Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
email-html-1.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
email-html-1.html
Resource
win10v2004-20240802-en
General
-
Target
email-html-1.html
-
Size
29KB
-
MD5
2f796c87f6235ac0a45ab727d35ce668
-
SHA1
842c09a780c8db799e0a9371a7b4468be9c65446
-
SHA256
aae05b8cc70fda428e52f4337bfd11d491fd0992f381491652cc9f8441f16d53
-
SHA512
96a62bca6f908dad6cbcd396fabc8d7f42cf58f6bf9b2533470df7e888e433da4e39ecab14b4c106e8088d72cc5631d98e5d038b59f7c28ba8c58a9bbcfcb5a9
-
SSDEEP
768:heOlBiTzxCuBJTcyz+HBdTceGhtBVTcSJByTm:hRBiTzxCuBJTcyiHBdTceatBVTcSJByS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000019ea2545dc6b8984cb9b877f82a20639f57da5812f8876d9e2eb96c41beee140000000000e80000000020000200000004f834814279652169f03a73d4f4b33316c66f0c2461151906dd068c1fb6c475f900000001c160fb560b5e1e3aa594246ae5190e50a7562814afce142600bd9914442d800692e2d78c0347568e2ea917b18ee19a48eb64de2bd88af6553ef5946c29bc8de859e083fc23f7cfea993c176b37668b67b5ebfc5fcc9b93b2ca997c5c3412a449767a838e016daf7e0d0b8717ecb93f957335fb5ca9d2743a6c4df9c34029b76a784e79e6361e9e8921dd2d31ac56e5a400000007247d97599769cb953b938138badeaf55ccc020ffc809c8b4333670fd769ff4dd21721744a3c42f6380bb060dbe0323970bccd0e42dde88b83e5308477cb5b30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E143181-80DE-11EF-8BDE-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000573a25981ba93993d5e6e10302240270621b3e5e31188de2d1661f6a6f209e6e000000000e80000000020000200000007a2142bae790185dbefcf1d4edef89b64983241bf9039221f200783eb2151213200000000359ee566e30d042ce9c101a3a9980bd78dd41c6f3128424cada31e2e68bb15140000000d6234e81b3df09ac2b6264af8af87ddf7796460501b8fa89c4581882a551cb976d7eb634051898f22562bfc4a4a5abb76a94c0fac5aa28ce52b498ff6cafc045 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434049642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d08b22eb14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2844 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2708 2844 iexplore.exe 31 PID 2844 wrote to memory of 2708 2844 iexplore.exe 31 PID 2844 wrote to memory of 2708 2844 iexplore.exe 31 PID 2844 wrote to memory of 2708 2844 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5d256859c5ba6509a12e3abdf71614
SHA1c25c2587adab5fd5fe29d52c62f3d5693c8b464a
SHA2565d7130adc06de536e9f99b3a357de23f53cc44a9a9f759da789ad8237fda0b9b
SHA5124dfc8b287c4acd601f433d67b3178f18f53859086d46f12df04c12fa9a4505e4d17144c12897507335a0e57b0e34affbbcb53e71cd45f2312c6a8ebde27bfce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db90142eace09fd6e6d1eec0a9f366b
SHA1b57a2d4cf8c5be970405b7570e4abc4d05f14c42
SHA25689bb8161310f5b0fc3125a6d34ebf9bde03d832e32e50754b60d24c90d80cba2
SHA512d24328b7a55704ad365a8816b469207c61808975cf11333547233fe102d1bc5734eb991e6dcaeba91de15effb71a25d84dd3d11a756f64106d32bff74ba64de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e3ebe71123d11108679cc3dc5c659f
SHA1f4db907f113f58093e5270dba58d8b636887d733
SHA256fa97d54709bddeb51d3f31299546124dbd610ec9e2e92baf03c35ac6f77bab23
SHA512fc97d85a3d4b2fe5563e117d1b15022c5983eaf51a76cc1ca6174d628e239c37027100995ef3566ed3a8a0db7ca5637a193d4a51ee71a0dd2d4a8e5d8d19bc01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd83abde6152397b4821cd51a54c1848
SHA16936c592959bb3e9da02611d60056d0e8de6f613
SHA256cdbf6b6902c1ce3d0de3ce49d32a859e43bca348b61efd2c93a77c0efa5e3176
SHA5129a5a3def39d3d6d34f47b4839e791de21d58426958bc74eef002cad0131e437b18e59ad1090aa6f87d33e988bc987d4111638fc44ff84953bb36842cbffe068b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573690e04bba2916952d545f93883f4e8
SHA11f6139dee4449730bec107b0a265674a850ea6b7
SHA25617bae9b57e694708b11e3a4ec6a63219996ba8a9fec4c3a825456bab5a561914
SHA512cf3485087ddfaf7ec5f226904b8abcecb93680ca601438e70c377d413798bbf92a087c43969aec93b9c964377ad5f4dad41ac6af6c7e1b5f1033b7368ebb3d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c14bba660bb5ea617d1505e13325c04b
SHA191f0cff660095e3c913ac42a28cbd4bdcb20661d
SHA2568010f266c4229131bd3f6104d9d09b35255568fa1e7a79d8ce3646b00e75f0c4
SHA5129a36d017276c8a45e1d4c9b1ebea8d21691fefa269084ec78549777db12763eafdef7722f95deec661deccca92eb4a035b5a141fc76389c6f8c9aa2a84d76bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3de8fbd2a29c30097ee2f28cc39a74b
SHA1ae1e3a8de15a401fa24b194b6a31c5ab1ae3d651
SHA2564a175d24bdb921ff17fe9f3487bd9ccb72cc2b70ec303ed90c06bcb351921945
SHA512779f2aa5c9fb62c735e63f6e1d1ab728bf23bb1c2bf25044ea672f790f52eeab4e62e06153e3930ad6b3b90c59f083786d004d7a23cf81176a9113f4295d3f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57937dbb198a0ab377079f0f38650144a
SHA12323d340a8ed9af9dba2063f045b1afc2c3fcaa6
SHA256411c88e0b0adeec7dbfde7118cfe245970097c2dde19f6b45018a3f9e19c3476
SHA5121315668c4836ac5b3dcf28893f16366b15bb0a3893c40d5d4d48bc4dfab0bc3433f3206de1b693a0761247a07568001aef2f7a944c54901f6b04a8d457d66b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78d71c83ecb871bcc534c566ac08c78
SHA1ead4ee51094126a182302f1d57fd33be654dd297
SHA2560c3f50c677b9fd0af4859f6ba19496c1768dd73e0900a41bc42a593c28c795c6
SHA51244bba92b30fe9d482c24e6edf43cea8d40f85ca8a4e2d024d5be9347ef1b52f9d9e59b2287c05735d5c0039b74cab28e9fe489c3e327a2cff9911b20c56add16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7999cbe5d85aa77d9f68507cb41c587
SHA12cd5d3b758a26de6b996785093328fc8a328d4b5
SHA2560a26047d13554c0bb3109dd7f7166be875cc3e3ba07e1d459dc0b89fafb186eb
SHA51283cf9063830ddaf33981830d843071ae4b354c4692ef3921873cacf488530b0307bed2c989eb3f405c593916935b4ff5d960e4979fb449abedacbedf07973845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2042467956f1333f9dfa080eb0bc06f
SHA1c54ad6c821b3c988503764d9b5c729916ae50b9f
SHA2568ecb052a8a78c96b11825cc51f60273674bb64a653bde99b8dfef28bbfdaee93
SHA512a71271a7096780f11b9751e1624e54c6393c9d11b95eb07c68ff7dec1c0daf09dbf7d32d223a1d4deec141ee1489296eeb27566d2d32fd132034da2d45c289bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770aacde8058407dcffae556102f5c14
SHA19dff58f669ee65d9d7371f5ae49301f4d8201645
SHA256a6f539902e21d8a167d379d7d0fc9f3f117a008ee60ef9e06f4e7824ed9e328a
SHA51260738129276ae183b69cefee4a728df6bb406319da5d8718fc904f2b454f4e8c0bdc96f30792dd5b2b1ffb60e81c8c474011f89dc458cad774dae4a688cab6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b1051bce4be0a4658ab0d7934817fb1
SHA1dd89073c804ffcf52d0e04560ec77e44d5f4aa51
SHA256e2794f45fd1d0495bb5eb17b528c2810e1b84611bb33db47b7fa9d3c036f3dc9
SHA5128ee5f1306762ad9630ebb0eaf93b6e9d5755b983293008c18300f03341a75aa2d72cbd0ceac98e2812a4c8b34e9844f2bde5145c444c412afa9e347a856058d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80eefdc3f7ae1e7879fc881c9ca0765
SHA1c456bc74ca499ec38d17e486e0d00b7885f54f86
SHA25666cb980c94d4dc65a34ee88c0a255d7dc8deb0929692ef1a23aefdedfb6d7a5d
SHA5123c7d3dc38e94beaffa6ef59c33329c80136893428c0ed19c66e8d241355939fccf460722cf7ef89cfbeb0d8e2730a30a07edb3ee32b39de883ac5c18832c08fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14a3f4ad666a96eba15ab3d67fd9aa8
SHA14c8e1e8252e5d3eec14f6cfa629ac19cc268eccc
SHA256675346de6f8cc0b95c9eb6aef610d5a0432f627be0fb35c4dd7fb5b8e64d3fc1
SHA51279e926e729715d20b1254e9042bc7f2e66e3dde89b26f7a756ababe4d39afe1cfecd0493cac25d92467e42229323dff52f3b7edaebc1570bd2c3abec869aac32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8a70bab0b35fa94efc7c8c196cef8c
SHA1ccf941ccd76a9056375741a5811aba34636e341b
SHA25602431c4844f09facf5a50d63a635c160a0a00246f5ba950929b9cc8394572435
SHA5125f0175ea7a5c31b74aa5ca3dd6bc4c95e7f05d339e6f4468dcd2666a9ee70fa891a88072024bf00560fe31cf8c11cad7658327b36527b1b28ce5f73c23dc23cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b382a43bab7a000839cf85783847f51
SHA18399931d4c2492950960372c6e1c651f4465515a
SHA256b0bba1f8994c47a1cdc31c3ce4ca4cf962db3518fbebcea3f163d4cbd4f8fcae
SHA51240e5d67922aef5180da9656af3feb9153bdd2e3896fcf6e0031ced491d864b9d5c13aa9ac1befc790a3a2b0b4ce442356147189896c56db9ef593a26659b30e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573346347d696ba62db44dade2208496b
SHA11e6d724ce0a5c544bb01c497332a3c9af9c79794
SHA256d6c1d7f78da514dad4c257fe64b3be13c3d39ca1c00d42214443d570c07c5ad9
SHA5120757b763899c08e8b73c63b6a29fcd4b14f091bff3e5786507f199fc59b18e758ea70d4330cde3eb97978ba6c61b5b95d47e611ff83a9e084fe8f81118c9fedd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b