Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240708-en
General
-
Target
sample.html
-
Size
18KB
-
MD5
bfe218195170695d7ce8638abe31224d
-
SHA1
ec377be28a62936aa9be7d01f498a3126392d1c3
-
SHA256
6a17463f218298687055875ffab26c88282b83c24bdc9cbd954128ebba38742a
-
SHA512
49ace18c1ecbdd8717a46873088a9a2a55fb493d34df7b9f1b6aedaa076e9b90bb1fdcb3cbcf141ef731dfb9b4722da1ac251e89437f2abc1e1702594ec5d4bf
-
SSDEEP
384:1KVWwE1ocy4r4lbGaRMvhpN/YZeTYRlObz6r0sZmL2f31xCejiw:0VM1ocy4EEaGJpNQZ0bz6r0sZmLUlxPF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a71fbe92f6fb8e4e9aababe7643f01bf00000000020000000000106600000001000020000000e2d7f8452790ec3889ec453454aca56ffbd76c4fc435eaf41b1cd6495432c435000000000e8000000002000020000000f5e6f45389359eaff9b76df766ae7b4cc220d3eff550681c3850ffac4bb7b66e20000000e5316a4ba7deef992da851d58163da76f122b1c967c4dde292b2b1d3873f6b19400000006b70914acbf51cf635f44af1be8bafc345cbea62c9bf7a4de38ffb87c9b526bf00f7e912ec25f9e257a72f028507e5d487ba7e1055e7f4955268ce1c893520aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE8A41C1-A763-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e33683703bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a71fbe92f6fb8e4e9aababe7643f01bf000000000200000000001066000000010000200000006cfa9e91c6d15af39409a9c157641fe53d5e0c105b9cf3981966f9a29bce5f7d000000000e80000000020000200000002f6aa3f2ff28a81d176a9572e30cc96e26fe94061a55575589a3c145aac42efb900000003bd7b8e09a5e35a5061a5e1748f4ed7ca1a93753e9a3b967ab72a70227d038b8faa032a37fb2d5ed2fad2e273c1317ec43a19aaa1e44856bc56139fb88c00737e1174deb55d2c8b60a8972e2ab40e534805f726cad9f49665fa6dd2d3b88b177accebe90d1325e9297a56bc8752a4e689e7db511cd0447cb9fc69e54340616b2bd04a34771fa3af114138a4ecc24b82c400000000649e5df33187d6c03a0f7976129d528b551ef292d6bc4f9d93e24fa8b05b7d7b9c09c0bb1361496f92328daa7e8a7d00deb74cedef4e2ab20c38feeb29dd721 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438285073" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1452 iexplore.exe 1452 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1452 wrote to memory of 2388 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 2388 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 2388 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 2388 1452 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e135f3f83d3870dad8501bf997bef8f
SHA1380c4a9dc2d033ff85e58bfc9599edc85c844c40
SHA256fa223e1f0a2d405f7fec75a69b3c00cc96c7cbea73d35d8bc83ae9d2a52e0c0f
SHA51293fe4b2d8128abe2732ea432d84c22866f086dae523130256f5ff4ed9c09bc0e9c8a3db70f321a4cedf16996af18904e59b118b9c37cc0489108aaf1030cc278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc94ce4a742eb69b47258e35fa6e77c
SHA151b934e5184c689a2763422c59795020fda8733e
SHA2560b618cc41851a74410e0805b23fce7b9ba1708bf35babfa711b279fe46a49f91
SHA512f97145c0d6043245e34e6f192fdc8bff7da2e53db8f125aecf8e997aa269b5c24327bcf7fc8e305047a1936d24e89fbaccc6199b6f888d36910689b1b606997e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59370e871847a2c90fb3bea021a6594be
SHA1514d2f01b957f2ffd7b4aed3d692a12193c3f053
SHA2565bb76adcdb6415c9b643bd817a18b013a9c49a9c67979d88e180dfcd43c16a6f
SHA512cdbebb4a4f02c69290e351a698120ad4708dd0e3b226ecbdce1e06d17ccaf362491adbd6b6bb3fdf92f96c18660b6e5e86095d4f76923d9255f3fdd730679feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564bc3355a3ed59004c83cb9b9cba511b
SHA11622bc26dc809721be5da5179383203c4e980fd2
SHA256a17ffb85b1e839dbedc2890f4235d2ea85cecade2e689cf3e0b1f795ed8340c3
SHA512d765517bf693793a2f7c47ae8bd980da0120db71dc09f5aa76dc83210efb3d2697c53f10d317f538a0528a1815519c0067777c7119e08da0af21224a425f85df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e8d7515dd444b2f2cea00cfa026a62
SHA1d985f5990ad074db1b3f855b744e0efd0bcb6fe5
SHA2567fbab2f57cf85bc2871f64eb6b73590e7431bf156368702959582eb59a927bfa
SHA51259b4a7c33a3341053a579a30cbd608b1a1521ef8d056ff03d2e6cec4d7bdc2945dc33c5bd0098ee5749499878515eda2d5fad8362b9aaeb236afd2139f0de988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbaf304797cd86edecead739b1079ffb
SHA1a558978b3a13563db8c4dca7991458b13f9a3499
SHA256248034112d6e3e8873a5af90ebbe7d48753190187dbf82b35c228d34599e0bab
SHA51218e91164144fef1a48afb826856441f8433cff35ba153accc5dcba3e7bdf907ebce6717253e9af5aeee7b2c7d23dbaf956d8ec7ee2cea6fdc1ca5de0dcf0707a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8970dd488cc621404c5b55d70bc264
SHA118f4ffabb52b158a150daa161d535e202e4e38c0
SHA25684ede67bcfef0b04a76c83398333de5310f36b656d7bcbb6f9d762793a2a21bf
SHA512b325bdc9d05c6d5d3b1e66e6e1f1d9fdaf2c7486ef2f73cfc94fe552b888cc526bdc59fab30656c92dbc1105d79d85497ab136b311af54545697ddc9c0f28e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f926ae7dc91d0d051712fd2b5c009f61
SHA12877ba8354b55a8ad02439916d8cc9756e4050a6
SHA2562b49bcb923426eacf15b7103c597411cb4dcf2fa9c5dc9604f2c1262d028729b
SHA512b9a1a24f5f0c3c3788d82c3b5c21337c8f4424a7f7e91a2017bce90b009e75465c33d143b8a5b769e516682b3c728ed026fc3387f83509598090b3796521cd7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c4262c421b083730322d769fe3ac5da
SHA13aa4a26e8509bae38b6e4fa1c6c84d72413ccf21
SHA2565bc517ea75dc97ea23901c5cae5e8f668d1266f46089fbf5dfe276ecbd4c2fc5
SHA512609c2c689de0a016acf53b19d9c904d2d37360536dc3d01675d6b48fab45c9fc43bceb387f1f5220e9f8f262c2d16e1602586324d8cd77031d4965e77d8eddf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c346ff17fb9608b823c6814a2e4c1fb0
SHA1911babb5a169060a182da06895a66799b16cc218
SHA256da493bba293bc5c8cd8acb464a4ffe5a30ab97440960563d6fba4619342c9fd0
SHA51263740f395f74c288da88e0d40aa9244df2d4db9c19f1a959d6e41a62fdca611ee05a93155f4215a7c7d552965e3b14b9442d605ed7e49d3bd37179dc2040c9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57dd5fa79ec706a66d0f67f6f9f2a37
SHA13b8ae973364cc5c176eed817d72b54b2eaa98fb1
SHA256c477e8734f94e4735f4273590155e708023da0c2680d3a00e8ec6ee2f8db95bb
SHA512ed593a890879e015cbc7b400eddb82e0a4abef9fb9beeacc585d571ffd06f5064894dfe961c81d90870cd1fee890f4ab6660e4de736ff5bd39eb37eaf27c74ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee074c23c67e15316d31a828d318b74
SHA10e055ba17c61c8167240e009ca2752828d006d05
SHA256dafb7207f91a845c3d0820c588a650e290adce7e1af60509930e74c7e579952a
SHA512e91d5c82694a16624dcd5572c409a81ccce3e03f2172561a4e0e7c26c7d26a97a95d2e8d666d49ed641f1ce2997871e70be31725616b24a2ea0da3fb1c27ec2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb700ebe9a81baec55ebea60faef8163
SHA18add5c91ceaf592221e7535cb12e97c6deffda5d
SHA256a618f4f3a8e866c181202c9c11b2e172fa97afe01b18edadd09bc47028d6b8e7
SHA512b82171c6b166c6e2486ee8f561a2fe2870b115781dd226d32513b7e3d565b09f38da0d0a245d2848721de69f1f52972d7b3b320a91e5624660ca4bf4aa00cb43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578ae3a384a5b459b7c3ecd7328bde2f
SHA14834bca9cd14fc3665d25882a281d627cc775fcb
SHA2562909bcccec9d871077f3dfa37548a3e8868e23162e50e4516a02958c54062907
SHA512c15097c45e02439b26236c723ac6ec206d7ff279f7b3add79547fc47acc7aceede31d0282a4f49cfbc7200b7f4d776e667a6c0566a2841eb49c1265a3c42d9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a88a8e8547bc56c2931a148d25f6b8
SHA1a92b91edc3e6c54c00bae7c59f4ef60fc82f70a1
SHA256e337807276a96f0f86dd0c5045ce4e4d6e0e6c9aef37364e1b5628b657757143
SHA5129e90b9a47f8ec41f19ef207601a4b116c751f4173d36b9589500236c08c0b7d727cb1f481bb6d387dc52103f76d98f4a9122b38d20707ec94c5b5c5901b6ec74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52826f5b595cb4d415e16f780d46ef64c
SHA10ba84c5f10fd0496eaabc3836b623b674fcb7c2e
SHA2566c6fd4af35e9b49127c285ea8ff41d1f884d28077fe40a643be062b1accf335e
SHA5122e477a41a58112265c6428fb1c0311e1612089687505731e0c313aebc07d536a986affa3234f3caaaac5d72385c64b9b61ab660f5916ed7e21bc2b0883d0d2fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b