Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
ZlOyJk.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZlOyJk.html
Resource
win10v2004-20241007-en
General
-
Target
ZlOyJk.html
-
Size
510B
-
MD5
82fed29a614bcbf8845ea32eb960a37a
-
SHA1
4c512487edfb272bff02f79efb2b2c07620cdf3d
-
SHA256
be7e7beddd24f60f10d7b03777cf53fcc7c796ed7bd0aea6cc18ab0bb2f4666d
-
SHA512
9de6d67d66c198e0bb0702557529c4c566d35900634c6468a1c50399ab209929b72f76156ad4c62f69263923368dbd0d89d309e34e4a9cd8cf393e5000e259e7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000406ade85f75b942586f79adaf746a6d397cc0025ba3d7de6e1fc97c2c41679ba000000000e8000000002000020000000e97f1321fd8f960b41b143bdb95817ce9e544a3d494df6ec4f5b60515ffe7d3c20000000416c509defeedb60a0da350e82a126650c9ff33da3901ff89653e472d2e1201940000000da51d62986e55f7eb0747d8aacd5551d779888ffd30ae750027b179ce9bb34fc356c5026494b3449e201910f17d0d993cb1b579ccfe3d57de8095685f8e88f86 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E00C1C1-8903-11EF-AAF2-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434945062" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f864f20f1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ZlOyJk.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9f1ba4e58418b27817ce0a4e3f5127
SHA1e80ad3a3515c3b1960fce0008c7832d637200533
SHA256c9a2e42b5c3b364a47629b7bdabc9770e022795a81e59f7dbc7ac007f15ab409
SHA512327efb2b44c3e50e813f9d72b5eca2500e38d561a3560a3869baf542eb4bdcfa250bd890491526734d6a91e1c6fb82b74416b87d8e90090912dd75ccffb35842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567eb8aed385abe4081f9844eb96426b7
SHA1adc6477a2e32acd32ba0915d7ccaccb2b70f5e96
SHA256f1bc2ebf876a0bb9faf7eb5242f7bf7f5bef9c8292cb5566b2f24efcb25fa527
SHA51258396c169ae17ad35a0aca5cb126cfbafa1940b4c0f041d503f8672d40ae298873074ebf59d5fb23bf2c7dbea07ab2f106db3a56e83a6c4b386fe571b38a116c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f983f77c90804ea50782783d1ce041
SHA1d3f429f768fede05aaed61d20569b115c552117c
SHA2560607487936446ddeb5dcb8ae6b7361288a3c2bfb54bd16b377dc018c8f746499
SHA512422b08609709e24ec158fb558fdd5621b948ab9e963e9a6eb6e672868ef2de3ac6dac61f359274599753da91fdaba85ed59538b18a17accb21339f409fb2f899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec662051fb0e03e20baad1ae10393f0
SHA1c2b34e55154a6c21dec2fa9ebc98c26742adcb6e
SHA256ed97ab01fd4b7d8f9813d63ccb700d35f623f0c026253991cbfd469f1d885daa
SHA5126c7d1e7af1064583ef8f6ce44f199fcce12026cb517d09fe9499ccd0534aed06a83f9fa89a48cd407218e6cea1ab6d4390534f2898b95ebaaa3216f02a266397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f94f08e4a1ffd499190790b19eead7
SHA1036f1b8174f1004a7774a80f1266ed0e5156b1d5
SHA2568e72250bbd7f2c91e2adc304c1442b7d4a334cbb43d0523e22df5641e48ab405
SHA51262da05af9f545d76e65fa29fee976c94ef071ff399ffac49d626e15273be8b2da6b720f4ee1a62207c3dd45d55a6f61f41c51906fc0c89868eeb9ded8cd98de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b7dc109a86bbc5f07c8be09a21345e
SHA1dc94eacc4b1234bb07d5cee542b86376d3d2d18d
SHA256a5b94ed4a91be0171c31e4bf52cebdc4b52acfdf16e94e837faeecf39bcf5e0e
SHA5125389b62ab764d1a6875b3bd7673d897817e5bbb6d30fd9d8a839c7a913a15a9e3e35e2b6295ac3c08e315fa549f5ad8814591b44cd37c7365e92d17ae300c24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e0a20587b2077740b99bed9f81a931f
SHA1a7a7dd0cdd87eee400a377e1fc6cfa0db6f1c0f6
SHA2564402fcf374859ad3446616ec12fc9bb907b1e213212dc967380b3d0bd03d1b82
SHA512dac3529a18f7df44050ad9e56c2e2950f0a03b3e99d8f62640b949eb77d3e237dd4c3825035a64ece4acba4d4f8c3d8860fec6daa94767af5dc690fe4c78e809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820a312446523b4a4e7fae4dc589c3ad
SHA1c1fc15fdd7a125eeb1679b09a21aea6a28dfadd9
SHA256c711cd3a2579abb24e8f742b24dc7052e91a60bd1a3055120edfcdca6b902c99
SHA512ca4f587f407a4182f4139274d069868d6ea309b5cf4cd1fee857fda3a7ea0abb5de56bc45c9e8cf7672caa708bdf8241fb6cc302c2ad2f7724ef6e8eb3e66cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6b1e0d6fa060e4aa3f8c22906703fe
SHA1da11523820f266af3d479cd4b657fc98e7dc9f28
SHA256f0f2ee3ad58285faca88120766f92b85477b5b6ab845356717d696d9b75f6d27
SHA512dba439bfb75c01304e2950e7135855db308f90d2ddf68e3d666e8964a40b4ad8ebfc71da1b3c997775db98bf41e4f5f6e679bd12951236a3befda9ce97f15c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6298839318537fb32f43fa8071402e
SHA196ef5ac27aefce2a05c57842b7d99562b5762841
SHA2562d36eb8f22a49aeaf32cb44fe57ba8c5342aa7566cef2b5378108235015489a2
SHA5124592318e2b9e3ca27562d0306dba47bd2ab8df6566196803ae099f28cec8d3a9b6eb92626767380ac5e6b5aa75d2f188e25ebcfefef83df000398d197fabd87b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b