Analysis
-
max time kernel
84s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
General
-
Target
sample.html
-
Size
20KB
-
MD5
e2b614d6048f04937bd3d97a152ae0b7
-
SHA1
d885e08c3b191d6f1bf1d4c508d7c9ee37f2e8e1
-
SHA256
5e63ea936e5391a9ade9d09d646787a383b7129c8ca2019f9641b54f1afc8b18
-
SHA512
c5e1ec06ebd7b50aa1c255fc9f13c95ee30bf67b49f57afb8c0ab39f6dc8f33dc596a919adac3b357d4c912ea483b3e99b3ba93685d6e6d663dfcb637c1a8743
-
SSDEEP
384:NRglspa1ocy4d4lbGaEMvhpNstKK9oNkro2REu4Y0wM1Owfg1xCejiw:Ne1ocy4OEaXJpNYKK1rEu4Y0wM1XqxPF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435336783" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006c39059b7050206b2900effde0e56d8673c1dbf6bc3965c2ac4d3059de83ec5c000000000e8000000002000020000000e255a1486743ea0141c2be95945259939bd9f6423f71bec47e1e23febca4be4820000000fcad3e30e54c2764689a0343efde8ace2ab06b3c3d8fc0c915653655ad1ab8bc40000000592888f49454636d4f627c869a4faffeb9cb1e020baa2b6c37210571a82f654b8f8ac078c9b7ffab313f095075a8e848481c65e16c40507cde041a4aaa3e9435 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29E83E31-8C93-11EF-9DFD-D67B43388B6B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04975fe9f20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2072 2116 iexplore.exe 29 PID 2116 wrote to memory of 2072 2116 iexplore.exe 29 PID 2116 wrote to memory of 2072 2116 iexplore.exe 29 PID 2116 wrote to memory of 2072 2116 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494af700e35769611deef56a4046d17f
SHA12a1e427276af0649d9268887e62ffe2eaae38a58
SHA256a5ca488ee7398fb57c4b44e56e76f7f56acdff746647a3f030fe7e201e1db0d9
SHA51255653c47a5521c7f3c5c8dde0fc1c34ea5bad40caddf70a92821438acd1ff13d43c7dccfa83acaa17f4f5e6140d47cf5ae1f66f4b875f64dc1dc1337a23d5399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296cc613bd604aab8f4c30ab12994db9
SHA13cfd207781b69038f06b083991a96f700ac01462
SHA256c49e455cc25c794ade854d765adddc5d8b8d951f4a904e34ffb3b5ee1458f8c7
SHA51274b4b3fb83ba82bce5bf36ca7451f30afd4dc6e2f79a2f295af3d6283fbadf5f80a354fcd820dd7d3ef8f7064f80af07a30cfba6f9ad47da51268b7056eb6d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad14906d25e5ef27cd04d20da4e80f7
SHA1a4cd663daa39d7fd3a187ff825ebc82338ab8ce6
SHA256e65a17841877231388852f317681708313833b2db230f113d691c5e569d5c786
SHA5123d27a740cc88a471c0d76486208a23630229236a7156523a477209ad9f4dc8cced14a6246454c04a31bcda4a4a01f9e2fff94ee7ed3fd3c0166acc1843f63ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba6c79f3354b008ab073babcf7e9b46
SHA12d59c498555047ee643c96315c773c6ce0b79eb3
SHA2567d468154a91ec53bbc95118f344b6d15a9b5c481901fc06b1636a74128e28178
SHA5127b955f6c84876cb63e68cc88559f8531ab9c1e22687bd8b6ea255ac3e235594377bf538c9023278ee723ffd9e0d06ef909a7e1bad60dd3d97852d2b76d6562d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5386ee8f2ec4d504b6840ea3baeb018d0
SHA11a2c3bb2ba7292f36cc490b4d64acb9128641427
SHA256f9bdf042f3f4136eb2b4a3c73bc97806d4d85819d2d90c019fd34df42c1fc35e
SHA5121a4846b99d970bfd05decddcb873c66f2592ea3e2a252783e49f5a2061bd2d144b23a94acbf66e1cbae31cb18705e03d629d32b406eede23b34a4b27cd265bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c44473acc647c7709f13c7e81c01c2c
SHA1ece50edc0513a52a8bc96cee6fff8b566dc42933
SHA25688e150902f40f519c97ce67e7cda18725158170efaf6726e395b4b1a8f682123
SHA5127916f7141db4936c7c71ad150522cdfd33484287381fc99df4cf363b561d8d55982576318742bd2b0929a03e0f25da1e5a56c3a3d35530750a6b7b4eba74d592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6212c997cb97fa77a47194a76377b4
SHA14360f6f4b126ae75779d5cbb466a144660d2c7af
SHA2561ce5e5d36edec5ba034c5dc741de2571cd8cce3cba51517039db2c64cccd0c26
SHA512a0c4132bd934b1a45c158dfacdd9030d4ada2a3181678ed800b85b064edff47088ac6b9fbdb73f13e97b28d9bb1877630fb05b91a771d5ac63b4bdde3f7aac1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22348e4b116bc9c327867c5dfa1373e
SHA10a2af84c0708174cac41e27fef346a4efc39a40d
SHA2562e614762fc0d8c583b3875afbc3869c10670b1a77c4c3a6c8c2a7ca043957b0c
SHA5124d5d11e7a41f2164268db67b2d15e3b4216ee71b71067a4689791453eac9a823ae0b7da4ac54bab3dc88015962b699129a44cdb9fe181e0feae35f25190d722b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7decc4278ea493e263686fdaeab7bff
SHA1d821b1df264b55b3c11ed80fe99f4e9b7540ba9f
SHA256f4cd25869f208f44fa999b33532c746c685125127801401a5b527ab6642f67df
SHA5126e601352486c97652878fcf3b944a8f240208bcb0011225e50d6e93673a11631a3ed4d410bcf3c49a39f47198dcd79c5130bb6b62ff4b22c5fd3fcd11d7bb4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538544654a303505f360f6f24ac25e0d2
SHA19951e813dcaae3f802c188a9e86ddebb1e0827a4
SHA256b18f8d7b9de4c14cdb14f96ad4f031d279dfb609ee33d68baea5cf233890f332
SHA5126880315ffdb87252bac4cb4d011571007034770849d875631504c2f4ff0425d3293214008b7598759dd759c09b2f43ddfa72bde58ba789e13251f40f6f7084ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573702fb4859f1feee0dcc89f733c67de
SHA16c5fde1bb3116356c7640c7d4f4fd74ecbda5f60
SHA256d862997255a8c3ff99928295baafd2eb1b6de8cbb8927e669dde389ded74f464
SHA512c46334c231d654a929245c4bdbfd23d78ad28d25a36999d07d6e5cf4ff12994c642d9658dceef73dfba570ea73f9c47d5e927c3adec5fb3b1cd7c8adc5cb3234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58decf7317ffa8f889ef7fe46adc5cb80
SHA18e480e23e6c16e06f7f62058f796cdd5bc7a0e21
SHA2569f566d76d4ff43df36b0428dc57ed308582fbb1741f76a2de6d03861d55e1852
SHA51270894616c5f13dac7c259740e5b16046b314f7116d88bc7603ef6bfc05fab2d4c91c5a771733945e67e1720c332fd849a73d42efd1d882673e0b0ea71bd1d6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528214a5aa2ffda7a6ac59433d00b29a6
SHA1b121c7d6085526ea6e13bcd078c10b7b65ec9365
SHA256b891289a18221372d8c6fd1f49991e0afbad349eda9066f64eb55eaa51d000dd
SHA512eaf50478f88e89ee63f7cee4354919e0c5a69fea3561dd1873e257fca19d3020848e9da9362ed52a81316b35e07950e76830903a8b994ade63845581a4684bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eed83a6cfae61f70f671323296fbb8e
SHA1679d5f85373460d9c65fa6a659a38c608d7ec348
SHA25614fe7af71cc9c93f73ae8e6c2051458007deecb4d241e6b7e84308e999f1d0bd
SHA5128e322f15c01affc6a957b7892c14f17a3ed7b06a2ea0540cb5248d02cf8b7b24513d2fa28fab81e2fbd93bb83a733afb7ec55e3f1e33039e0bfb4da229b363fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7a7975d5859ada9d6d54c7eeea0505
SHA1760f76212ebf5f1432910465fba0b4f85428712f
SHA2569a3e8fce5b3b9fbe59608a41c56bb86beb16d95fe86476b2667fd6f17dc1d263
SHA512fe0bb3eb374b1b4a5c3de229c99824e268695474b1136b2179cec7285b038345870a4b0249c42a4a03a1277c1f21e29520c89f45166ee140203104f99c1b25d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a96561d0794caed2bf8b2fc888e70e0
SHA1f689bb73745cf37b2410b5c0fd1608e76b6c3ee8
SHA256f118188616290cea43bf093caa1a0ed96686986b85b69d49097d91a6e63b862d
SHA512160a7691161409bff982ae9aacbbf1b7527b21aed0f0855770f4170a5ef78ecacbbe721447be14e6ab51357465058b5e74b3d5cbcb679ed3907ef46328fc85e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b56db8e71c65124432fa2377c4b9dc
SHA1e74d3c4c7e6b5caeb601a657d7db23b4b9e746c5
SHA256362f4d1708e241a9a6d99cd66d46cf141d36a3714df8ba2c39c40ff9d929187d
SHA512369c315aef0fdb6d3e7fcfae7fd72778dc259296de60825bb9a55fff17d1a1819a62b68ae2cfb8f67bf7c02d7fc8a25e8e75d5725e34f7172fff61dffb756ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffbfdbdc61c7286216bfa5b4a55189c
SHA1eecbfd44d800dea580f74d7076a58bf06867c57d
SHA256e03c35212f8ccadf8ecbdc4b427af03d0373032871a4ac283b7202dc7b6bf10b
SHA5126dd4ac73290799fad9d446dda786a1ede02dc8fbeb5f0dfa27403fef09aead33619a07d2ef2606a500732aeb1e815478c8d46137d313d5cb535c22ec979be74f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b