Resubmissions
06-11-2024 06:32
241106-hawghswepq 706-11-2024 06:24
241106-g6hpvswajf 1006-11-2024 04:29
241106-e4bsestnhx 10Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
script-mad-city-7.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
script-mad-city-7.html
Resource
win10v2004-20241007-en
General
-
Target
script-mad-city-7.html
-
Size
7KB
-
MD5
5d35c07aa73b879487f5f582f1eee2f7
-
SHA1
9a239070b40e8a8d6fee6276c9bb4d7baf3267ac
-
SHA256
fab320941a27be2dcce314470f9df44e72e3fa96432900a0bb5075453fda384b
-
SHA512
16852de31ca0c9f5a4618cdfa2b113e2866ebca07c23fa8faa3ce13013da9ecec138df63c4043188496585f774abba0e81766cc26c6ecb9cc5c72eaa77388f31
-
SSDEEP
192:PN2x2Bcu38+G1YCdjOGC4bdsgW8voy7m71TyPTN:AxHu38+GO+OGCkQ8Qy7mhWTN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000003000e470d1311e6d84ef5380dfa7e451dd2c802f864e0bf87ae7ecea1cbede7a000000000e800000000200002000000019630f3c05a7bace075ff6e981db36147fe969a8b33eda20a3c5e3d56e57c3d72000000046d0ba004b99c579475504df82c987c097d9f5a44c6957b3905181c64c30173540000000e9c8cfa538843eba6ae227690e7fecea1ba2b30fa3ca78836b1c97188738e2b72bc8cbaab943a4b2911882e09950d40051d391a24679c4117f3ea15fe9c4c8ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20865cae1430db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437036168" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9B8A6A1-9C07-11EF-8B3C-EA879B6441F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2604 2556 iexplore.exe 30 PID 2556 wrote to memory of 2604 2556 iexplore.exe 30 PID 2556 wrote to memory of 2604 2556 iexplore.exe 30 PID 2556 wrote to memory of 2604 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\script-mad-city-7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda2fb386c06b0b3673e49ca8881eaf3
SHA147124d53c57ef00c14b1b80e3f1a9abe6642fe8e
SHA256d3b3da5461eef5b5a2cfa260d205fc617278219a974585d7c4b699ec0b751a2e
SHA512866dfa05b849452656c2e01409bdbf82719519ba4671677a28958bdc427d2a04beea0b9d53aea65322628221a1e3c9779889ab09ad1dc31f7a9ba0a407cd6b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4241d6a84360a31e15bd5744dddd768
SHA18e0cd72037534142a1cc2643f72910511a81920f
SHA2562dfb02ba39790609209b01e371567453eba936791b9367233075e4c9602d2abf
SHA51277cdeb37f43a6fc915e5fb27024e6839f066030c3aabc208b9a4f3554ac31148050c094ce4948cf2b072e37f2f76e3ce05911a4d8fc19d50271baed5c0d595c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51809d144fc710ccb1639db728a645f8d
SHA1c5992550a782ed858eafd6ff50bd6a7cf40ea222
SHA256ab978cd63ffbb07dddf27ebaa1bd03ec6009644574925e9e3f76a81f4ac70f5b
SHA512e16908fba9f7a99694f2f8954a40c707ec2ae773d98ab25bd6141949ef9f47220f62da88dcdd6734434c615c531f55fd0778473b5d616ad8fefdab7ee2aa6fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ead9b4e74da0c72a7e581225042783
SHA1b913fae8ef4ad3d1e414471a6eaf70194df2a83b
SHA2562c1bdf958da5f6ee3a4174dc50cf7a46337fbaa09809ae29e19adac0ac7ac3cc
SHA51219cc8ddac0daf62c944cbef4636064d8fc215cde5d2a77550290c192b8fde5c9ffb2821f8b3870a6fed0d1674d6caf7ca984975dda353e96bf66ed0606fddd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a39a58e1432b18190000da1c7e226d6
SHA1c77e95af66807179446c27235fb7fcbdbc9ea6db
SHA2562c405811a012cc65addc237de23d75cce4592b2ae6f2f7c7f2cb6bd999aff763
SHA5121c826b3780a97f7959ab621814fe2dfb07aa0bdee2e13ef36a9349a41c7cbb848f441b9ab3ac00729dd52438dae98e01de39067295327e6eab363329f6ccb357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f34a748a8ed65afbecffc6c72698579
SHA141b10cc5761e45255fe542795430611d0fc3945d
SHA2569da1c659353078b84b6c7db397d1293b6a8b92a11d5f448696567020c90ebab2
SHA512868f9f31aff51ec9b5d100c5e668a2f37662783fd8f660c37fc6fbd5d2a49bd3d60662f90dbc35b866fa7c71c86e8b0b752633a4bebd19bc2c5ce23eca313e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beaf5aa294a30c1dda083e6014c91dbb
SHA1621ed49366ec138953bc7f9fa2f035e9c108c469
SHA2564fe713180a25d7af492c203f91e9fdb9cfd01c9013ad17668690f7e79276fe9c
SHA51234da11b7d84d39650a47307343f34657c753b09614be216299079e77423ce1a51dac685b81defb82c0ee485b0bbc63ac8c00ce14e5460b6c7a3e6d6488c77b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe4ca5936d4d1a234fa1db538acef7e
SHA1c2477fceeb662a3f9d9db54e140f8853a3c832f5
SHA2565782486519320ad0eec91ec9474f05aee9e0f2ff3da7d8d58eda34666dd70465
SHA5121c7a95b8813663344c35a6027a557b83ed85e7e8ac24270a3dea6c55a6b8461b7db1d9b96989e47fd02cc344f9fbda393db85a8c4a79fcda3ae16732cc06f59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592187e76c243cafb645a3dc2c061147c
SHA133c9f3081cdc918be5d555dd3af503ba348b6696
SHA256970baaca7cd0d2b06e328fb35840ea87c77d823b95d7de5b67288ef8758dc6ff
SHA512d18027fef8e7f5777741de3941ee019d75e569def2230f493f29ecb27dc994defabd23c9d85fbde31ec1dbf2bec87c50a1686c1cb4ae985dd78b223acf237845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff7af46afeb16ac4bf1993c7455459a
SHA12613effbdaf14c82d37a8f375d0fc385d83f4077
SHA2567da7af85441d7409ee0c0329295011377448c84a02075bf18528995b0de1de6e
SHA51229a7f716eec19da105c377e8dcf57b9dc02b371cbb72b4e80ece42c509429af8d89e176df4c2bb20862dcebab5e238fca937cdebe003b3b01ad471a03e81245c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c291e938a2fc149027549abf42081165
SHA1a173afa28521a4d03916d1b6adeb0617e76b3a28
SHA25622e23ffd98de68bdf44d272c2e7dead295b49f701931699b5492307d0dc0b77f
SHA512bcfc7d803b2d7021478924e9691a377d671edf122f7ecf462aa994781952958d34a8fcb2ede38466728847192cd1c79d9720cf1c5da8a0a94e4626f14a8447b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e41248432b7b57e488da4f6b1e3360bf
SHA148bb258e7f3b73a5126f7ad590f75119cfff7998
SHA256b6c799f2156731b33407870a7cbdd2ea178e93e7036c4cb7b28b832eb9effa5e
SHA512a12112597727b576d2fcdea9464f9a3d4b18f5648f57bc679d4f953ce909b4ae088470ee09324f77bffb942fd2e5619d9c83686b15481587ce340ca9dcbfad5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564489709840870b7b219a92f1472c7d2
SHA162739b61c1751fae025ab9130e30f57ffe971a37
SHA256944055c8cc12b7ed758df68e748f709a8ed4aa690ab7fdeb20ba00cb4a78c87d
SHA5126363e694f96d0f12945f514b4c1f822dc52bcfe26f2732822ae9871f707ed5b1824d4ec2d1e8aa8fae7854940c3a6c9a38ca81398895e77988ad114e126f968a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f9bed28148320b83c2c674d4ed7bb0
SHA1a4ddef7552b219f60ed4fbd32a93c8b2decf8221
SHA25657f488ce368d3be27c2ba2340762074675a7a70d65d626d7b54b077428fbebc0
SHA512cb38a24c3e758c678fca6a1a50ab6cf9638ee1549015e4abe54d1cee503c2960fa7eaf4bc73a150b15731fc9e6f0d666f2f2432e21c48e9d552be3cc263bff14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79d7d1500d1d37ca2cc4f879c7d664a
SHA1ad7665abb68aa5db366bd44f134563890bae8d4b
SHA256caef617631f4c1a4f09a046f02445932a8474d761792ec0105f73d8ca386b17e
SHA5126bf00fc99af09eb2c776fb9205305cfab82aa4a430ff53bc1dc6ca5de810ed4577cd7bd0b4406ddd1e64659ca34263e8edcddbf8013c0ff7e996f3b6787ef7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e319064a7dbb6fadec0c1abb7fc717a
SHA1d073acac773e08df13094d04822b5ffb18c25194
SHA256df2ad98b87f045a51c745fded5c5d5b642411806596d80924e37d8e36ddced51
SHA5128815fda50c5d4cc8333eccca7feff70f5ee2eccc14ed394c941b88989fc2526d2d063b982833cbbe7e5f9cee451fed357b892afc7267d413105489d30df6ef92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c78ec878a006709c301c9f5d36e415
SHA15e8d998cb4ff5c4dd3d5435d67ada0679f35c70b
SHA25630d081808125e074b16a32c9d8b421e69872a6894b2f20c9aada3a4fe8749ea4
SHA51253486e2070fc58ed52f72a6284ca5c333eb81cc3f1715785723f207d067f9920bb5207fb86623a58011a8f010dcc33488c5d8cb5c607e65f677ff1bd871b807a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f856a738c86378f6a53f4ca6a94beea5
SHA1514cc0766fb293dbd0953bd5998459f0d3e54974
SHA256614d8e81710a925f9518e6fbcbc16b6153a88f40d4fe6a2c8388ab0a33e8c535
SHA5121946864507853b90fb5dc3468d578d6e951081ddf1359602c8df8e909e5c94f148eb7cbf52014e3f376bd773f43058d1016e6ceabdd7d2f36aeba6f5fd11b695
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b