Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 12:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://h-air.hair/GZS0j4
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
https://h-air.hair/GZS0j4
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
https://h-air.hair/GZS0j4
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
https://h-air.hair/GZS0j4
Resource
win11-20241007-en
General
-
Target
https://h-air.hair/GZS0j4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b054a00b691ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000c5c60a8a4b1fc629e4b2e91bc8f73db0fd5d88004ba081ff8dd1f0f93a20630a000000000e8000000002000020000000cc87a474f86931d7bb8c67b521aa41eca8874b0a90317610dcb2bff0b8d4b19c2000000011b41e67ce6ef71cf11f6ff476e7c07fffe02f1af2c923c7466c5aa8ba8fff17400000007e8676577e840975c2fcffa82275bc74bb043e1236d4e2e7cc9e6b5b79bc5f409e4db71e7f9e4a1c58a82daae6707892110a71915c7498f0ec2616d18b15285a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434983324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32BDC9B1-895C-11EF-B5A6-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2376 2408 iexplore.exe 30 PID 2408 wrote to memory of 2376 2408 iexplore.exe 30 PID 2408 wrote to memory of 2376 2408 iexplore.exe 30 PID 2408 wrote to memory of 2376 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://h-air.hair/GZS0j41⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698a5a390a3b252a19f8c628645eac2c
SHA10e307d080af9dce4bab003fac0e0fb2a6511dad6
SHA2566045b0456733de44ab0ac8193357dc12c957477037dbe16da48b5beabf5fb57b
SHA5123f0a5073d39c05a1c585e98f0d406afe9f2b3e9a503cb62922933cbde70548ac9182d9ca931bfb12615a9e0815dc207eb956ed9885db2cfa75791cafece2dacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab874b054348e017650693360bcfa06
SHA19f44f8371a85e9bbcabeaea5c795688ffd12eafa
SHA256a7457746154de208181fc1ec264c99ba2bf835f74dda0afa7ccc33b8704d20ed
SHA51217fd8e81ac97d614709821543b0123e6e35f4e5685eb7edc5c0b8ce226377932f13dcfe367104bf64d0a93d33e1e3c79adfcce0ce77ed533e12575de24ecb29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda0b705206338553dcfbe1973594974
SHA1d654dec18be50d7f667f3a52024121026033a9b5
SHA25636e082f50d4b5e590bef436b4f69831edac479b315aa74495e9cc86fb2491731
SHA51249b1abea578d9dbec8177b663920adeec64b4b4b8a2a193b90c785fc35ccc1b8f97c2ed8bf8234aec5c518908be5f0fd0d4458e0d1485c9d4056e7fb5a5b9fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b5f157fe5bce981f16c709ee57f9c2
SHA1b3e6e806a8ec41b85e2479cb0e7707174288a1bb
SHA256c0e3221a2dd38c7a1925e0ec6b853bb00c28de9c5b758860a415eeea3c685ff3
SHA5128363bd2842681dfb69018e30f04ff169268fc1e83df0b70324dbd137a6c766f3e34be09de6326479aa80e2870c5b3901f4a1d111b72c159167a89c8fe44a1bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f9f4e2af46d8905e2f14fe1df329f8
SHA18fd4a262c546fe2e6dcd94f31969e82273ad2035
SHA256d1b746e069169f1871c025145179ea239c245ce3ca50dc195fae0c462b2a435a
SHA512d119ab21f0badd70bd1c0423bec859249894c5257f3b6df2903d1de53088016f0c3f223a4f807f8883e195ff8def80121a678eaf3ac0bb5ab8f42b7ed11c2720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12ea761b021e953e93d5afbf18183ea
SHA1c388f9e8202afe0922cf70542440e95783e83dbf
SHA256c98af94957c157b35a2ed4836faa111d5e18b7cfd13282b17b5dd5bd937e141d
SHA5128873d09c6e9aaadbeb3ff48ae302c42f86a93a2352edb15959fc17e827344c9c21a0daf621a3beac6d3ffe7a878cd0af6da7e309120d2ce5a1effec40c070c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc40790ce79a00d95af1f0b66afe7c2
SHA14ab1557968ef839871e9f973bd7936b89b182d93
SHA256b3e180100c13a71bd857d672b119d4fa61297c44065c8e1b7fb3b6be4217c160
SHA5128165cb62f57f5bc253669cc949619031dd803aea2fed5307e72a510dd958ed84d255d933cd605faed2c5b0a89848cad8e074726aec2ad8d0be8da4f88aaf7771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e37216c623005fdb28a301e5fd828f2
SHA1b7140486edf769ae99c9525b5bf5fdf6e2751601
SHA256beb7c91366e1a66d11608133ca275a6707371f280e929372d956c9d41404f500
SHA512e47b61513a2b5a6a05d2db435ab10dd77298e56c65e54dc6b2a68eefdcb8f5f78d216de10fe61f7311097c9bde2d1b30ec121ad6a3d77df1e88f51155ac3120f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca002072ea8001082a9024be52737c7
SHA1566bce7f8e4fbf2fe67c25cf989783374d8a4ea4
SHA2560336ec6c8ad6b082ca76a6a6b25dc9c3f72dfc26a49cdd2f3869574887fe96ba
SHA5124bf5b0d9b5a33303987735c93919ef38e7692f9422502722e79f843ac52ed8f6c582a370457fbf77f10fba0a01de845bebcc9f3587b39ab9601a278d9a4d6e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14ea5b680c9fd5e5dd6fdcc39f4ed26
SHA19ec4ee242614f3e20b5d0fd151849dd5e66b5e13
SHA2561b41b7397ddc07d75a934a5f4c8505e4f7df6cd27f155357bb11d58c47856023
SHA5129c29fdf7d57a292d4a130816ec2bb26d68d266adce78ff8f8c61f92f997b3ca2db97f86aea4cfec9b11d0caaa6399b15936ed9e938eb9cfd599d803bd8267a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db576bb24bd3b4cf627e4e1302c29ab2
SHA134a8640800f8b027d78166903943f884c95cef81
SHA2561e18c81e46f4a8d4b7dde2ebe24e1a7ad21ba3428913537511ddb58a8c89a1b5
SHA51285a39b0030baa1ee0c3dd140450e61f46b159fc5d3f61d0a08d6346495b588388882c878309bdbb1d8040a3fd04f229c383ec87d7b1e78cf00bf4fd343ad7e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad4bebac37319358130898e7fc64c47
SHA185e1807212704b11250ce9eea78ce7025183f067
SHA2564cd1aaeb3389e92db7539909112d7ef9c60261b42ea55ee01fed78a429d30c52
SHA512d1e793a25e2d1a506855c49a9849359793060a2f563394530efe1058c1008e22cdcfd2cf3af625ca57c9dcdba08009c4ec8a10720fda4cb0a5af9dcc9c757617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b65225e31b39a96e00075ee97ea865c
SHA178c5146f125ec7edf5c9a3c46a7abbeec1a6d779
SHA25623140ae11b7b1c2a5ba1626e5c7ce4572d1408428b0fe59c30a1e1f201ee6603
SHA512e0cab5927c7251011e4bf5097510b58681e0d8773a098f266b95df7c1928d21b1f48d40d4f9158e59a0a63619bf9653c54a4cd2723d4e592fdb4ffc65b5f7da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56504515337e7d1c4e673b97e711181bd
SHA102e4dad59099285ad6c94343b6973527188ed069
SHA25640bbb3f7af63208815d88d028470cded0f38e0b45742200c8c8826424b910ce7
SHA5122d25f547f083484b7c8dd206894bd4f4f658ea5cb54987a8f7f4f9d6850b2a0b50fad900b20493392493087a2f0032ac6078937fc3e8f7789b28a33f1a5237f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfed900a2b5e9de29a06b61fa81aca67
SHA1c817eea403d37129700a15df478f98378cf3feb5
SHA25656bb09b58701a50e9e78a6a44264c1e203461a0aace2306833b28ab8f02196b8
SHA5128be271b6c8f1c4c7f7b0989e58acabe5c2f02695851203359bd5edd6c9786848c00394eb9909c2a183f1ad8e12f0b03288e39549eff43d3e71e6b46031f6d0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141f67df7ea3d267348c3392ee3c1264
SHA19248ed7369dcf96f5ef1e60842254a9a0c91a479
SHA256236fa82f472eead619e98de261622b6d3298cd109f381e3dcc947ffee4b449ff
SHA512d699f0c76f85f07b2308ae3d56b4ea8f018ee6c4cda7411ea344b0e9f4babbbd81e8a57c068cd77466538d9234e2b3fadd41653ac2e82390b5eeef71de1d03e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069d2a08f7da9f332b0256b0f89c5ebb
SHA1d6142a803c2d9cce4867bbd695b69f0be56b32c0
SHA256052b993e7608988f8a39fbaa1805516a468904945bf1724784274fd6c921940a
SHA512e18253e31aa861faf3c6f985fb09060ac0a12be5df81e9705f3c0d455f4224b314ae4706c0b3a6ec64a18be00db5179427b28b48d4493ce071d87ab51383964e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553916f329fcbf0a67085ceac4b7f6e8b
SHA1945716dc50ddef6279921c3442ad19e2487531a3
SHA256ff9df85c830735d113228fe75fabe9cbaa82a7acfaf4c7d79e9318e06506d6e6
SHA512276557f294df41343a18a65c7fde0931a913f704cfc288741b3d5e47e2446c114a9e63b73ed1bfae7193f1dc657e53e5114efd3cebc0d02b42972a4e7a092ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce7f437e42179e839fc33033b2cc643
SHA1a9c4e23ec9f173911d87f4ad64fbce4a663bdbd9
SHA2568a49a1d390e486d0baad6290b4ea341d8814d55deb4df6eb2394a26f77e53574
SHA5120dda2e6e539139dc287da49ccb85ef0760ad0558c257f24e97a94c5397d48b4019b4b8addcee1c0a0fe34c5c7c00605d655c780a2ae819101768d1acbf4f3040
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b