Analysis
-
max time kernel
361s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
General
-
Target
sample.html
-
Size
20KB
-
MD5
1cd398b37cd79d0525a64c3c97f62f27
-
SHA1
b3bf66761f7da6c05980e652ec01cba1cf86a909
-
SHA256
f296a46d5015b4dbfd8cf4e915b39b3c8a7af38dd7486efaa41f0b8c7ff13f0b
-
SHA512
504f71eab4b6eb43991e4b84c3bf9088fb57b450496dd67ea7d52777bc30c060ed1011a3db3a5ae3020d28caef0af670bd56d74d08ee3c6e0d238614fd2ffa12
-
SSDEEP
384:dWBHP1lVspa1ocy4KT4lbGaXMvhpNhETUNNPro2REu4Y0wM1OTfm1xCejiw:0JX1ocy4nEa8JpN+TsNPrEu4Y0wM12Yn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101b54a76e29db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436305152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b4246d8e3e624a418bec64a023311ee20000000002000000000010660000000100002000000063c9ee71c444be5d701e45a125f2a2a0f6766f203f1a2472e701f75923f54bcf000000000e80000000020000200000009e3fac4ab904d597f84b66b8426c27f096f740b759f927a2254fd8d8a3c87bb920000000db4360611b7d26b87f7c1cf38f218c84a60af73f886b015cb6a351a2bcdbb994400000001d29a1f1024aac54596756596ff136194fdec68292f0915a539e22611aee8918465b3895c148a45b630a15e7081c9824eaaf30a9aca60084bfb13da5abfa4201 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2D0C3B1-9561-11EF-81FA-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2312 iexplore.exe 2312 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2312 wrote to memory of 2840 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 2840 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 2840 2312 iexplore.exe IEXPLORE.EXE PID 2312 wrote to memory of 2840 2312 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb14de93bd4865ac2e8338f4b5c2425
SHA199a5d1792f2f736896491998e66448d72b885e2c
SHA2564bfbe84dd424cfd830ff36895bc307efca04f70e2c801ef5b3281e97f84c7fe7
SHA5125209e7b514da2ff113d1e412f2b27639433b22ced3b4cc18a06c7ed5bbf0bab3906c018bfc6a9e6d0a58adddbbd8dc16b8a1d09d7297f9f32c48e059526a879d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f2df5538ea3d8b277ceaca8bfd8a74
SHA1218e0a707d3d7c1da68c7d0bc2e0ce6e61856e32
SHA2562b0478938246ccc5ee648abcd688ad047850e67bf4f04ae7fcb5af211d73f0b3
SHA5129010c6f7f3e9eddbe719a4017550be49e050dbe54963c2b2d7baf1eb63ac595de821855472abf57a65dba56917b015d148c0322928a73ee62803a7ad159f17a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8f3f5b20f60ece579d5145ed7440f6
SHA1c772efc7ed1f210c89c0767b06741fd9b100a0b6
SHA256d0ceee7df466eba323f8232ae16a6fd66328e707d211c42e2531bc8d19f98070
SHA512d71c874860a3a286433502d3b370ce245a6a65e6aa806331e67c3cc36649c2ea504566c220e9efacfa9b8d8754e71261fb66e45154be30b38fc83d9f3631a658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f084b11128182c3b9fd736a98273aec
SHA104bf67b1e2d3df3524b199b00252a8df1c846220
SHA2563c1e62919197e812f64411c8c42cdf5797871e5a4c5269405d4eb7571a9aca10
SHA5126b647416b5d86dbc44ad0745519d9ccdcaf6000471dfbb4878cd57330571fa79551417f27aec3c9ad28bfabcd0b87687c632ef77f9dce479455578238d4eb2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc107c02225b16a8bafe3bc8a5abac2
SHA19fc29dc7f05c40913e3a4cee8c00f623e185cbc0
SHA2564f1100411a18ac259141a701d270c3419e103b52f8431a06dcd6501050b0e315
SHA512cab1e1674beb08b01d26b92d8f1a23e2df6b3d0e40786cbcaba790fbfcb8dffd2ad26c85e4e7a167388ed7497336e5a8ca0935314bb6513cf654a646cbe4f50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598847e75d9edfbf650a2e3e7b88a7b7d
SHA1b502e72ee6b5dbd646e81c1bbe1e2668332f1843
SHA2568058668de277e4df45434fd6af5fdafbd469614157689f6d8f000db1fa838679
SHA5126d94d9b603476dde19b620c02db83150067df121393f2baea1a19933819f5943f768751cccc4ab7aa1b061f9a3c44890d3ad1a2e69dd5fb8131ec11d9f97fc2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57871b2637f8de70bda98ba9d25589db3
SHA1ea8d5ea7218590fc3331ff7bd430d2d9e91c37b6
SHA256b924c60ffbab58eefc8fd6405984d7d27b5474ab49a6da5527902d664eb8068e
SHA512cc661d52843a3de712fd6c103cf1144f1132e0b30e6adec39090e4714c80602c4ac2bcfe2b2d277919b323be7928b1c5abde7559636060291372933021f47734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56794d90d0a6c118ac4838504b13084f8
SHA11182e223a5919907547bfa74a9bf9e5936cb65fb
SHA25681d1e77dcbefec77623cf054ea25520c8e3b6a9a1a317a14fc8cccc1edfb41f7
SHA5123051216756e77d794a782a50b6431bd99424a23147c78a183ed0b3dacda5de2357b46ae9c8efdaf1338188bc525b5e90af47757c2c9c3857ea4ca3b3911c4017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a833b5185c5238d5ec00733b98ef47cd
SHA1c469c9b1cf23a6f949f7f8d1c49ae349f816f208
SHA256f1e65fb6243aa6e5148d569bda78fd027dfeefa09b96e33fbeff14c4b1184564
SHA512c8812f11ceabccbe10cf1604362869e1b6670acc18570dcea0cd66e050e27c73ec7c93c97559b43e5fa723cbf40b5987ae029b1bfdd5246767267e836f34b5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc789527f5bb46ace4ac7b0d6cd8ce52
SHA18a05721d83d086e51caaae055bba70a5a3037544
SHA256f671173ed6548dfdcf38b44f64c2c506897257a3c0987ee9384f7cd3e7fdfba0
SHA512abff52c82f8cd23be049a940a2b3e6c4bd07d5ece3299f19ae5035444846640ae22b75d953c27ffda31f75d05e0a39334daab91d1d7484b1b9a85d4e5ef11963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec57c25804eeddb23da76d51a43ba09
SHA14b010bb39f0d4270245cd67aadbf60cc23aef4a8
SHA256ef00195722c8e660cfb817d884fcfa379ab42bba3edccb73380e6f59abb77f8c
SHA512dbc072bdf49c03e651f1a5bcab3d6826183eda03d0044a2c9fd582665a8a06abdfb544b3ed5812a4aa3be7288029fdbc27973b89da30af4abdcbfb75e7d16537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556138fdf9bc59f2720efafdf4cf06205
SHA17a16349bad5aaa4dc148088d7c958c501b44a846
SHA2568cde7112624448665c1257034a9d4b9b8860ea65f1db8f824b97cbdda2fc4118
SHA51265be761308e106162b370997d54e87732f57979b31ef0b355a78c8457d5f772bdef8b4b2ba6511993182ef5d024aeb32a7c07ad47a90688d511f6b646c032553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c4c2a09512ad4d73a87f8e9fdfc68a0
SHA12c8a68cf551bfa3d602b0c92a49587c20230eb6b
SHA25615565220e057d161811d0bf442e0f04c4b5fffc9a2de3ab503a051722bdfc03f
SHA5129ce476909db45dff2441f94a54203ca4ba064c7d62f722fc43c75e5d6fa5ef31b5e57978b214af1b996b21590fc47b781e17a458bfd0fe00c9623adc480a52b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b31c3e1c7dc7484a6bc339ea6274ec0
SHA14d9383201e3e8f4dca00ee9f66d6bbd873a9f2b1
SHA2563b841cc934735b8d008078c36509ff4c8d6dd206af5760c726cafcf1a79b50b3
SHA512278ab2ad13927b07a708c1d41f1cf06c61ac84e2a775476548fa35d6254e3b02c5653883eabf53139e4807c52d50556a0842908d6779183f0740b387d29fa914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba4bfdfcbfb33ad7d6bc515e2d0268b
SHA174217b94c4a24575ca2c511a3325fdfc658488c1
SHA256324b4a76a40ad3aff050d8a4051f3e1f36980a8ed170840efa24659ed0ed2757
SHA512c7d685f44a18a3590418ae479171aa98a43c19be9596ed34e9dc693e56be6469b6c33105574808b226828be4e1ec9238d121f211cb63061b56df5e4f93db7605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb82f5570b7cf8c5cef5b8f696a94dd1
SHA19ee390975e1000a0d877499a4e4733dde01f7f79
SHA2561adff4646829ce53a6de9b29621ee34979cd7255fdd19e0c27a28ef29c9b9f90
SHA512289d90a86efaf9130df4014808784e1d24df4711aa659b7bb55fd00dcd5c15b6cae0b988c35416bce7158d6e3f1c2f5cd2cb79e9913ed4731774f23a57f4414d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9c307fa08d34c14c3c90d048770bce
SHA163d14935ac9a1383d9bfcba892316b50de998056
SHA256875b1ecb1fe75036bfa9a8b3aa701f5bc797ec6e278b512ca3c7c3103394189f
SHA512b9022d146e8c1717fcc43192da59009fbd47be83717560f420abc800b00bd7a6e90a6e1bbc24e389561dccd525d3150eea7ba87b96b74658edc886abfd318f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea128e800a3c1ffbd6e19ee230a6404a
SHA101d85e674994ccfc43abc8db73770697403d00d7
SHA2566352ec172d7835c8c4e876e1fb3add4198e4cc9b56a3fb5112094541334d37fb
SHA51204e26675d69fa61c59ed5fa6f280225892d66109371e6259c9aebf04d3271906141c7dfd516cd18bfc8589078073319839dee927f2d57e633af5e656759b579a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50495e222ce2fbb64b117dd1c95be59de
SHA10b4f8ee697b847e3b91baf76d465806dbc99ad4e
SHA256518499ef18b7071c6fdcf017eb4b0f146ed7cdc131d983de1727f40d57ec033f
SHA512a1189a571d586110666d912d3828ba95cffd23d62a8aaa9dd55c77eec618a593a6a1905f9d9b272adb748d9a5b89cd4d5fad34d1986a854412418f911610a298
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b