Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
attachment-1.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
attachment-1.html
Resource
win10v2004-20241007-en
General
-
Target
attachment-1.html
-
Size
1KB
-
MD5
2e6312617e2f232bdcc1efd902f7a83b
-
SHA1
359f673ba89dc5c629bf0b5419b5bdd55055f409
-
SHA256
bf36a349caa481417e01ce30b3066438e1d9a9fb13f4958e70b6784a6ae967a3
-
SHA512
b9d7e8555077a19279c8d4390b910c97923fd8ed5bcb11241c4331ea3f274ba323137077562c4ec4c03926b416cdfc573612a4fa9827868e2bbca145e60507fe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000918b7988f4d8253121c042b90bd257fe2f955d37d36b54a14b89d8cbbc6a0b28000000000e80000000020000200000006e1cd72b4400dc55eea8fd6f2700915e190dfc29b9dea60e24df9ebcdb3a7ac12000000026bf3c046063c57ae6838fb8bf6ec5f79198d21cfa004d45fc5e4bb4e4985214400000005b283a359b5adedbb7a927c14f7d8cd3cbfc02134345d2ff6f7251d0bcf32b2fba57f4b447a7ab59824092a1b7bb0770ac8d18f96724b903d3c7e17fc6b256bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435372804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06D6C841-8CE7-11EF-BFDF-52AA2C275983} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005fb5dbf320db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2776 2728 iexplore.exe 30 PID 2728 wrote to memory of 2776 2728 iexplore.exe 30 PID 2728 wrote to memory of 2776 2728 iexplore.exe 30 PID 2728 wrote to memory of 2776 2728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\attachment-1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516254a96140d9171d696e088ea9daa34
SHA1f88cfca55a3e9d458baac5ab133587b5f8d5a38c
SHA2566a56a56d694ccf31c8b1dd79fedfdefb4becbe7dbbb0c97f2a1db63b1f2f889b
SHA51211968af90f7ec2c57f59eedc249ec765400008785b75463a02a6e9313d67aeb202082472c7dc4bf0d8ef1744b451921b25567fe83314135d0acaf45264798551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7ac2ed1c5211d17fb66d5bc16464c6
SHA125688cabb6a45e4abeadd90e7c21fa21c129e1cd
SHA2561258465b9070c1b5baa818c75931f7233b7a4ac5252e26eaad0578a98db58a64
SHA5123c4ec0d2024109a409b0966a2308b44bd0c2c0a73231313a413b754de8ebc516612e549076055c9afbc647521c7835a1fc5b2ca5b0debad92091fbe79c2de33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b934ecaa922594bfcfbd8bf554a0462
SHA1e17b36a7373c9c8d3730dc7b7c72551be86792e0
SHA2563b028ad50bfdbf0d7c9fc04f299b53d0f5060b4128a9172ebd4e13f686343cb4
SHA5128afe74b4e25856e62b43efd059a48ee38d92a87f3d2536df8b7c58ed600fcbeccfd8f6981a4648a9de2e04b287353c8e1c37be89d86ac7c37d494a5eb75dd43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4adcd875a21ca792709b5997913e14e
SHA101e35aaf45b19777742694a47687b1781bf05f38
SHA2564e141d3c40628790df3f4a9c73a434360676adae6bdc51010c746a4de9e0bf33
SHA5127df1976c7ee50367dc2b866deed8a263639a8845986550bee26efbf1fa1a8cb65b870d352ff770216d270c6baf5eb13511556e39d3b9d52d01ae959b0d497791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d99ec915ebff342efc06f24b7149597
SHA1b2e553f78f37f119610940924d1bf5db9d54a649
SHA2560eae0522a27105173a24fe5c8edc459a12141408bd70da1d1ba56d77fb808f28
SHA51255497c37a91bb88f4465b6b0144ef485c2970fa6ac44282da17cb492745aa773fdd6f968cdd196e7649e4088d0c85c9280fe1f208e9a36ce0a1c850357838f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e719d167ac05baee1227fd0b10cf92c7
SHA1c88e945159fe258081cd9611d527da93593a0364
SHA256ee33789bae7eaa6e3064c75249a2b2c0b0fce15ea5ba17081d3ecd9f53177ce8
SHA5129ad8a5672627c3b870ff637aa493d4692d25b5694b1a682b1b91cbe97d522227c956b51a8820d33112ed7535e07763c8cf51444b3fc61e05d5c03a24b6696007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f441b9b37ceb718154a62b916a7e8f
SHA123eab26681e60291a2c1d4298424006490bd96fc
SHA256ddfae32c858fc9dbd10e7f9ca5503f99f001643ea42ab9ee787f43ce7172e7c8
SHA512ef5dfc31a32d8d1098e2362ca94fed06757075de930fcac65c70684492c21c5e9a54c43b6dd60c11ac6d68398394ece8d07651bc79c9c1a9c85c9200fbb0b052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e6c69f5696e55a0097c76c6e21ea8c
SHA1de9d0d864db7b150ce45ebbb4eb0035b6611f80d
SHA25646a3912891c094608e92d383f47b6a9dfcf24ca9ce0984a474918334cb080c88
SHA512930cd9680414b058134e0de0134e198954e6de15901cfdbdc99b5a4eed1ea16758d7b95d9c5e876675d484e8afc8967cbf6ac272319db56ddc6a6b3edbc7b4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332e1d0a0b616c33c74827947478f9ac
SHA1e1ccfe336cd84cdca31d571d1a6b3d0891fc7951
SHA256301962e852c27a9987a74af85dbfbaf415fdf0a4cd78d2118abcd9b959353847
SHA512c41663053775e43cf5162698c6540283c8df89f6628238d8d3239fdfacf30829a37cbf36cdee9d94a036e28af81aa23a068a0f7be12dbe28bf6a4c22d18c1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510c8652a4bfb6440a3249aa6f9513d0
SHA1edd294a865bea32e07f397f89b3665163fb8f4f8
SHA2569a59e4e08d52449dacac68bba888b09b04adf2d3f39713b0c8d65482cf0e53f4
SHA512fc76e5a087cd8ec9289b2d44f8de856bace3f3ee40164684f06b667e47c0ef1bed433277b8564329cef5f71bfb860f961b22d18395548a50dfe1c66edf34207d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51872338f95ff561a16549fab5f98c12d
SHA16c438ac0f31d54b0d494050b65b623e4b7de0cc8
SHA256de207df5cddc592d6e6d89c6f9e4906ac5781871c8e3bdac774d0396ae738435
SHA51239823c0766592bca7bdd95d1654d4c9cf68a5a4343f9f40ce2ef2dbe0ce537b4faa847c3dcb1be324c300956c89a87df5c05405ed20f3d96fae47c4a41ee8c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d7374ed5109ad2f90985697a2ef972
SHA1a8eb31f6e95b3e78daa3bca288693eed7a180b77
SHA256e310cd97e95cce248e3b96d9c5ac32ce1fff01d5afcf8b3cd8311752c76fffb4
SHA512ded7a46aa21925d447dec503d91c38d688e77cfaaa42a151c7f32e1f2a4c98d9a75534861dfbf153972a4fb4d762ff977a568c497bc3d624047698d95aeff6fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bde86b3a09f44974ef8f77ec85fc82a
SHA114a525edac9371a0a6e6231c17006f6d65f3657c
SHA2564b0277c7f097e257545819203aa01db79030d82b79fc4c08ca5b325ded7e97b5
SHA51297935ebb1a73fe4f3274c460d6c8d16d9195a02f857b274368e48071da26b0e6ebaf9f8bcdcd035da36e64281134da405c19ae09f7c6b5c3c9d95e91a0236c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa6d17585ff9e8a5ad6388b0759e086
SHA1a2be04eac28d7b2a07c7210af9811af6a0f30fd7
SHA256ec6d898a10be54ee0c2ec2d5c386d5bc0a848864c27eb95ecebc25e2b1231136
SHA51298170200e6f6e2502b8f0f060372a2527d9d2c6c416b19a6c53f684c03a7492f18a34653296970be557f80af3a43e9ace485451923bf7b4745ffc8a24c3a9843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ebac5adb37c0f8a34582ad54d1c16d5
SHA10aca33b2b2afbd14052384101ebd510077612742
SHA256220e5a28ab326e21cdf71f6fff33115d3ac3511a5ce385e55dad02a21860f11a
SHA512a80ce680e0450b1c3cc52eafdc39e85a9dbd6f5d9f582c17dc767902f7e53f908868c47ccf43d5aa682643dae3260785548611f768a5cdffe1a0f665117379a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571964a923b81662f3f52f3bdc889bc64
SHA112022b04a651ea459edde71254ef719c36a0db0f
SHA25650cf1cc414447e41729d537627a25a4a0b2afcce8b6a7aa7c7929967e78ed51a
SHA5124f1ffebfdad7f8498d8b6661fce8a6b1d50685c64404f4105edd3d4f30f24bbaf0155f27b74c4c004dbade56aa457acdd2176471a5a957b3a59e504f4195b8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a59412fa5117228d01da5f5dcaa4714
SHA113004b0a6f93e61ac6f842405610d0b216492adb
SHA2560e6b62d6b05da9a18337a23acdc58b87291c24c257c5896ce5f0bb13c8c77654
SHA5120075316c0ecedeeea6723f24c2aa998e49e951e6b3014ac5db616d3ecf4c14d0dfcc21cfe1ee6add6edad577f61c9527b277a67692698de760f59abf61cadae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b64e1e08694cadfb7f507c74e233ec
SHA1e6ea79e2dc6214b0f83e2b880fa6f8f53fd025cf
SHA256d9ac9272ee570dcac81b74266c59622c77587df0e398c692c22a4e7108b25b69
SHA512915ab865f253e33b54d4992a49565fe7cb47c07961d77ef053effd05b85dc32b8a729290a6e5066c3b852def44c9c798ca3813d87fa1e1a5ccedff50b0eee65e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b