Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
Keygen/kg.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Keygen/kg.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
快乐无极软件园.htm
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
快乐无极软件园.htm
Resource
win10v2004-20241007-en
General
-
Target
快乐无极软件园.htm
-
Size
67B
-
MD5
8234dce5d16c22a4ce92127a66f1dd7b
-
SHA1
fe0148312955f3050384340c19a7460f74c8efc8
-
SHA256
3309d750d51dd16a196abce6ce8bd5db97c6e9663adf81cbc6d8b01946d054c5
-
SHA512
30fedc6e0a5afe42d43f6b48b535c0d407ce241dda592f2dbe1cc6a5853e935fddce416469d4335822ef08bd3fdc89cb405fc332c2f9c92f0211967e5a4e1276
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000376f2abf6663c25cbba575605cde06dffd007c7e835a2efc58da93ad098d66c2000000000e8000000002000020000000b8c3bef0070f1d5de255f7544889c76a19372a7b1578e3eb35831d134989b5e82000000016802b7d24be8c503c0671596b3b231b96098dd4e5c21a43916bc4fb07da09ef40000000011a07d990150a31d4710d6851a179715f5cacab1fdb394865533190ff9205c8e959e389960aa4291cdb49f9247c77ee627d62cdfcd143072805368821736010 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0bcc159bc1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434909172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CB1DE01-88AF-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\快乐无极软件园.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06bd59143e730a81b789113b1392bfd
SHA142c71865cc807b39e20006eaadf41558ed6125e2
SHA256323967ca78122c0390167f461e4eaf59c250a52290d91bbe19d3a1edd85f7e05
SHA512bae479fcb79ef72940cde120d94d2f2aa39223f8b7adb79b8d102543267d1e77710fc0080ebfd5e1cf089fe0f482fbe5dbd36ee87ba41d563ab8ce670850ffee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf8f632a504d2393f9e87c7cebdde15
SHA18f418dd542f9fe793c8fa35c16bae0d473af92cc
SHA2569c96c3ecf4422f2273b818b4bcb32b1f61d73342789e68dab5c21d60f035c74c
SHA5122502ff2db738e3b8a2133f1cbfb881b02ffa2685b3b8b468524d260d8713e2b43ff6d1be5b53c2fff981b5311cc4a3d8187b9ee10bb477a0cef288fecd0942a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463b7c00df96d45bef5c8129b77b6567
SHA11619d51d7b244792bae69f8ee00174820022e3d1
SHA256116bf31f4f0a7914aeb86ffae80143ab48b3a8031202847d69d7521748dc774f
SHA512ec9e321ca3ce4d4ce794c8c5f222c695e2b4f79a3dd1f8b5a4468abce2484f6ab48509250dd4ea97ab8c69d7c0da1f94341f415205ebfd3425f34985ff8f1cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a19ba5663a613f6a9d6d2c2a5ca14f8
SHA13bd74fbd1ea47b510871ea933254c001a9d74957
SHA256d333f424e7bd4d39477a2d9a1e3c781b4163fcc048742ebd3d76fc44090b3917
SHA5124faa3f6ff86e5e98c1787780b904d4bbbfeeb419fc7df1c00efdd8d96b26c1b46271917ff0f00762dfba2713f8642fdc8249513fdceb6b796462e4bb1a4b83ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabb0665eb4c7161cb81858bea7fe51e
SHA1ff5465e2e662b4f01036fa8d4faf4f024339064c
SHA25609e6126857e24b36e948acde27c67e3f46dbda84d0aa15ba1abe27936fd3446f
SHA512e6155701fac88182f612e1c0065ec785990793395ba1b09e288f041d8e96d2ed5a512e7fa095f79005a1398d450e82a7f54b29809204c0e950d0154284cccff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46f0be79135b545f3bbfe123021b623
SHA1c756ba6c3468d7293bee9ef83fb955070b86c2d3
SHA256e08b296e6610af42a3dc9749ddccae29de6ed06e3ea5a011777f5a72e507aad2
SHA5127ad882a9ba84f4950838884dfe2269663c60863b5908b9b050ca35ce6759010c3db4efc8c2084972cb0ec63774458b7bbfe2c6214a41e904f4558f56b8780ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d599646abb8f55cf55fec9a599c9d48a
SHA12cc8220f5b0911762c495f5a5f0ac1732b618606
SHA2569732e529c8ae22dd0fcbdff4e2984db3aa01c9265e6a13dff046421b311a2761
SHA5123fa6b6026c3b6cd7bad8a171d8b1a6dfb11b2889b7a08918888f895896b9948f95a091daf3abed45204a1963fd304b0e59a31bcfb7fca5a7ea9c1cc21d2b6541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54042d0ca3063811b2810a91084318a91
SHA1ae8aa4223ecc09c4f9b9d1ca97f2f254c3961341
SHA2562158291552965d28f02ad005c453665b1bad7ac92db46f8fad4da548562f2a7f
SHA5123c165af19b7f70034cc232ce5e427e5725ea7e42491f1fde8283c393cfc7193947b7d70768d71119e163c1f7970ec4ecfe7a4ebe3ca2f3596668969020bf2ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d75f20edcf70f2244dd35f7ee76fd5d
SHA1f4f6a0b5ed02a17f5f20fb73f5402b6015b7c5b6
SHA256725edc1c96005600e5b215581bd54e1295676bf3d4cba9c1ec94666dfd8fb273
SHA512a4d61a5e8e0370570caf9789f21e78806607c52a70eef4d1802b1cce53dff81ccfcc0127540698283e5f42235a37656174ca00f66c0ab16ef53f9d3e32bf618a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cf29a39149bfa0f7a0bafdf1c68308
SHA143c113290ba2b7d71b2b936c162cc5fa061f2d35
SHA256881c9c7c4913efe57b933c86be90a64730d9f8743bf44b36d27aeb124151457d
SHA512267fbd3bda0e63bb60549458e0bd0470d02606936da89243bb697428f139459811e24ec7a0ae25c4e84a23b536a01e9b6d0a86d6b4c45b4e213677a7353d91a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc4df801227ed66d5270e68e82c73b8
SHA1cfae7840d62d1db11675ec432dfc86d92629a634
SHA2567ac587e2c8279ffb781a2f8d6ce1c8651168864783efce75510489969d89ce7a
SHA5129c8fc59e3e44d7f1e71972d2102731bd8bf989a7d2b55b354d0b9c5d5b1292881adf21089ea2b3bde02f01a386f5ab0962401a21af0c5cc179af6b6fe23bc98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b608456de0e665cdd2a6663af5003e1
SHA1afd95c5e5ae0ac0b673e39f0d90c88813022ff52
SHA25643a3dded7c66eeffe981e4308b8d8db04dc8154955fbe5464cfb1cb1d72f7820
SHA512469e4fe0f275b2ab8498968f07568399229928bfb79de696c6b68612df8059475b7913be99edc12e0b4e8f24b4f8d20f5b2b9008cd87772a0f868c0f60b0e412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed18f0483ca2db54b5f934e4583fb87c
SHA11be1464d1d3010914e6bdd209bf70e8b2ca4a570
SHA256f83e567f1aa7eb47121ed753bea00c172d8951130376294bcdbb8e260ab530eb
SHA512231e7fc028bbba603ec4294d41078ea6b4b6c4808bed654bf11aee9f0eba44d1ac4570671bbbff747c872d56e498b2027a4b531d8623a4389fd3151022d5952b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d742738ed8bd6ece1f5ae8de5cfd99
SHA12140970996806f2fef528712db55758456f2a856
SHA25670bd8ff6032c317eda73f8cbf6f80566db5c734af48c243566277ffff6718e6c
SHA512fa53d038dfe39fbb06e95bbeb5b358a981ef9fd4799c686bd7809642ac428786e1d834f3d198ec21e1ee71de3c6656de914f034e454472556ff99090881ae5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b2991c99b2a28e639fdd5fef558a07
SHA1ec604077076cabc46f99d2a8e75b0ef05b37e901
SHA2566d495b04a11039de1fe3d1f8a8b162aaa8562e697ff7c9c6faaa9bd6161372de
SHA5121b25e95d1c2c83c198a30a821de0c40d833e73fcbb824e7c98964ea62b1326bd0a700fd0a8018ac0bd173ca91bc6f0cb5f620963f724fed7c9c4236b4d9a56bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57565ec99da3998d91b72d947251ad938
SHA1810a51c8543a451decd583a3cafb0bee60988641
SHA256694ef30c2486e1b7f6f309ea6932422b1d2279e031b17af13cd85fe2b2cafaaa
SHA512c7ed275259e9cb8c01cbb605695b10c6c3065a58dabf700494239ed2299096bd2a2e576b4ecee331166668d175ff032a5f559493c45a3e0a9d4a9cbd2c04355a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4784d8821792f7f1298d812697195e1
SHA17d4f353ada41b00531d542b76406ec324e2a1ea2
SHA25654daa8cfe216242ac82ae9b22d61c43d140dd5b16abc6110c5e5fa241b7fbd3a
SHA5125888aeda54d7b67c9587ba49b883efc0c8011b6506b8cbf2a18fe644f5322d8738e0b16c7db8ab5fa6da3bc7c8287961f8dc522eb52923196b7d5ede770ea306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2496d5d53e7f0db753488f64360a9f5
SHA10fd70b64685d7f9ebcecd119d89826079686711e
SHA2560609739a8e52a3049e0cef8873f8050d010b90f1662b8c08a8ee2615eb6258b3
SHA512cc82d27939141ffb66620ea1ff8f5f95dd25fc2d60a61f98e498a2fa2a2aa41f36958f134f1493ed0f377ca62b4f32fe2081a71afd9f3ad25c613a39449ec8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47c1bce2d6c04a9ee4b37f5c1a39097
SHA1c73bbf5b21b69577cfdd22e6158c41ec606425e2
SHA256196b2b28b649b3aaecfb1cfc926c303c5f7fe3955726b133bd2a052573a455f0
SHA512d770b99e26f3b59775fb79b06475aba978e0d258f3507e668d1102675c7768def32c4b30032d394552ceca45593f852970454c95472308e52f3365df128f6df5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b