Analysis
-
max time kernel
19s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 15:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://filehippo.com/download_windows-update-checker/post_download/
Resource
win7-20240704-en
General
-
Target
https://filehippo.com/download_windows-update-checker/post_download/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C21A5DC1-8656-11EF-9257-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1564 2144 iexplore.exe 30 PID 2144 wrote to memory of 1564 2144 iexplore.exe 30 PID 2144 wrote to memory of 1564 2144 iexplore.exe 30 PID 2144 wrote to memory of 1564 2144 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://filehippo.com/download_windows-update-checker/post_download/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5bca245ac2cf9de280abfe94478dbc6
SHA1ea595d296d7d009bde1dca36486d7ccd4ea1b19c
SHA2566461cedff955868116e4541ebfd9fe30d8c1d26bd90b6f930c0f337a126d0bf0
SHA5122e239d1f07e0ce43d4654cb25bbbed7bcf844811197f72445240134f17d522d9a53b52ecd934fc980e23eab0d52d23231097cd37f7ac15d961409061821dbd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0baad44a1ef521370bd03c3b412baa0
SHA1972297ade562098d6aa41a759ffa3df96a1ed546
SHA256d3726ea978b43f4ef69b4c35026e8ae32e0171d44bfdbfa1787093e7459db5a0
SHA512adfa82b7792a8bcb7800ee78493b78186ba5ac9db1e8cbfa09637754572c7ba268e16e34b66ace99007cc42155ccdaed6656a4c83bbbd2a52d755f3e7a0a377d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5a875d8636a3bd6c265b58a53c33d2
SHA1e3cfb06479f9f7cddb49226e4d9c7032f17f2d76
SHA256e11d8cc12cc0a4ce27959dcaec873af0db067766b5ac7109c07f97e119bbbf3c
SHA5128e8a4e978f10274e8bb366155bc7a80f215bbc5465c71e841c706deb879e3269bca8cbd51d814a3248e16032e59036ced49b8405fe3e8bdf9516c2bf3e386520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de04528b372e600e0740b73ec9b8ad0c
SHA1ceb1e4eb82cfae398310f6ab8f986a7225290b2f
SHA256e70fdcb0ec211253306dc0722ff674524491cc9f27fa46c008ada5a1cd3c7280
SHA512e3bd14178356196ebaae1041f61a07b9e4619a7ee6117ea096bd9091c24ae8b19d69af74bd93dbe66885d3e1d3b785f9a506f3eaf8ae030a8ad8cd5af7a88bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff0839ff5a03317897f3e4111e804ca
SHA1823b74015b40b53155c57727aaed07df0dc95c68
SHA25615048ca81f71323fb3ecaeb3f639507853750b71247cda3abcc8f6a11e930493
SHA51221cfbab228d923cc143681284a120a217b41555fff6aa564c8839fe18b33a46c8aca830e0c2939559217a3eec89ea67b46fbe75ccd8807adacb54ccba9406b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bba8ae074be503aa900030929e18918
SHA1c1e472b11ac7d72a0d9bdd93aef2c57eff599582
SHA2566c0654634507c2495e230fa2a36983790ba5b1d17e402b48663c4ba145a3bbe5
SHA512841598ad5a1a2d4a11fd63d248ed30c88246af26a92aed4315a9cd269d1d0497abe19ab95e5ab4e07ba7b5c841b89860c08e2398e9cfffcb1c29a4d92d096d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548fcf1c652910f8c49bde005527afdb4
SHA12440353fb0228d14d9762665430e6bc2096cc611
SHA256959767b0cac22dbbe9c71a942d83df7225a0a939e9a946fa5e9794dfe7bf29b2
SHA5125f1568cabf4226672501b20ade0f5f9838f7729e06a51ceb5308b31e27f997cc1b3dbc05bf860f380688d68858011746e6dd3adc65671aab76aee14ec1d1a3bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdd7879dffd32877ac80ae6728ecd05
SHA14ef2bb722f76d2cf1471819ca0e4214a9489da4b
SHA256120e062536684f38095f1540068e849c6f0d68032cf7c10de1d02994f90a28d1
SHA512a9e67cb1c90e6ee6d0586954a982036f977dc8e98edd592db6c2929dfd95d6fa6807b8e237b7c7e4042c3bcf2be3e863f4f2da35659cc4b91557fcd80a208012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56790c4391af8c0b00cca7d212caa2835
SHA19be6720916a6e5e4ea3bdf34b5948da2cc71e857
SHA2563fa71ff2c2de6101a13030e7d1e52b4a1b7ba4dd6f3e9c47826ee8c67d599e1f
SHA512b61bab36d829ccae8258b989fda750c5d354ba12304f69babefd591777f94fda1cd519da708ba03562b93acfb52c30feb3d7770df06b9e6fed8e86f19e293ae8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b