Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
Voicmail_88201.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Voicmail_88201.html
Resource
win10v2004-20241007-en
General
-
Target
Voicmail_88201.html
-
Size
2KB
-
MD5
59445a6642aa840f10e8f38dbab28d34
-
SHA1
93aef483073df314e1382b817f863bb9870acf15
-
SHA256
f5a24e69e997d54b812fccaa83964aef9d7781d47774260b03e6bb773b9fe4e6
-
SHA512
07143f8814c238ff154cc9aab3443246964517875946caeee7c32a8234f26694bbdb2a80cdb3e9549032579604e46dd6c7e0945d683c107f349ba141db52c798
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DB442B1-8C7D-11EF-B594-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008f2b5f0942c0ac3973049aad044e9f3ac3c7dbec7aa58afa8637497c26c336cb000000000e80000000020000200000000fb24568b4c1bfce6ffae3633b7021c39c5eaaeca0507d1e1dcd9fa559345e4b20000000791c2942798261c5f1384d62b02c36d39a4de7a115447c6792318a38bb94a3de400000009f97bb157006e48e6cbd9e8bbee7b52b7fe7bcba50ab448c709a69ea1dcb6ad0e5bfad219903cc87643320a2789e0668c1372516e8fbf75029952dd40a3841a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435327421" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000948f0b8152c6af3e0f74fc397d98faae0053b2175fe2ceaff8cd3a3d59bf6bf4000000000e8000000002000020000000f8638a0b952b8aa8ed61a206979055863dad7c22e67183f912bdd6cbb69cff0d90000000e038b9908f6a4c5f4054a5365b85434ff9760ba3c0250bc0f872ef4a74b805f03de685b8fa258c14f43280412dc2923290241dd0b95e15a94b72f32ebbace86604a87f474a9374a60a61a30ae9194690f23aabd77cb23214031ed8302aa17c3371baf845df9fc8245fc80cbc1f65b4e27c9f4e610be5c88a57d7f413d8ccf5d4a2582e9ab750d7bc8189177d7d9fc76040000000e2b072e130646b0dd4f8ea6a03be4c5bb5129562bf717086ef07df7849d28746d6f0fb2e022ace965bf9a9ced7ee3df53ffdca13fd1860fe73e29aaeed5b255b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305426328a20db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2268 2420 iexplore.exe 28 PID 2420 wrote to memory of 2268 2420 iexplore.exe 28 PID 2420 wrote to memory of 2268 2420 iexplore.exe 28 PID 2420 wrote to memory of 2268 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Voicmail_88201.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53014ecfeaed68c41bd5297086e9a60cb
SHA1f9f79bcd073b25900c82a33c7d1656170b9a0b62
SHA25627c279f1022ed89cbdea65564751f80bece9c9f0b8a0b471c4b31b564791736d
SHA5126cc932ccc8dc162d61e47836ced50162242b5614a0a1f7d4fe80b648f8aeb330a37fe7ad5b9de6ebc52676eec331b8f9005917c7a3be7dda776feee053d196f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29a6edab2804f818c92947e60da92b0
SHA103e4564f694be7a04d70d0409aa7d2e928b5fef7
SHA256ad202156fc446d0b9d03a8435e91d02177a320ec990a459005196f2ac24b7644
SHA5122896dd334148704194cb2e4b0ca7a9c35a6c1b00396106b1a369c9afd6ba5df881adb6f6ff48b1f5a5ae56d7fc93fa837874cc97ae45e159618cd0cef79773ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707fb0670125b09bce6806e841bc68ec
SHA114241f45b1a4bd9fa686e229b2fb899064fb754d
SHA256ea17934d2d85ce822f5c7da6160c7d4766af345d7f7e3e81088b535977127efb
SHA512033b459eea66f501a7a433062873a72051fe5f1abe99a062f8725ef8f155455a9130b47f5029de13dde6053327283c4ebbd2a5f8537109de9e1b2668dc23741d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552cb490ba54021cc7fc3ae981082cc0a
SHA14a36fc652d18b98d20457ed8594d61d2031b30ba
SHA2566294a08e51c4b36dbeec8a2aae90e20f8b5b3514ffe2f0d48e559e26090a6918
SHA5125c1b65169ce54ff4ff88364d93d52e94d8b91d3f30a85f12eeab78461fdfd551c113c2903480c6c0bef3df2bd71dede6ddb6b7d755a7e9357f46959343eafaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c695af810cc91666a75a5655acdc4972
SHA1143751381700c0ec725cfa87620669b070b52cf8
SHA256e2ee55e77e433c742d505c5d8989cfe93542ec00c830df599df787ea2bf2c2d6
SHA512d5d2909b83dd7a5dc668ad5d1ade80b75ac696f9d26706a5207feb7696c783f08321e7bfcd8d40bbbf7709d0a94a6fd4c0ff7066001b0ae0f00556828a7c06e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc8a75773dec6cb70930fe0e6fe4fbe
SHA1e6e5078fc6b724bbba85c944f648071610c66bae
SHA256eb52e7f85d14ed8fec275899d27732cf2ec44660b6541565fecea2a62a1fa6c7
SHA512eaa09a5ac2121961ce1d08466d2fb47bb9c17d073c96f27558418844e3c9514a4b9e1acbd6f2429448a0e5bb2bc6ca46ac8d4c217d2caed7e6299259fa7ac96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52780b9a500c7d546a17afcb527cd64a8
SHA1eec936834ddf1a8398ab44f1b90b0075925ef484
SHA25609d4ecfd7d62c1d8dfaec3a7873493da99616ba539ab2779400ea1e8b2a9ee6f
SHA5129e7d1e3538f7aff531e732b03eec6c8e871f01b4021e859a35420b9a7199837fee5fe7328acaeae163d117b1fffd2dbf726e848c4c41c6f60490d1746b872155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e742a94b87f08b73f9966f6e37fc6a
SHA13bd37390e111d0d348af72f81e73b7cb9edcaa0b
SHA256c3669fdf89483ddb8525ec6611388336bd43964ea0fa90613b0e69112a902e88
SHA512cfea2e0326e45a91d67204e09469e16c48776e61d0066ed8248b4fd2726cde1b7a501cb1f140fd6b546cbaf65893f9fa1173cd172c4750ebedc907c5cb5bccbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1888dba2fe663b36dd04060ec242e78
SHA1bcba34c7ae239d56fd62fde6f9dcc3cefe230bc4
SHA256e1f8f3c626d82fe1fe6c1a23564085a9375fcf81c7b04ac81ea260484ee11f16
SHA5126594894d8814e33403544b51fe225e80e52c432327c1df8421e30e0ed865651cbafceebef9a005a06b999057e3e01deeaf0b6a913f1bda07c3bfb1438c2b4277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b62f1e571c969ee5c4e4566767ae9dd
SHA13c7b78618e16701acac28fa0ad61ad1c938cf878
SHA25610bc87867d22960850ff25d1b3668a8ebc2562a41e17ccd47399a4aa68d11c3a
SHA512c9e61e4b265d96684e9d619baef030eeb5bfa2cf41e740ce856fd9e8df41c0522b9e6643842e32185b342ed18f7f0bf4a323fa451437be7871f25737730c2980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d77825c67ca13cc2b9c535cfdb8482f1
SHA185511180fb8d3770bd5d6369c08f9b33f515e1e0
SHA256594de87a9324ca151550365ae29baf3fe0b279c67b071b3dd3d7fffa5b84de4e
SHA5127fe4af32ba897906d405ba8ba9c9a3353f571b0cf6ad5bfba20481b1f2e274a4ac95951ee8a837fc5a4b7116b7a13a0f5f1d7c80659cddb24ecd66ee2ce00a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4c1d26541fc53b878a09fe53108ae3
SHA1993e89f01caaf31964c0ac63f741edc4a152a63b
SHA2568f29a95ad6a1cc586add0689e61c7ecf412328fef70da318929090a50cd93161
SHA51281953e142206ccd8dd777699470970cb7751974230551fc3d0e72f12c031c25bdd59cefda4da004b3fdc104e880c3e9f9b266ed15a5cafd342addc0027ed7005
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b