Analysis
-
max time kernel
73s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe
Resource
win10v2004-20241007-en
General
-
Target
3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe
-
Size
464KB
-
MD5
18920ceb0a72f0b4d7241be6ff93d410
-
SHA1
af58516815c9c1445dc9acef4a6abf23755b01f2
-
SHA256
3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8
-
SHA512
4fa2a452311fb017d68fb90f6e5240e3e4eb7a0a92c5547c14cd9d69956de423668bc4b23d0d9d3bcbc5c5b078f4e65fc047e2774964d6fda7063d952c2ca302
-
SSDEEP
6144:+x6iVRLGDZLdHbTLvSAuYC27NkoTD/Eyf/To1ysI5uw7+WJz6lyqp3U+iyPmyQCM:8F6v73qbL2vnTowJ6Vh+yPQurfcFT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434649234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000009e49106d6f24af19842ed0531760e0e6f70890b22677fbd69a1b40cf44d61e88000000000e8000000002000020000000b420515298a797e7fc6b5f6727955a791641751af3d14363055413f10e305956200000006b5ccdbdb7fd118606ef4fdcc26b51970fdf6f9aa00f4b97adc26dd4f90bc1ea4000000098d785b0e80e4ed0e15e7f9219cd1c6423d32c03e677e577d38bc6e52eeee2e7f3f08ee89ba2fe962cd1af4618536c7fabf48ff4edfe97063a1ab6a01351a268 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c6d4285f1adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{529F7971-8652-11EF-8A1D-72B582744574} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 792 IEXPLORE.EXE 792 IEXPLORE.EXE 792 IEXPLORE.EXE 792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2568 2592 3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe 30 PID 2592 wrote to memory of 2568 2592 3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe 30 PID 2592 wrote to memory of 2568 2592 3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe 30 PID 2592 wrote to memory of 2568 2592 3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe 30 PID 2568 wrote to memory of 792 2568 iexplore.exe 31 PID 2568 wrote to memory of 792 2568 iexplore.exe 31 PID 2568 wrote to memory of 792 2568 iexplore.exe 31 PID 2568 wrote to memory of 792 2568 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe"C:\Users\Admin\AppData\Local\Temp\3d2a522551fcac50c9235c153623ce9ba2d04909644b2107a4cf68793d601ad8N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.cbsupermarket.com/home & family/pets/bulldog-puppy-book-english.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3168249fa1d5e7459f3b39c86a7c80
SHA134e1cc8f374deb50311ae929dc53a4d0f5a4be17
SHA256b46c7a201176470bab64c3f6350df94c5c602f43bcaac8a66df2bc2b70e8c254
SHA5123988e4b31e2717cc2a90af01d04d2b04887a26e96bdb9bcb64edc8217197373cb8195c4f0c68829a68338ea10f5806c7d59a71e066cce9d1aeb04defacc14505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d79984cf6a1ea3d9b33dd4da458352f
SHA18ac352410aa5f78797a20aab5d5d11421ad0af79
SHA2563acf1d6ac95f8484ae20565e28d4f83844b33999c35d2819acaebd657bd47284
SHA512b9434dc9ce21752ef2edfdac95d722801e852455ee0b5f0453bd498dc0f474c4437557b689137ceac0f401eb94d695728aeafad37708c1c722b5860270c90e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51805ba8ffabfe2eaa14ae2f0b943f590
SHA1b87d3f762e01a442d0b41dec9ea6ebe55be6e8c3
SHA256f130aaafd6739d670997151d9868cf9b4cbb9aa29b4dc1fd1ec728cbc5bf9b6a
SHA512caaf1db7d7d07b8b49a13b59fa9c9c168d3ee3c30d9dc950b116fa1f7a58b9e5d362531a5182c4703e17c4f3513c476a8a4d3ff197c7f8b3bb6abf7200c4f036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521aa3c1e7df95f56efa05fcb86115764
SHA1bb4e9f0a5cd6e9359afa6735b2ca80d2e44a91ac
SHA2563abbeb5deb2aff6fd721d838bd899698fb7370117a15e77c3a926475138f4daf
SHA51271b8a2e04342669fb3c5d05b1a5219d2126e1e93b45d4bcf93afd5b4edbd32686da74a0ec25b81d09a13cf136e2452711ee1ba174a77c9d02b793210ae5148a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9045f46e0c9859552836085bb9debf9
SHA1f95d7137893e973d594ffce2f6735281ecc06bfe
SHA2568f68f2fae1f2eb44e698558e4097fbcc689d55e27a72af7c9b0502b84898e9d5
SHA51264a67d900d0dd158b113325892cfcc482612ce98114d872d50d4e3ec43430504b2ed8ddab718d2f1894314d75180d5de2e41ad11bc2549055631e9d1d1f70ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd44ba3d35452dbcc06346a562cb25ca
SHA113fe8dce7b2431237b3091321af0935184feb178
SHA256492b23880ac28132001d8481f97447c260905a3e00ad39505f2efaeb8effe860
SHA512935d4715caf8130ee19c570007d270ea6727f5eb6e5a4f185ece0787fea27c11fd70336aaf921f6fb0385459001085494f33956eaf19c34a776eafff3813c1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584325f09b7f361ee14eda2460c078d78
SHA1a7f6c944e5e2f6b2c131380fee7dc048659ca112
SHA2566cf570854ea6d506add2a1721e164dbc0cdb774feaf1a11eca18744a87c4e54f
SHA512eefff8ac4dc279e63e421af84c8268882f1981d1e2bf6cbdeef6b366a3eada0da0b249dd3b5e5635068f54c864b9ce41d3f3f33920ba2ab95385303bb7405177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283562261379cf6b3a4386b4d274c1fe
SHA1e317b5fb6ff1fbf6c296bc2d43dc617b78011081
SHA256a169af33a1059efc377c1b3a1476102a4ce9c6b0a2389e96584909e2f1eb63c5
SHA512098cf74721084334cfb1969d91c43ece9c7014f7ef25c538c6eafc12edc576b02d015225c743ef582c490f4bde495a302815fe7b1b4e027be53a5fcdea432b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1428a52eff97ee9ffe4d5bb8272145
SHA1fabc0ee7c3f93fd5480ce86c8122214fd09cde37
SHA256df365559e447f90ee0e46e1eb72820e002c670292072d964455c544e6a964265
SHA5127ee30c21359b6c3b655651442307582adeb0d2efc1e8b631721b6c643a60d40ea28837916a90f58ce398d675cefb1c1e999e8925a1c495e439e96793e3fa03ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55330726a7a395fa9e72ccf24d95f81d5
SHA1afdbadcad5dde38584d4551737548f427a1dbefc
SHA256bcfdd31608a51cec3035eef88453a0209655dc1712cd615870db6db770ace27b
SHA512c994fd8e0a1d524831493273b2a4411124a60e385a91fbd36436a311da89cf15314356f34ff6028948c41cb7d80b24c81117748ba5a1297f6ba116dec93889dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed1d060814e3319ec6affc26dd3f74c
SHA1692d6c6d703b1bd9b2d648188cb17d9898f37284
SHA2569df3a45c38b48bf5217caf9ba941de56f65bd45b87ccb58785191b72d1102597
SHA51270400ea1ed98e46f944e3882c5dabf59e434acb2d2b68da2e7380486d4c0333970e4fe2f9b0c959fe5d37f2d41644f267ae59c24709708809ab211a5a5dd9710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583870527b6d586a75354fb78098669df
SHA1e11a5061a631207992ef26b0fa9e9770474779c4
SHA2569a131940e485bf29de93b59725dedc7f0a7faa4415af6b1400ff5e29f97cc04b
SHA512f39ec036d443e1ec78d97045b1f80e81abc0255a43baa700a2abe2e4b245bdecdbce984928a4bd5399bf239d5464f6876f01abe78236dece5b463ae30b2a6a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bad91a5e7847501c2a91ab714d013ae
SHA1e51e583edd518b7f8d3674c752e0a599844058e6
SHA256423a8809e71e927d6213119b0230945ace54554c6935534419776d644cc357ef
SHA5125e058ba3687a0db375e3035adb0c7f841880b81af71e9caabae86608bed57d9b7fc2010aadc483b6b25773d0bb028c73fd984fe368a7c526758aff50d350d3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588da7af429ad349c60e477585117a377
SHA1c9ed52ae2a9e28e29c2cec555cd4082b36388678
SHA25659c7556d7ef210c2b36085a8b6309d37ae5468a4dbe4943208bc7e191b03bbfc
SHA5126c46c51a19a4fdb59c8e8a01d7d929c0fb98f9aac6c4afacc8674e7513dabff689ef2d699bd6656ee8d87942cd582842e3e0116cedf76f36bb45055bc3092562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f73ce66a049ab7889bf4b820f6f8d7
SHA1f613feccc3cbd09fb954ad1c099cbe9c55b21d22
SHA2564c4dfbde0c2692e6164541ff597c676ae8f0587f91a07f4817b5540624859dbd
SHA5121ff039d738d00c4d82a0e8d01b373aef912df2f85e428c5562235ffd6715300b175d7d6b017d56ad72bdbf095dadc03828034a70c98801ebb5886d8100aac485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55402cf57322aa24ea6ab1c6a74a5c49b
SHA1a188450f723010b4ec1aebc08d69e427a1b20de6
SHA256430f38fd5edd7d001617f136d122525759e7aab593346dfedfbd3977e40f929c
SHA51233cb9b61825b7032da69da4ff305738f437b619a35f7a9e70da2aff577a41ce8674b4d3e2a70d9d724c1c346d83913abe38ad5884a7460846599501453e5a90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc15c4fc30f6e353d8189e9d5f5f3d4
SHA138c1914a78827629a473389f1b9e680360f4bb84
SHA2567294522e51e22c916f3b68f5868df406eda7e71c4de0c25916f844fca68bdaba
SHA5124c665f7df472845cd74e807a7231701e0694f6a25f60003fa9c4f4432f861d204b34ce4916b90af431c70a1c465d73ffdff0b87bd6d9a9c09feaefcac64c483c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb35ccf545d5930385b618a19fff93db
SHA109e30edace8beab32d57239adbf90d396887e6a7
SHA25676bdefc1afd4b1d1910f33c1cbadd83e4765ce6305581b1112593d3d468dc822
SHA512fca3cc67e8913bd34147630978b50bb2be067dfffc7e79a105f88f4ee18f3e4f8165bed262a8743719d6a4901660bd10d5223f9501704bb79d317207f41b5547
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b