Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20241010-en
General
-
Target
sample.html
-
Size
18KB
-
MD5
c9f8d37c6bb95a60d07752e635567f41
-
SHA1
bd556719c7a0071c1b044b7de86b9c5ccc341b88
-
SHA256
6b10d39289d722281981e4ce0c600ed89dc282ebae8f26a4d86601d0b59d68c7
-
SHA512
b287525e3d3119f326bd99da4bab601755e9a74bf41ab7fc78483f5b4ac079248f9162c32d854839ec87193e12f983cdcb87c1664bc22b3b4fe30bdcb370dc87
-
SSDEEP
384:g/QaC1ocy4n4lbGaUMvhpNA5epMTRlObz6r0sZjL2f61xCejiw:gM1ocy44EanJpNQe7bz6r0sZjLUMxPiw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000d1102d04723cae92f7a456395786e0d1a27690f1d5ecedc6ea764d49e98f35ba000000000e80000000020000200000007a09f779c1acff9e2c751c28238f31323ba85ce99eee7254cc1bc05f5bb8a9c9200000001e9bd31032db4cc5df8ff3b9087a3555f148cb174f54da7c313febe39ea4460540000000f8e4f1aa392fd9f9c32bde0a4430d4dcf05841a2e898f84b44a212bc5a4daf8dcb979d2c60a097f90d9ad61276ec6492f0d7ff1ef8f43327ab38b82d2a3b9256 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438288480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C1054F1-A76B-11EF-BE2D-CA3CF52169FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60db6271783bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1064 iexplore.exe 1064 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1064 wrote to memory of 2740 1064 iexplore.exe IEXPLORE.EXE PID 1064 wrote to memory of 2740 1064 iexplore.exe IEXPLORE.EXE PID 1064 wrote to memory of 2740 1064 iexplore.exe IEXPLORE.EXE PID 1064 wrote to memory of 2740 1064 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc5a307cc17c1acc649460fe122a7f8b
SHA19bfe9750f30bf226b767b6cc194b528d863f3787
SHA256092305aee51d6ca9ab29a2769bc5f8622371274b5c362f8b2f645680eed03ddc
SHA512888688e82b8125b4db48baf455b3c795866eef705799b22dbb550f3abf82322d157d735b9117a8265132fa4829bdeded0c38d44f430fc4d09946a96e18e40bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e439e9afa1bad991109304fcb2560d
SHA1f00576f23e1d427dd5ec7bc43566f20eab9d76fe
SHA256eeef7aa506e01ad3c0513e0096ba73761b41e410377c0cbfb61832afb07317cc
SHA51294fb95cb478b92796ca5b82c90489b8b991a5982b648f96b2ed270dd38dbaa5458f57ab5df4e5d53934a3c25703af52e8a0009f7ccdba5a0659834ec0acf245b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc05b138820ae03ad98d0ea3ac97c45f
SHA1c57948d34ace92c3bd7cbd304054280e809c0ec6
SHA256e4d4b9cb3b88003ca97d9f5efc6b79ce6e8db075c2f8c3e6f2741058594f11e6
SHA51213c20809c3f878735675432ed8df3811b316e44265715ef3e04649350630e21a3a6d5cffcce0a94e55656adf7c9f2fe555a8c5332c333fc8f407ee70e111cdba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183a57f8cc81f7759da926818627d5e7
SHA1f3621c01aa7a0dd0a797f0490c11f813d750714a
SHA256e1be06eb65e7f60995a9a7a9dd82ce341c6e4f80d0ee9df76f1ba8ff66b1503f
SHA512bdcf3482cae48eeefb0e476f124690df69965dc401bc485768c7c71aa37434aadec7509322466bc4bcb56a3047866ae6d724d05e13901bdb9df16104b21c94ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ccd9ecf8c917bc94a24faa0058be99
SHA1d9e8e066404e95dc024af64fcaf6996962ffc2bf
SHA25622549d88d2496cc9e79483cab7246672197b6297c2e8584f7c1403b510591f4f
SHA51298e7e418f1dbf5b2cb7e2023ae91209d5a030a3deeedecfcaccf1263f374f8c07ab577dfc43f10263dab60fdced2dc28a06e50ba02f05b768243cc4044744db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95b05dc4c2766d2bb606c1f284a6ae1
SHA1fb18699be887fec06852b7d3afed18d820f7cfba
SHA2566417ebf6ff037baf409258bc561d6dd539ba201f93c066d357b4f06c01f03c3b
SHA512643bffd8d54589d15acb31904520aae6829c89bb0d12f1aee838d57a76a2d92d6fccd76ba5f855edd77537ddabf1564774d7b3269294a048abccf00410a9e2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6240b18a2b1c66d25c48d47d5d21be
SHA16c73119499f9311c0a81b669a57de48792afd180
SHA25697d5ecab18f5c29b422815800a2a563fb42057f31f5cc759f3e9811bad638122
SHA512fe5fe3345c78c47951dfe91b9a10dff46f2811dc2e16fe57cec038cd0e6f8accdfa210167331606054c517eb5adb5e9385292d64cd4031d6f2bfa18e7abe30d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a9b71c703ddc3ed4eeb2c62f3ad05b1
SHA11e3e46b60fc1674a8508d5750484cb442cc2799f
SHA256e1bf112be806f338ab565480adf27d3cd4472dbf49bef6c353c3cc0b46454a8c
SHA5129e4b8f14701b75d4abcef6b3844d5165e79d044450fab38b12e5939ee259d463838cc318fadd6b38b7f8994d2dd2096e66e0c8d8c08a010abeb9c4c5fe2568b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b43ed596c88fc46aef1fef8e0efbabc
SHA1c091f6b8104f926b53f3f84fdd3d712326c81631
SHA25675f019198213352badd37dd8a3a03f08929b2127fbf75d207ffe1909a4d80cd2
SHA512fb25873ade815aa875720277af50e3cdd595cf9eee119ee5055650621e98f88ae3de9cac1db485b6b6fa1509be78799ddf9fd5116bd86fc4bfd744adab52ff89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f462b8ceafd1c8bcec4088bc1a4c2e3c
SHA1bac117bcfc1ded8164f48e34af58f94627e95253
SHA25670b5cca691a419f5333923bd6a152a9ab9de9d60bbe3f541d1972b31d3ae67f9
SHA51255b0b01f3c0cfb7395368e3d79bdc504974109c4aa53db467e94765910109bba98c5972ee59c56e58f75e20fdb25b0fc6709f4daba5f508c8036f0835d416123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21ad0d857e90ec6b2c5841c148b3075
SHA1e3b5b81fdd534f1365923cce583d393200f3ebc9
SHA256f88f50f5c6bb5d03a2179de98d9ed6a39678f47df1da508a5bb2e1d494afbb37
SHA5128d2fc0a8bb9ba6fbe7d33c3dc55a013250d813a68a336129f081f84e761d9be1705aa20aaa8699a345d94c9b0ba59bc0bd0b47bd2da12b19dc0340685e652854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd4827cda4d0e6f0148bf7f781e952d
SHA1a0e7b46d1bf6e1351414625d6c46abc4b0e722f5
SHA256c4d62a5be6bcb29b4c8a88bb7bf9a5eb03ae6b290deafde232d2b9d5f7b8d73f
SHA512f6a659a103917d856604d0fc4465a13ffc4e9b3fba7652be2694fba1e6b5a8f13547010be85225edf86f21247f3580e4a823df3855b64cb78206abe9bcebf4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0543d7efb17c5f65dd0450fbbfbafa2
SHA1530fa848c9d88088f428df09635a74175b0a4fc2
SHA2563dec81a9bfd4aab21040303e403cc751a5b98aee1b7ef137be442ba5f00fe050
SHA512c6e10eed8b5afb9ee7ee5d25fb45cec8e2388e35bd4c5b29f0fd8ee703517677e4c4cfc2d8bca7c9dd421daf791202e6d6f130d0a8e3d913061942ec311d7cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c8ff6547120c69adb6870cf1d44683
SHA111ee5c2d144f3ddf75928253b9bff8fa0999d0fb
SHA256bbdceacd0318120e37207ebeb45eb2346d8640bdaeb092665af1fa8e89541df7
SHA512f39690a833164077c5e3e75a087451b38f2c1d426864089b6999c9e6f7b67bc323f12e448f1dce166e02a334223df32f2e6dce4dc2bda08457fe1db50c898060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fb241db780e6b654390a5ca18cb445
SHA10739e91aa97ba914d368dd2c68af35ad9d5ca3b0
SHA256267aaac9a92b50e5a7ea865c5bad828584ab4adfcaffefeb1fa3deb808abc181
SHA512e505a1976a28ce3a6d3f41904dc7964ce8b3a05b274e9bd6a5b27c433e93f17b904d1d05369cdc5dc1854b24ae971938187f7bbd55e8531a23ab2246655aeedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952b50898b87aa092e730f390f4429ce
SHA132a1cd7871d96edab891adf90c4b65ef9a678729
SHA256a5c28ebe84f0197004572b0bbae3846ed9f849e4d14bb31b5616872a6595afc1
SHA512afad9b04e7b1dfd4464eab0cd83aebf5b8505390e5526c8d8205b1dc3cb524699261e5cd5242b671913a90938a0433f8c71ec3867c411b82e9d5c323fe88521f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f544d0999f9d72ed491298766e0fc54
SHA156a23c84dc0fcd244f52f1ec5e15986d30cbcf36
SHA256e1749f26d27a58194113d0697983fe84e730fdeb662f8dee953904d0837c857b
SHA512cfb0f6eb8bf8871f6825411144a7fb006460a564eaebd168fc7d7c1f126c69e8e0c47e80647cfe01c563cd28f0864b9b03291c78ffe978411dd3f476750a7f72
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b