Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
open.gif
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
open.gif
Resource
win10v2004-20241007-en
General
-
Target
open.gif
-
Size
43B
-
MD5
325472601571f31e1bf00674c368d335
-
SHA1
2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
-
SHA256
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
-
SHA512
717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000089dd9949e27dff322e2db143b0dbb9f1878c278679c265728b2a9f6eb8afff000000000e80000000020000200000009d6e9339f6bb2dc9247c62a24fe1b4543dce56d6d8a373f494c5a767e39f6bbd20000000e975a97000099d774ffa06f45c42f99ad26a1f419222e42ec5cda20474b3b70e40000000b1e2805f4e0cffe2954b54d211b89b6341b7db33bf434495affaf4b5aa6418a06fc81745ae6b1a5d74ed1282e5475e445a80dc8fb48a41dbed9438ce18e77579 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bb3fb5e926db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0C8EF61-92DC-11EF-B939-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436028157" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2692 1508 iexplore.exe 31 PID 1508 wrote to memory of 2692 1508 iexplore.exe 31 PID 1508 wrote to memory of 2692 1508 iexplore.exe 31 PID 1508 wrote to memory of 2692 1508 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\open.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436e5b1d8e604a69a624677a3fb86174
SHA15970b7c798d4951ebb5b56ffb581183f5d1587a8
SHA256f9ad3c4b0c35d746a0beead0725ea3f1d2a8386dca0b3ad9430aca2fe44a2f94
SHA512ac81ce18a3986d598fed28d92105c6c652518adc16216bba9f6a35d6d83820c1e7b19976925a81f4b02a5b3db12193c50c8de7b172ad6e3d2d75c28afd8780f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b028006b1455882e3ca98f489ac991
SHA19528b86a15a39b9151ead69825bec51f33b5cdb5
SHA25678092cc22fb652abcd8683be4675f639699aa2de25058294ddd7177a74656f12
SHA512733f6181496da21213e165be1c8bc5d55e647c2409675218c4b59b0d9f4bc30358816ddb11ce1b87f41c6d6ecb0a2fdcf6665d15a57ddfcb0f5be4fc44847cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf84c49ee8186760bd69f18c332edc58
SHA1c184afb8aab37ffb9563a7ee9bb8ea232a945ff9
SHA25608b152b4a426d4207d88fe8317675cb6810f4643791156306b2a5be18cffac39
SHA51216bbf94748f0082f524dfc52b6e0a104940da1fbe2664c4b6ccc1307ee8bc6b18cf4a9a29c466876e66dc9debe90081b780cbd1b6f5d9107c368cc606126b40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3f7af11a561a7c7089501034f3c6a6
SHA1053a404e9e686e484a1355c96fd0c90d55026785
SHA256263b0ea8f54331dc3dfbe86084a6511cbe0c1f77cc5497354eb7db613e70ca7c
SHA512d2cf9c62bfca5c7c0274fe033ecb0ba6002aae88b28060764d4998b9a9cf6170549e399ca7fbb46e2eea5646a139bbffdd865012da82ea9897e3d4df46af19aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79b36acd58935067d89ab0b9d55c497
SHA1a213ab4d9a73463c146eeb861ba0e2fae3fb9901
SHA2562834ee11b7fa17997904c57114a5a7a0ac39f414146496c0fd9616e3d2e03b19
SHA512d30290010ee6629eed95d6a7f16f95e4939e1ad4579d256253b6772ab19451b7fe0dc122b51a56e1f0785569a2761e8721dc3f8c4f92b2d624a418880f479e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b9f7720fba75b8671625c1fc416389
SHA171035aabf0bee883b5bc30b91c0e91c2830e2edf
SHA256ee8b0be81b8a63d84e7c64c998d2ca17561bb664f71f5f249fdfb87d5763c146
SHA512e3e2fb24b97860f4a643ee5986aa04a9c273fd54df745c777ebdc4428c752002cbf1ba9be48ebd99008d8fb63b3f2d143e18d4c31678f93dedf7849621ea2159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db466cdfe0fa6538f1a462aad71e6f9d
SHA1215492f4ee2fed15f95660301ec8b45794f57f0e
SHA256891709dfe904ad190ea3caacae623fc9834b6353315c04066da1a88609399b93
SHA51290a4528120a1c7aaedf21e9d4f48feb722dedb4399a9aa67016402ce7809426d5431ad0023c4559cb2e7bd33157b96b006236e4ac10e441e112dfa7be8f07936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce16d8686a6648be375b032704e34e80
SHA188944a51d307baa693b55522bdc9352603da3a85
SHA2563a032da0f87bdf57875b78f1e482cdc3a22ce64e2f80f75cb62e34bea9d39fd7
SHA512d0defcee97c1ee6fc5fa1e92148c0bacaefc52e24fd402fcacc55e9fb683e30a70864323126f8387253cb4a015a40fa2a1ca0b2cc99766ad2db40464f99ded74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539776ab2ab1408689d530db688d3b716
SHA16dda47e445c0e4bd08c78b9539158f8a28b874ff
SHA25605ee20867ae9c8ac3910b218692e5a9b7aa40f8f913839ef6549cc1737584d78
SHA512dd59e536cfc2438dceaeed8f6efbc94e9f0bc3c11e18dee5b58cae00c92d1fa5d9870f1a8b0466f50d5dfa5da8b76e18c7fff951c321e3ebd5422b3cdaa47922
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b