Analysis
-
max time kernel
88s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
PanzerSoldat.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PanzerSoldat.html
Resource
win10v2004-20240802-en
General
-
Target
PanzerSoldat.html
-
Size
8KB
-
MD5
c9e20585c84e38b809b0bc8aa775c2fb
-
SHA1
eea96bac3cf9f36445ac08de76d5ee2201141b62
-
SHA256
952b27c769e9e648e0c54748a0f93b8e12c42facb5488a8e67df5d80b22e86fc
-
SHA512
2b3bb5c3462f38302397a0a4a3a5875b165bb0a80c0a450417e27913ecd32660c1d61a12e3c5cda29556e229e29cb61d97774ad936e9f9b10816479ceffc759a
-
SSDEEP
192:PN2x2BmaYl4+iETz8CImMGbyHk2DJzBjnHtQbOhVtv1BFUfXyNKN:AxN50ETztGHtDJzBjnyKtdBFSRN
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Saved Games\Microsoft Games\desktop.ini Mahjong.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007a2bbb3e052ca6b8b79d8a3bc4b298d37bc6ead55d0df2d83d0b80882e3c74db000000000e8000000002000020000000f85d35bd1b3e3293827e898e8bc9776d9fb2e73a34c161b3230f29c6e37f638720000000b3b79b3522b62f0c0410728b868f45d59dfc70168b8e496379e84c9ed14ebdac40000000f656283afaf145c0930dbbe84a06befa67d29b39480df14ccf1cd823d43fb759af2e805029eb788ce076244208e1a028f13737280960df4d89e167b6bd3a0f2e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e083cea8d715db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3CAE891-81CA-11EF-A02E-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434151231" iexplore.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft Mahjong.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows Mahjong.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX Mahjong.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats Mahjong.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{084434BC-021F-4086-815C-B4D716386B93}\LastPlayed = "0" Mahjong.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{084434BC-021F-4086-815C-B4D716386B93} Mahjong.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings Mahjong.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software Mahjong.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 428 Mahjong.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1740 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1740 AUDIODG.EXE Token: 33 1740 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1740 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2704 2320 iexplore.exe 30 PID 2320 wrote to memory of 2704 2320 iexplore.exe 30 PID 2320 wrote to memory of 2704 2320 iexplore.exe 30 PID 2320 wrote to memory of 2704 2320 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PanzerSoldat.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe"C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe"1⤵
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:428
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4d81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2f00c270df2058459f8be137ba92f6
SHA181dc3f1f373b1034baf7f76b420dee5f9706b358
SHA2564f9d95af82cd31ea9c424509140219373a28df37919259a6a87a8553e93cb020
SHA5129a42244b34f1d7c947a080a88bab517a40a94b9860c1c5cc5c1fa5fcbbcd43b8a7b5cc346c7d074b3f33eea469436fc1635de88ea3135c9183ca48426ffe59ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944ff1e5c3c4903c1b5510ce13ca55e5
SHA15bfa5f4e153887c495a2c39f6a7e686877e15c66
SHA2567e400b873954aee94c7130efb6afec35590a457da28772ed3db74fd5754f9273
SHA5121a3c10277fc3bddd7d134473456afd27eba008d6615d0941ec9fe9db61589de0bdeebf9a0df3942d725a4994340d533d5998fc4180a4cb6712fa64abffe050e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd02bd2336bb2c748ddc6b35cb25b94b
SHA114ce5e755e9036c3a99ea153452994bcd8b4b343
SHA256bb4f70f711209d55174e7ef71f01b8148fd27bf6fe7641eca004d65f8d39aece
SHA512dd9ed10acd25c7932795961e004d816871bba5e49b1ef41070fc914369f6f069b8be415a113b74014d0f26d4b71f502a09f691836dcc32136b8a08dda8e42c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40d401e84fb9c9d495fdb5a3312a46a
SHA146f9e12bb33c3ebd23dbfd61a159237b4a299585
SHA256656e7b52f16953c11ebd52190cdede2e671fd4f26147b748ecb6635c60379509
SHA512f70bb47d1a4d41f1c5355d519379a6fbebed511e18230c110b47d58ccb1460559de7c0c7dab8a624959ae556943219be218c23fbe851fc64e4152dc7f98bc0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa58c101f59e9da0dfd6453caab4b0b
SHA1d60765a5a60a0c92c4171b00510afa207b15f070
SHA25693e0069c6b87e1276ed20f31717bf16d1ac22e9299a34ae47ca3f5483680dc79
SHA5129b453ad61133881a337ee0e67ca24e8f7181282a28c68cabd78149e5c8d1204acce0779cf3a5834745e2a9e2658ac53926ddf055bdb2ec98292ac5290119bebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b6ac2269b8756cb4b4da50e59241b0
SHA18993a20dad6b8573ab7c6972b3a97ad4b3e7e05b
SHA2566c333e768bb2e98a90cb70bca74a981674a76f94316df39a411c835fbd10d9bc
SHA512d083229b0a36acb62ce64366125dd6e19d4af9d119fbeec9ba2a73f4acf9dbef38cff1719a4428ef08e3d64fa8965c0f2bf280d5f01cfa8ae57d26b292985d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b4f47cd6f19618748790f7544ccf1c
SHA10bae0f80c4f17a7846e811f5adae0eb000f42738
SHA256aeb55431ef3e5b52d907b14f11b0644ecefaddf25aa6d1208e1111e6412c38bc
SHA512fb0cb2e13ee2767512be81bc2b2cc1ed03c7769b2afd98c8f0ae01e5ff1ecc2e29226bb8636a56cbf0b126da467668076f72ffe3627b2e70d8194fcf39ec76b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1bf08b26b76535292eba2e9f70166e
SHA12174bf2a5d8eb372f435a9e3548d60f47143a84c
SHA256aee167a77ad9b6d7516199a873bf697b06596f9184ceca8cdc8e1eebe48da861
SHA5129c812c9e82728e31dde3c255309240aed77c8c22492f377950c1c98bf44337f12ae5c00c57f5b7df7e99b48d57052ea53a208a0a2d4d972f5fdc6de4a8dda3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2016f3e87e0050dd526d8740818e962
SHA138fd74a18eda92dee6bf1069c069753e5e754368
SHA256eab1c62b3d65efb1d6707e03ab6542f3753ac7d31030b04c6f5e7123efeb8655
SHA5120d97cf740fc712256398b55d202a714efed340636c787c7547ef749bf9109a536df6ef1dc9d6ffc5b634969e8faecce6cd9988c8c34d8ab9c98da073d5b209f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c710215c494801475a7d7e96d3511332
SHA159eab5a79942f984294a8474221853c2937d91c6
SHA2567015fef58cccc7684fa84dcb7fc8d8ff03a8006a6c7704a1827aa3336a4f903c
SHA5126917b2a2c912632872ece9545acd5cec5a1e8f96ae13e8cc2d2f64803b58bc9e0faa7dc232fe49c3cbd401385585efdf5a4cb23c9b08905a8f4808acf377f390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52451df784b6aa1f7c1e00b8d21e3b543
SHA1113c80788b6ba5c5dadd52623fe2afe757849a03
SHA2564db80c095335b89a8c1e1bf214e6f0a30b8263a3ffba66ff0a13a656203de10b
SHA5123e3f0474a6b634f1018f18a05cbce93fc1ac5063028e2d311634b2f91f2064ccf90092f34bd688595a58e065582748d19a215ad4d4eb92a91f5ab876f4c2f6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb891f7d3ea43d8da25ec420ad457e43
SHA1ed5fbb3f7f1dc6b5a6202d955e75dd6af1060b2e
SHA2568f9d908d5e4caed3281a46291419b64dcdbb55f97b50a114c6831d1d3040cf7d
SHA5128ba4d4cd0d5a9d5bded5649a2e735c37a519ec9a2e33db9d13b85fdbdba073cfd2a7dbb2176b6c635a6e6e69251df39d7d41a9c05ced8a8988e22fa99e9abfde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc0794e69543906c28e6511d50774df
SHA19c851094ed639cbd98ca6925ac42c6f4e346991d
SHA256261d55cfd680a134a89dd73413f536759c6c3e719586a4613f15510a3bb12081
SHA512fa531a514edc3b36e40f20a1b57e7c43626db84d0834387bcb5956a7dbfcf1b3e74b4b9732652e6748760e11d7edcf7de4a3f427c951c60c1b1a8fa22acd9f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98b7863d89fde8da077a399c0e779e4
SHA1b684d0970f7ad7007e798dc5fe96ed4dedd06e74
SHA25642bf2a0e0fe04cc4f144bbc4e4e4ee0fe3ec79a84d3f0ebbac4dcd297370f711
SHA512cff81e9a1a1d00c8459e86a6b593f8deaade416a76ea8e38887314549a890a9515409e349db19ebd1a4df123d1f80d6863ca17f7f3b76ca3085c32b5930d678c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee2454e3ac3173849d8b6b4e8f6329b
SHA1b471ffb263320e377595e48c28b8390c17c9b706
SHA256d441fa589597c3751ddb2941326ef04d30d0974ee6c8b359036815a2aa4136fc
SHA512e93ab138ca0e155384aa527f9e61e290b3adeb76424e1c9160512c22ec2f0514c34c2924ff658d09d244d76dfb7097bdf96dd41ca2e9ea7d3a25502b0a3693b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b