085c1dccfd1fb6781368d1d9ae04504b3dd0dc
SHA256c0b1c511053e6b6449627881e8ba217cc16ca6ade0e75fc92a13b74cc18cdb18
SHA512d7918c3e69af96e1d8e7cd6bb3aa059af411b81010a1564f366ae9f6269088116a9e109b6ff0146c41fa2a1e5ce99dd0e150fff3465c97f243119a52a1ecb27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d2724afd726b354b80d84ef226ac55
SHA1a9a4e7ebf7101baee251510ed74c1eb9472880a8
SHA256f52da10c1fba94cfb8d41b333b7018f9a5919bb90ea1e3fc6c914e4fa9b860bc
SHA51214c0bb55d4666ecd9e76273fab5e8264ed4971c930a2d88ad2958acc7b17dcc6d51382a4b84384e973385578fed73a7ea0a221cb72530f7e5000b7af33725063
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b