Analysis
-
max time kernel
8s -
max time network
12s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
IikUmQ4a.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
IikUmQ4a.html
Resource
win10v2004-20241007-en
General
-
Target
IikUmQ4a.html
-
Size
2KB
-
MD5
c1ab7a98b45187f8e11cc01a171d0ccb
-
SHA1
2f0e3f7a3207eb9c75e803267f200c319ee085a3
-
SHA256
80b1bf58da8f02fd10455f52bf2e3ea66a8ee685eed6d357c2ce4959d8c33f11
-
SHA512
b024daece995ceddc1c343b449000b6ece9425538f2ced0de833ecfeeef2ef7be2625b0721632c7cba2ad875a56f2e417b6a09d9a3016151aa2ca485a0909000
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29B08E41-A6EC-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2096 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2940 2096 iexplore.exe 30 PID 2096 wrote to memory of 2940 2096 iexplore.exe 30 PID 2096 wrote to memory of 2940 2096 iexplore.exe 30 PID 2096 wrote to memory of 2940 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\IikUmQ4a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b73a1b83973a3da91073f78993e84c
SHA11b4c6e1da7e6c84bbdecb04ced9328f0446ab3d9
SHA2562a04b85ca07a8104578a0ac64742a2b177765ff19b0401fc2c5255c29d36bdce
SHA5122f4ee4a760ca390ba560ba492a8de6cce14be311e9340b0b4a70621a359d841ba479d5afe96979ce8cf1f20a53d7b90df51431c58d6a540b677acacfe5dc9cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501eee9548ee20b773ed83b997aa632e6
SHA13bb78f4ba6475fc3df869ddc912fccf468f8903c
SHA256fe4cc2d799328e9234877ea531d4726d26739f16daf641b22b742f1f6c1424d8
SHA512598ea512211c673f860f0156fa3128db892363abd8f36d9dd182c56c8b5e6120a6f5fb08fa43364c731cf015e4529450d3a8be81af2176b0ccceddd867e7dfe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda9081833f66809aa0f2a0606365c2c
SHA1d95ba777acbaef12e633738b391ab806c74abea9
SHA2564170e09a38c1bbd97912da978e0305229cff95871e33df93f4b7e843878a3071
SHA512e04aafb377186be0fb0c7d8af3b2952454411479a30489d15620c05bfbf9646ba4883facc232dda18e26b8b079e11b73bcf915143fba8af073a3447422beb402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65baf654abc6464f9df4a98ea9aa496
SHA1e861e43cffa5794f0ac8e0e0289ad89aecaefaeb
SHA256e1bcc3489d55477edefffc36daf3a1f8e4972e91b375c37add20e6c94ce0d807
SHA512bc2c9cd9ca31bfad7c3ffa1a08cc2e67f7ec5c088e14fc6b83090bd7aebfbfe13de3750432ad864de606f5f59e48da3992915f0c724d001ce1e9c658c0ec1333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b10dd84b19664a4589d5176da931b8
SHA12d564bc65f1fabec394b19d1857e39e684eba4a0
SHA256eeceebbac5a32ce650f8cfc663026f849d01e4b23252cfbcaff6365f6ebbc2c2
SHA5123e7808aa58ed9726b39b39c45237b716a6baa8c407ca0edbe7311735b1dbc5a372f2fc87c90e827ace37036d41565cc928c924b0c7bb95ed48a016de43da521a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e898b7805a7ce7bd1bd22238f1721055
SHA1993dd022d82778edab93e16d36e8f35b401e5e83
SHA256794512bc2ad36ff1728a1c6f8e91cbac1fdaea97063d64d2329f8222e04cf8fc
SHA5129980ac3a474861e610f1b8026b80decdb3358d4b7fe387bc7772cf93f0fb9bc3d838cee7990bd9f671509ab47ab68a296bf2afb42be98697826948c674609f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55192ba61386b9decd2eb79b11f307f46
SHA1ae4c6ed431f31722a87df196c05a637f6249e033
SHA256af67ee3255c43523e577531113f28ae0dbfea2e6d6f2ac78653ac9540cd719d9
SHA51272bf22653eb23ade4a58c49df600675cecba46f59cbc2ba358a7611d2c23328f02c635104a85b1f8de76a338881efacf56536f4eddc2acbbcb9d131428b0676e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250b7f8650bfd111b9545874ae728a53
SHA1b8df756e772e028056a52e9c8dcd852fa0f57505
SHA2561209b73db98911b4d70fa6be329dd8226e7727b180e04eb7af5cb8715953a141
SHA5123dc916e3ac2b3d36182ec86222c680249439ecb720987396dfa19828699e5909bb129747b32fe1a89ef2b2144a86128557bfd584cbaab9eeccdf8a888d9405ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d287ccfa608ecc6e3ee7e648394570
SHA12bdaaf5003cc064d253bcea248641e019064e687
SHA2562a16cb76dd8bff0bc3dd4c5e412649bc3a019eac8369df4917ef3aec47534577
SHA5123be20cfcd8f79d58dffb3565dc3473d3fc9ccd8f1ce253407d86c1b03af19b3cdd4646889683ec5850e51823a64d0b202ea81caa7e0a4b6d583c531b81948143
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b