Analysis
-
max time kernel
69s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
delo3m.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
delo3m.html
Resource
win10v2004-20241007-en
General
-
Target
delo3m.html
-
Size
41KB
-
MD5
a2c279ebac4ec9716c06e44ef21a7c33
-
SHA1
6f5952c168a15b3d48be16bbf553efda0cb8da76
-
SHA256
51f3d263fe29e827ce6a0a5b757ccfb851cb9014cd91a07fdc4ab79cdf651ad4
-
SHA512
e36739c17f2d940905b5d66a229d86bc41c9214a0769598d0a18625744136fe503ce68ad12ea079ff47d3d099c76f663ba635e958ec348a75f906cc6b87285ba
-
SSDEEP
768:6W+6vKIcxKCYhtrlejrhLfH/Uq4sQG8G6uiUA/fphdG7q:6yJYYhthejrhLfH/Uq4sQGdQphdG7q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05219e9d720db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435360797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{118FD7C1-8CCB-11EF-8D08-FA6F7B731809} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000d051e48ad63e6a491a33d04411608eb22e2375aebc645fea8b722f4702c5d9c7000000000e80000000020000200000006d5edbca507f62d3f5a50f0ba8d72a0f9662a3328156e0699c468c6353e3139520000000fec61d361193813985f4edd637ecc5c977d4ff6c7ff77551bea2f3129e654fed40000000232970570b563e554127ed0203b8d1778f88a42bd7ff888c379959111427abbb420fb6ebdf2de4810e48f8193cfba3c59baf8c69ec81402c2252aa663498ffc7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1640 2104 iexplore.exe 30 PID 2104 wrote to memory of 1640 2104 iexplore.exe 30 PID 2104 wrote to memory of 1640 2104 iexplore.exe 30 PID 2104 wrote to memory of 1640 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\delo3m.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad4b294ce2519b63fcc5355b8133101
SHA17c681be7338916bf1297d44823ff83edcaedcb72
SHA2568d2e26c48174cad2d0fd825dc4ab7c242038c151861efb7813c80edfac04ba7d
SHA5124eff3c11253eaf5a53f86bcd748cdb425be11684aaf6c6ebe894d848df78051dc8fc77f905e31c1dc57e082cda9c0bcfb41c8020e40a0c67d931655c3c93279c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47166a27142f7ae3aa617c68246cbc4
SHA1e6fcafac1b8b9806c55515eb086bcec043c0996a
SHA256b5fa2f580cc0f02c95e0f468877451892ce86a773fbcee66a029d13faf489218
SHA512f5b85b03cc2fb386ee8135164bc7d6873b7b72d133ce6596a19bf5acd6608748ec137faa17e283de1d7a28c44c021092038971c88cd62a25e615000ba0dbf1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1351ccae24c5e67641c3293004079f
SHA1f252fc29a9fbd5cf448026b5e54fb2f544cf2eda
SHA256583e8e322ee5540b625599a267b8eb50c0c7fffff1da8e9df4ba9278e2a0342e
SHA512dd6e03652cf07ce1f052f4196d532ca81dbdb476a1264d71981c14c6ce55add274fadc262d077ec491d9f720fbca44648c47de3d9b6e89c225eab9331c2c7227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b15bb9dacf01409d6f002611e82c88a
SHA1255b7ebe239354d774c14e44ba2fd85a3f139aff
SHA25664f66b4c90ae4f2bfe2c1d5260a611ecb9cbf24fd5ead212ecbe3dde4b0470e8
SHA512d43260095b9df53e46a250aa38b2d4834c78033e863cec55c3742f96d5ebda5eb6ca9dc0aa61edb4e8e1ec3bf1ca9f7e32e4f5a7b16ad173515118a9dbe1e2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b58295f031afe726e1e05214f02719
SHA1bedbcf9eb3ab6b297a6fb5ce5302f9fbcd55d950
SHA2568c5ad68261a23cc55125e409807749f3511955d2648b2f25493532230e541b1c
SHA512cd8df9614eaf2a0fb44a279c7f28b95fd0e77199985cf2510d5ecbc4c69540688f272d454f9a2bf3889912e38cf3d7a124a543baa897d2cc9d1b91e65d07b766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ddaf06c46404d6b607d86489540262
SHA135a97258cd4766d3c5852c2734ba7411b25204db
SHA256ad48cab69a354aca8c532b994beb46dacf5675e41225bf31f62ced70a3347a19
SHA512f3cebccee263b0148bd04ca22220f9dd377bacae90c9d477b2a2dd667b33a3ac844e97c6b0763f09c270eeae69f51ab5b2afc81d96c84d2bc603499d4cd26e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555358f66d65da7cb7406bbf9c682d307
SHA1703191e27836e385ac245bdedf43e6d06ac4d428
SHA256848ec96c45ce0975f3bf6c990ffede7f90e6d1bb521899ed5d7cd4017a344849
SHA5129df4f7a85fd1780702d6ae55df92ae0041009eeda177a4ae14f2552e1e4031e2ec1758515f3eca4d0cc3d38afdb8ac180579f557ca50826d04745572f010a97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5decd49960ef33ec3f218cd56a6830ac2
SHA12a8cd880cce593427fb8b8299f77266ca40e5179
SHA2560647d51bca61824cf2d4c4d6216c05f8f4b34a7dc29f41b100e33b1b175ee07e
SHA51228d13815224d55cf276793dcf4ac1fb4f2804589442142483cdcb6a72a97f27c81365595a11181bbe9b123df2b5e6f8151d8239b9d532d57a7fca38a19e2eb9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97460fcdcf5d9c699720c49171795eb
SHA166c32c5df8702e47fcd4a850629eb55d0cc112e2
SHA25674fd7c702333148760bbb7812535e3f4e43fe0948206a490444f29b8bdef1231
SHA512058f652ca90ee747759a75caf90ccea7cf20645e91dda64171e3084b203a855d37f03d5bf9613cc78ae717e2c72d75adc267df480e006149832a3c48e937de74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bda7a2915f21878a3f9f92e73dae70c
SHA14ed29012af02d0a0f82cfbe3b2c7d67cf7b19ced
SHA256e8f84e37d3ea24ea6b615fa3d06a6b33d37eff6e3987cb2fd7756bf19ce0122b
SHA512938c5b21fc8b8d455dd09f0ed4a626da8a29b755b9c1eda6678e605a524354f09dedd735e9765feca0c2d4836c2083eb869060d3c9789a888e807a25188cd074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d95b1fd646dcad14c9bcdca5582ae9
SHA1542a08d71b5768990beb7a8d2a831c46d0b73b9a
SHA256c8a7c7203021ebf534c29fc15a1317975546c00437f516450e2eaf5075768410
SHA512c01fad3c049db764ed60fe849bb19efe11c8cee67d7be90b8ae513d006b86abb05564c81394138b2efce04b4a0299584aa04d24695f78071e3bd4576539ea0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231cf0ec3b859f935de8f9320db3b14b
SHA160687a5ddbc6ee560eba693aa6585ea6e3db306f
SHA256f6be3ce39402dffd2575237ff93ea9a6a083425346e95a8d20a53d9a073ebf61
SHA512ef7484a28b3108324c120c88911bc745693c9533da03f9ca4ff6206c4a2f78fec2ba52122c9f1a69f4fbe5fa058cbc50d94c903ea921c18729547c66751b4123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a90c45e592109dd4ce5f7324b072415
SHA1191fa3860e82854ffabc82f9af97cf4315ca473c
SHA25672ebf16ba6e401fcb972ef6528bf74e4d8c143c760a47d16d35ebeb2f0f6b59f
SHA512ca4b8642e30da9a480d14374015c27ac1c83f0809f61814b06c4740d6c22c12fd6f9af5290fdb2b95b15a11bb98c3c06b9142a3fcd12f007e7f45ef0c11059d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f67558dffb782d694ae998f44811f5e
SHA14a9ab40ebebba85f6ec1f96d20e98ec225287da6
SHA256bc9d66f541a79e8689a35467b93e08f07fa5b6e13513a69651913ca5d4a4e30d
SHA512e366c7f96f197109416fc78bbf2f7624ac1a6797faa9b9795ac73608fbdd7e92cf59c592d9b87022e8dda13558f6185793a22a131006bd46bb6e3c5e1326fe83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f8e030455b08376fd0a1866401cc3d
SHA124fcd498b291d896211b2bed9fa2c5dbb5091550
SHA2560354ef88c2cdfcd35b3841f800bf99a57542ab623b11a8651e8dc578bc75ea0a
SHA5125b22aa53dc3a4e03c4fea44f411323a9cc47a789007ead3cfbcf82732a5746afbf2c9fcb880d2ba2532e48df165ed2b4e4e4abfdafcdf53d7d9b8473eebce59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5affb77e56f49004da6d36aac4acfe65e
SHA1017855e52e2ec8e1511d018d4fc970f41b5ced55
SHA25661caab4625ff43f9e2da5231dc1c99cc6f76eec0e802e57b3d50df5a0c75c86e
SHA512aff6c3bf83b391874135cbbbc223e46aa00266286142830302970918a7c25f58e2b37fedf5fbd54d468130818eab8935dce5e3bc2ea90986c58d898025f364fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0aed4d4026564cc2711a656a8649d8d
SHA17e90b5aa9f95a4d1634c09c2d841addd1ea60e80
SHA256bb22ef99b91359a25e01dd269ab75d542580d986c579fd82cfa880a6b73e2962
SHA512f2c6dfd9565135b0e593c2ee0512371d40dcc5c10f68fdcf14f024c9e2dfca50a9cf29505352532221e88ee352d2f1a7a216523fb88c550c564df7dec11f9e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d8bde97019358e6a55070b6fe007fb
SHA1b519291fbde8089fed1262a44e0bfec073ea833a
SHA256ab5b13cfce8c6ca90daf9241cf0790a0d8a1c03a0c4a9f3300a317c6ece4f72f
SHA512b6faa45c89d993cdc22d267fd8f652744d4db9301a32d667cd44f9c577bbe98d453fbaee76867de1876e2cc753d83c02ccbe585fe81cb20fe2e1fc727d117879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054bae47792f542ec361c8bbf1c42f3d
SHA134e02a65b3aacfc5c4780077438a8a49c80702f5
SHA256a4f416a04e04ac8ebbcab909049a7432699517e157cfdb47c5e609442acdfacd
SHA512acc7c6dc8e4c2300f04bb596ffa6f881047ac4b44a2f6422e183a4288220583c5ec5d313657038c418a7b4aab6f0481bfc92d9f21ba7a507a02639add7b15dab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b