Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
General
-
Target
sample.html
-
Size
18KB
-
MD5
e71b95bdd688909e93401814d11d5a2e
-
SHA1
dc93caa18b6c59a892bd54671c858c6361c0b71a
-
SHA256
e683b909867110383fbdf1196131c0ff92fa51ff9b411722a43cc643181f8a2e
-
SHA512
e8c43c54f50170bd4581a8755203e1539df226106622db6d35b87492aacebffa501ae7f8b4f7569685fb57240c109f85be6320dfc82dbc53c8c2474113d70c9d
-
SSDEEP
384:9tTp1ocy4I4lbGaDMvhpNDabI/jlObz6r0sZYfw1xCejiw:9Np1ocy4HEagJpNWbzbz6r0sZOaxPiw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C52E88B1-A767-11EF-8E0F-52DE62627832} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438286828" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000feeae1d325b081519f7fa5d34868dbf1aae77a2b15896d16d824c623c6aacb12000000000e8000000002000020000000cb00917aeba0ba1682b4e7171d0dd0315d19392da892159af03f3d3ca75524f72000000044e88a7888f22f0f6693becec423751002467c1907b3a57c6adc4a76ee4ed3d840000000394eb466cd446a0f9cba68f3df9efd639480a81450546109e0f773ca8f49b81264ede3744615ee25c65562b31af40d1f747553a502cc17c84d698508a919eb0b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0abbb99743bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2180 2520 iexplore.exe 30 PID 2520 wrote to memory of 2180 2520 iexplore.exe 30 PID 2520 wrote to memory of 2180 2520 iexplore.exe 30 PID 2520 wrote to memory of 2180 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee07d405c26cd4fa2e92c0bdac1c9315
SHA1b90e7b67b4e5c8dbf7b46d92b5833ebccc52a057
SHA25635ad8c0e9047983c84fb32d2f71c8a9eab6a6fb3283cad099f072230b736e50a
SHA5125e941bfdf9bd4d7f6fc392c5dc83876edd99c4ab80d9a634e51f1e76fefda112e8e92d9269ec6e7fb23eee7bce94d55918a13abcd382764f30f2877ad62f92ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba56ba99e94e98a927b7e80be194c6a3
SHA16de12aac7d0cc0a616fe0a8b169574ecd3a2c458
SHA2560086393d22af4d498d092132b4348f54719dd2cf1cb84d5355305f80b7cf11a4
SHA5122a8bfdd9ebf18b1e17be7b5d460e140a14a9d529e3cdbeb1c1d1052805057c79952c9c23ba863b369d76d8b172c1a29b680ee5df323ec20ee1f3f6ec7e1f0148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117ed15e31fdc18fa8a0934a66ae7b02
SHA1ac5734782d6244127f17f7f66b66b24f4cafb166
SHA256deca59013bcb093fbc5f8489f166c8463cd7957a59fa2a6d89fa1ce3475dc6d2
SHA512da75893ea0682cee39d8178c78b63de91961c324873ef9542c6e40cf6e62d8c76a6d3d6e6e9a4b168cad184be039ab4166c487880c39006da4316d81a3126493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75ecef9b58146696bc40b014b5f1c64
SHA1a35ff03d31647fa55d40750c411805ab91b8997d
SHA256cf29037a6a99cfabdc4de5073ef853d4154fea47dbc0262099be8c5723b6ea30
SHA512837301daaea567939abe52b3ab8c70b66032aac99414ddd9b65f0b95551e1d3cb4c4ed03744e4ab29500b56b66f9fe496b1797f966bfdb5df57471f6aceacb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9981871049b3317a8c3a3b9b6fe2d6
SHA1e4fc9dc445318fe4a174d6c7ecd402d7f139e9e2
SHA256624839c2dc94b2648a82d9878e169cf19664548765889859a9ac7e770938bd87
SHA512442f74af2882fe196a77ff88918b9250dc14f8364dfecc38bed94a69aa3e1e147b7e469cabc273bcfc820e62505e63ae07612046cc0f0cc32858de6f45a895ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f91a031e0d218088e1c9ae497e542e
SHA14b7535854e59344dd11fe05a1c4f1b4aa1dc689b
SHA256d5656354a184b0d098a0cb5fb9b63d9afac420fe9178d5c15fdd3371264d7937
SHA512f6a4740b355de331eac4b74ce0f776ba9de63d38ee3ab0f2fd7b2fed060b881be89f1182b2f559c79348db9e4bc1a90aa0ced23496ccd90a5213d42cd90dbd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0a6785f31754c8e7c57fcd50e5ed42
SHA1971fa8b7d532c4b59bd08101386b106a195c4ed9
SHA256cc82b0b73ce2ddccfcf8b8ec0bd69b964900ad0a7b40c54017f7232ebda1e6b4
SHA512dad1a7ad40412bab6c81e24b784032faacac7ac0a3e219f295fa4efd651cd36a640d5ae579ef5aadcaf1f11ec4881a150bc3a0ff878b46fc4fa9fcab571e1de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb45146fc0972863cf1302bc59e5990a
SHA14658091e6a58de0eb50c3fbfe56cd685a17c655e
SHA256d424d3aea5e4c3804da1a1aabb99a82cc5908b7a309081e5fee5aa8b7114aa6a
SHA512ed291e3219649182fa173b5f621785a721601654851559e9d448c7ff4314163acffdfeb9c01a936a2b8d904041c642d0fd052e1cdda9935cdf0a6376286459fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350cd3bf726a4eeab4d32b20cdedf59c
SHA15428311246ae146eb5a05bc6950b97ed53250519
SHA25672dd87322c2f6b0d44a5fde7e9a7e3b1bac359f0ed2951156309433835a3c40a
SHA512de0c419ed9c9dfb0bacda6fadc3e98d56fec73627e0a2fd812b88bb82c1d0802c1b0b99a3d59fdebb97a3febc9de847f26eda9da1909594500901095ce96896c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d9c98efcbe5b5c071a72c194562472
SHA105940568a04a8e578cc416713db0d1f50121b1d4
SHA2562eac6610bbb2de457efcde8a49aec3f4d40a98d72556741f0e4c2c0bd55a661b
SHA512c2a4879b2693ed1d7191ae93a2cd2f18486e4b56eb5685bba85a13cdf4d9202ee76520719cb78e627a9f359429e75a080521f646d405145a7cde7aec9cfd832b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509992976dac3dc9b184c4809f49237b9
SHA12249b5e095812eade0314cc1d735921ff9d68409
SHA25628ac548af061d1e53b09ad1467a7ce12dc1af734281536868c8d54d67e6d2bc6
SHA512eec4291fac618c118f8364bed20f5f3b0c7df3ab347e29877754d3f0cb307803e0d39cda11c4c0940462a1ded57e4c0180da129d7d12576d88834883c032dd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4646abb46c59a9ff5ad0d83dafff2d6
SHA13b614307f19c2b4ed7e6498622ee95d4162930f5
SHA256dd1ccecb4f7aaf6e21f6ad32cf248150c262ec5e6952c9a5375d43632e99542b
SHA512e7214842e89538c5433d18633977a1a2e317787843bd819cf08b7b05a3b9d14275569a7c1727d41b011111e8052c79ba301321eb77bf8c96cc5b3b62b0fd5358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd6ce4c25f0c7fd056ca7835c51361e
SHA1e5ede13bcf559b7b4fcfcdbd0dce8aa1b7b417eb
SHA2565cae4e7e662b70de44fd48672082e5d1d31e045a3eef06b24d9403ce9ff76a61
SHA51235d554537b3ecd639523ea56a0f67950fc901124d2b8dddb71e429bcbe7a8ed6bb58382c42f86ac45eb38bbd5abc97817e7a75762cbbda487f662d3c2242fe85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ee28b137d11006bb6bc88f0fc65eae
SHA125ca67945a50a12a70f49e10786c8d74b1711daf
SHA256894a1ef52e85c38e540e55eab804c5ba8799aed50b8526a14e18dda4356152eb
SHA512168d88ae68ce6d3de221fffc048803a05e494636e3bd5be26f3c07343ea58960608144e9b84d29515831950e2ae9a4e9e5858ba281ad4aa1d352897f57e7cec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52435488cfb5bdb17362e4a8963ad6726
SHA11fcfff7f0481cea5f746b5de562e1c9d5bc24c92
SHA2562b86dc61743779db6f206369b8a121b634e4f0490677398849805b9fe7f84707
SHA51286004e359c37e6d8e9dd805bc904f30e45157aeac8552a7aff61f63df513dc28b25343c3d15f7d00e3ae568d58e37f9a388271e178e4f85174d7177e40b0502e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3aab951cbc5c7e63b1774d7a2dd4a4b
SHA14eb42f3aab35cbf4d2b6994b176bc1fa87ae2f78
SHA2566372a076498729287379c116e38c6af2c3954d6e7ec01cd2fffee6192f5d64d9
SHA51216e3f5f1525a3f8e4bb3ef918e5711ecdb112d7d67464e7ff34f8a9fca470ae4515d9c9ca4101ae392ebbe0d0ff0ee56601b6d59c4f6718cf5e07a705d95d1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2b0ff1f2fc7d866d0058afb49be763
SHA17f50642cbd1e77765b73de9bf57a78f0a5f3a540
SHA256ccab67f1a59cc81de58ee6dcf84824c94f348ede989d164a5b5dac0b65f74488
SHA512dd5790fc9be893ac18bdf4029ee3882f4a93ddab7c9ff9e2058d6d3eac89710191baa6f484e4d9a7dc169d8ed17292a750c611e2e194132ce19e18a8b3c56d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f906d1e9f5909d40dd57f9e0954515
SHA1bf852bf72ac009adcb17f9e0a5ee47f7740a883b
SHA256c47587b3080ef8dbbd9cb1bc76752697b00182bf05a21a485d1c55eecc5e22ce
SHA5126360769e79f41ed7f5d1b0c9f67a18904e732256706854bd3031de389aab02b8177dde15bd6d19cb79ee28abcd195e8511a95101963f821166e5c337854fe03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b99ea36f1922d328345b0cb4f45f31f
SHA1e73c2114c541e7c56eb385ef672b33634b61b745
SHA256b0c6de117547ac029473ab9c7fab091022775d9c0b6e09ba31878f7972af225e
SHA51269c8d21f12bfc05f8738f49405c4bbaa34256097adfe96f9008c7e3292879d808e63c8e91ff6439fc1510fc27aad6e26ddfbcf174d432e155d23c24ce46a2d26
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b