Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
SignSiS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SignSiS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
sign.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
sign.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
WWW.meNOKIA.com.url
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
WWW.meNOKIA.com.url
Resource
win10v2004-20241007-en
General
-
Target
WWW.meNOKIA.com.url
-
Size
148B
-
MD5
403b8ed9703c0b2b8a87cbdafe9619ea
-
SHA1
19a3faf0670d67c10ea08318b77baeb527b15f22
-
SHA256
567e3e76678147bdfa4f7bfa36c28d3591cb5158a4e7007afa9400b15db320e0
-
SHA512
4cef1eced54e98a06303b1399280943eb1e2af89c5252f580fe608302b5ce50eb10cb2e3f5c307d66fd1c1d2532fb7b3a2edaf46287d681c4123f22bb1544009
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fe6a30271ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B3C2CC1-891A-11EF-AB0A-FE373C151053} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434955057" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000e0d7d0d67b8b33fcce34e514705a7701f81ac2857cfc18df2e0ec69921b074a3000000000e8000000002000020000000cc5ee6c12811339901e43980a8894844a412a1d3219ceb10f71f201c4247df1f90000000c5aa53dcf3fa253368b733eb6c4f150edc9378236d9af16b8fd59442106716475748166afe82521b9088d9b1696679c0c3a94b4898e7af0d811ce04de122fbafd29bf1253a9012554eaf31254f8c09349169954c1c18799d63a6c75cb57921221c225f91c3d2f614808c9e186b8c9de25ae2968149b1924e12f0694ab6f03743d88a47b1354c510b2d1c392fdc9803d24000000082c1d67fc8e7dc61f677df894a81dc598f7e62ebeb977f31da4033ca2b07cc68985bf2915317fd6e8c383a9c221b849ebf7f42645b3bb59e97e4db24d0631fe3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000003cea3d7625658305e0387c14b014042afe1e2fac0d146e8374068e80df647c33000000000e8000000002000020000000b93109c42557e2196e55b6b734f4141cc66cdae382ff7a9974f3549882ff5dd620000000ac15314cee49ee801cd2838eefd15b567b9b69b790dd9bc3dea69f6029affd9f400000004532de74878dfa391df53fd0ef192b9bc09b743aa89cd253ac7dff1215bb5de23c2e1469122ea3c595a5149cb2caa72ba7b61c6a6a22b00546074d22644375b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2912 2152 iexplore.exe 31 PID 2152 wrote to memory of 2912 2152 iexplore.exe 31 PID 2152 wrote to memory of 2912 2152 iexplore.exe 31 PID 2152 wrote to memory of 2912 2152 iexplore.exe 31
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\WWW.meNOKIA.com.url1⤵
- Checks whether UAC is enabled
PID:2552
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fda474e19bff3e5a42ac05b65e9887
SHA1883baae0048a11fc92557858a56a7c695ed479ae
SHA2568b99ad8665005bb19f680c1dae91e58c52a8fb13211b067e159c644fb1f4cefd
SHA512bf3599e6a38d30e595d2177056790cf46f4bb4754d07cfcb1f6aa37b3fa5fbb9b36149c7f7e7f50135b28acfd0e26a098b270cfb8c16d9b07ba21a6f6b0e3899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50621f3a683678452e48eec66b78ea009
SHA14796f611d31958ed2006a0ad1f8fb07dc3e61885
SHA25642e835a1da566de5750fe9c4926eb5bb6a8696fec9365157ee9fe25d33ec4a18
SHA512c03e1f1eab3f2d623fe974d09a0cbc2f30432019848abf31e98816736de2bf975c63c8539a73f4c43b11fdfb39421ec24689a1792e153d18181fb99160319ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9cd513eb6b7c93176b045bbf51898e
SHA10bc2449c0c082f3ccf1fe692cb5f7ed0c6b4a8d5
SHA256a5880e2159301e6a2a57138eb2d61d46a1712d38ea7b969c6b2a8344abf155b4
SHA5129511646be15b8754c2aea93549c7c953efcf52e2df00ac4f8212e5c00cd3570a0f3add6c4126580774eb3a0b4883fd7ac920eda2023083a11a82bdbafcbb0b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50815b7670f9a1dce5108fc71f0f761ad
SHA1d2092447c516fa9dfed285d3febb624beba11576
SHA2566cb452f32adbd0e0473e1964093157273ef45b353072232d967d9b0818e522f0
SHA5121f1a83d507bc1c7c5d6e94c95d023a587c4debb6f7977fba003a23607bccfb646b9240eec18dcf981465ae0adc567d21bb2c6a04387f6c6178675bcbaa22ee39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835d74186e0f93200e3531b5700eaaf8
SHA17eca61b51f2e4455fc80d98d02a2c1b0db49ffde
SHA2569a4fb27dd7e477a047eb51c3e1d72338ce0abf37b92a25fd981eb0708cd3aa16
SHA5126cdfb795b1051d7bd22091dc22595fb5ff35c164c53670eb47a872ac64a671987411cb9bf4758d8b85273926f2135d4a57e2bde129880e9e329c870ae007bf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53162a728b4b3af1059f74c7b6e5c97a7
SHA1edcf5b2aea6f0ec40d1a8b4ff54cc3835a18d042
SHA2563409978c9b43ffb4ed6f0d413597433e424810af994b77b641b231110d4b8111
SHA512a91847eb36029b77d4ffb709bf796365daab0971d53b5bd78677192c6a07563349281f6aa6e92f4edab23d742ba502cf08ad590de85ac760a98408617faaf54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28de70155e096c79f809c2ec5a82b2f
SHA13911d051517083ef29166b459cec249d21085d9a
SHA2562103fd561ac4b9f78656cc11a41e90ca72fa4b3ba393fbc98206ead9f7695af7
SHA5120c71036fb3022bcada899f85c5dd140c530ed0710966a3b001be075bacabbc1be99d1415f20ec8fd7e85b8c693fd883c3e339435a663655004cda7ebea9c3995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd43a4d57988098adb5eab7c51649073
SHA1bef0d3300f690385ef6cbbd10c104882b931c58f
SHA2563305dce5569d442eca22d638ac5faeb9011cbdb70ffb09cc894f964209627cad
SHA512be9034f44e61ed386e4495d0da297e19f35c2f0238efcf29a932ba740c6b6436a3f20990a544784347e432d11b8837bf08da0ef551151316a5dd96c2b3cf5b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5247492a4887ea8c667df9ffecc21ff66
SHA120d0244a0701cdf6de1d2bfa86b8b0371d8588a0
SHA256391a7edcccc93e3a8eeb3a9a94dc763e8487ea76d855809d679a81699a2c516f
SHA512229c823f24ea7a97ff121b0c163085bc0937d0feb96afeef3dff8b43aa4cd29274c1b9e453caf120b23a6af0b4211ad8dd3b064766702ef0ac66be05c182d6c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6864836f4cbe1f94931534d40058946
SHA1d8cabb5ea38bf99a906afee18398fa761f9c9c8b
SHA25612556b4cba401758ff97ff2261df5fe6f2c84b389a7cbb9653c692dc71b52cc2
SHA512be86d2438d4dbbb5bde656a806ce0900a51f8d2cd302b5b1a00a56a8428dcafa04dd561a5fe1632bc805d26de98457de8156f52d19f86f4126ef91f9eaaf398b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b