Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
General
-
Target
sample.html
-
Size
18KB
-
MD5
2111680fee2c128b700237325a3c495d
-
SHA1
1be4fe6da918c1fd66228ed68e5499359faf9b00
-
SHA256
ae97c237390f8a2c052f46ecd8a650c296bef4a90371350b0d391bd7b5c90c35
-
SHA512
7af6a268834b85ec5aabd10680751b17f0b889322816f56267c18a9f1e4aa9e91fb1e3f1cec783d3458134b7270a645bf73c4c41d13601f02295fc73c4c5c96b
-
SSDEEP
384:kV1ocy4yoJ4lbGafMvhpNboTlJKRlObz6r0sZmL2fN1xCejiw:C1ocy4yoCEakJpNETNbz6r0sZmLULxPF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9065067e813bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000066e56f9fb9194910cee45ee2a0348a56198e11fe9fc282257263a58b76a6dbdf000000000e8000000002000020000000773a4ba7e25a460a259b2ccf2c19016552f85262f01348965502705ab0fc520d200000003af3d440b20439ef523045e949066a9d4070a55443acf4a3f2921e3e32bbdb0440000000e43fda9ec427b50b09f0bc3097a16fa6031f653d2a01eb654636b6b3f948d898ea731802c75882304e477ac5c47ab49bb57c55c1a258aa0720d63839eae30e89 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438292365" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A982B071-A774-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2920 iexplore.exe 2920 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2920 wrote to memory of 2748 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 2748 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 2748 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 2748 2920 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56983e23eb769e3e393f8486ba92aea88
SHA1f53e12f5d2094eb57c6b08c701f44c0088afdf94
SHA25685e2d99ac56c345d9b6a3d8b84f38bea6d9e4064ba8d6742b3a51e253d51c432
SHA512bcc52c83922b9bfcf33f3d914501c77b0ee6abb0ce4eecf994dc7311a3d4af94392e75277750ea680059df819fc3e80462c7da6bfbd8c769d26d286a49018703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c42ec2d80168e3ea44a9dd9b9eef66
SHA109cb14b0709f852fc2d96b9710e4b7a3c6e8dfc3
SHA2569e8474f1e4b6596e75eeff03609d79cf474692cc3849654e7551ca0a41b1b91c
SHA5128080a21fcf1903d98f858a2321face3adea9ef7c5040ea24407500144861ac2a9413742c2b1e94c9e92c0ee1b8e99cc681808d6997ba95620ea4ecca68aabec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cccd3bd8c5254a0b646c112529c3831
SHA116d12ffe5d33f1540fb229d253698def716de08d
SHA256c51b405051332066be105fbec2a765c0b57dd29fd454ec3f107379fbfdff7f72
SHA512b1ff559a7b6c4adc6cc5adb8b1419372e032babb7f14c4a2447d347c45607838c42be62d15dac7125ab9579c1d0df3805c2909058b9454f15b4b041bc06cf516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a9bb99762521319f7ed768870b9cfe
SHA1571b35969612e54ec6642a7a1452b04d55166813
SHA256fdf471103f4a5796850373dd33f6c4e495ea18c4ecf250af51b26c47d8b0c320
SHA5128dea35b1d2c1654196e7f514c1531282d6b091a5b8bad99f3d55c95abdcd65e2b72bfebb7cda0b5f8b2c46242eef3c125277e2d98f0d5b53de81e925c00436b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464d1e14b6ed4c278b3076e6d0516907
SHA17e0dfe30b2117e14181f9cc4d1b9cdf89ba473a8
SHA25615f97168862049085ad6149b36e899d35af1956e90b7ca70ea977c0780732ec6
SHA51235e2ab097772540d937eba9155adcf22375bcda7d9d0eaf2db5f256775a30aa06db75ce193ad79e888940396e5eed3aef57ee62ff5083d1b77dcda15e14beefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146432adbb44b644ad78c8d4304fe56e
SHA1e068e5b325400d1d5935fcc9ba395cca68a749d6
SHA2565c7a8ae77f07a870f31f6233f9f82be69988db45bb2c68c5554396ebf42b6510
SHA5127a6a22911679d5adbb01c22889460c105c919275ba9b6418cf77a261f00313292bdc81a5deacaf12f32c40479b79e9ea417319a9bb419a381f2231fc0b5d72a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f27c934746ef74bab9bc5d0dd0fdd1
SHA102158f3f7a0a44f7d05d8e82ef5facfd9f7894cf
SHA2566a175c1b6e16a1128b5b21d7810143abce10281db9d0b45056c56cf74c0d8079
SHA51216da5f4d8a03e5c05a99ab84e3bc0049bef56a110e060b449d85be075b3aa18797d79bb2beec49740b681522c4a602454732c5f56ee189b8389f57da92ad8d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa0eb5f8232f42a3d6909b49de0cd32
SHA15384334252be7865f32f0c290ccca94a236de92c
SHA2566715fea000e35dc016cb045d46795f48e285495a8c1b20c8dc3d23131a8cb6db
SHA5120ca1c3c6b454d615548208577caf574e5a76756a14e5e4ca8999bb668d1224337d9820081b3ebcae1ba4a5447aa8959a5c9ef6df7bd3599eb511dd4c812fe6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e67bee1de1f9dc381b6df48846c5a6
SHA1684eac0b539c89d4ab6d74bd0fbc9bc7aa545676
SHA256c5e4f03e1bf86601eb121c6af64a5e62438b9447775e7e59b9fbd589fad4a56d
SHA51201a224f3eb9cbf35bfbd5e0d763e3aacde866c69e0608f7e617867a2cd80255a0c612d5d51d4c27f7660fbb68bb8c4796e07bcfb7c812dcc06d173e30f3ce33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8f160025d4dd255f71839fea8cca1a
SHA1ad7467744326d070620e4571d018057d74cbdb02
SHA2568125036058343acd16f9bdb1700f011f40db0bd457b911243b12ef175434abb9
SHA512a1c2eaced6057004a143febe79e3a037825de3439a06fabaeacdbf4e11d39d5db56bd5b23fd17fa2b9e2ef5819200a314ae189c6bba037f8530bef01d490f701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38b1d043f25b7195c0ce97fb0ed1562
SHA102d0abc69604eab16d6c77f0bee1da0513bd3d3d
SHA25654d9165ac916af210c5147087a7d2e7ddd6abbe2a9d86f5579a116f52eed1459
SHA512d7d16e72917ebe16e26927e451534df1f4523661c36073c1de81c487ad245bc589fad93bedc39ac5240b4c316f25fe712e73320add0333668819f27c4966d8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501dfb1a592fbfcf9ce71a6e22c8685c5
SHA1e0036babe38c0d1f84186a2b3a12caa21f2a2698
SHA256a940269b66567e1eb284820d79e5294b6f8d22c605df085307b8c28cb4f4716a
SHA512e7e758c8d36d0eb9506699117da7e829afcd64cb459f84713942217faf69cf9e86ff180bafaa1f644052df4388aa4ede6dad85c7d5ea866cdd63888edc00ed4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599bc9ca4d40dc8ecb57017437ab59d35
SHA1ad1c620b009bdb704123d3d5402f215cfcb6f420
SHA2561b8c0677953f4a196c148ff51fd3c0d3f42c8fb6d7fa640575575f5cf72830df
SHA512d5b47a2dc253e5dd152aba2b44ff919f6000720741e7a474ac7df2a3e7dca1392a4df69904a32be160d07ace26accfeacd8082475bf76cbda28150da0278dad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99ef8082621a171f188a5c5a8a5f977
SHA11247ba1bb5dd53419ad13ecc6dd26b31608d2a6d
SHA256b4daa7c28270095a38e08dac7b07088a63d9c9e977142e0572e4388450d3ed7f
SHA5122c20a11bfd511dfaa13b2e9ada94f39b3cbdcaa5d3211d957a214696ca45d10141c70248d5b5881d7413156f2f84d16f42246ad0a95087287b17a146c32481df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e2389bee59ae5bc1e33c653d1851cd
SHA173e474c64dc3488a594c863a7ea44c9e281c0f7d
SHA256f42adebd345bb91cbb58974082a61992f7e089f20d05256b9f6003b7680262be
SHA512b957a3150df563ec8de4004c5401301560c93e2feed3ddc6288ff5b9ee29aeb1c6b266840cd47a1e1946160ac7a5ca1a75d8658d4348b39696d8f3cbfbae8ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baeed03821990b867c35cf745d440575
SHA1efbb883d1099db113e55e66b7717c79ee71ebc98
SHA256d5cb1d8433dc64b530c9e02f53bc793cdd5a1e1694ea28500de8f1dd2ce37755
SHA51222b67a27012b109a5ebcf61bd4db80f83805c8de318fcbd7c06fd4fc3d917e6934b174bf0459ff7e931547dec1edb5836e6c0cb68184d3109549af09422b634d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9246ecac343c0908a80c2ecda6d2ae
SHA1517bc4d702b8c7ced1e91783868a8fd2cb36d3f5
SHA256a2ed6b69925a8746d9a49be890a3fef606273d39339c8f444bf6387d4fac2471
SHA51294e999313f8093b6ece99c4e45b2a1c918521832fd383681a8f0c5f656780a8c3114b1c39b71cae738fc07b2df35f3051cc547b58a1b5e6ea18b16f47b12dfce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9262900b764833cbe4f15d62e6a618
SHA1e6117a711e73bd9d8a80066f58847c33b2484bbc
SHA2569b18478c3f0ca2411d6492692d1fd129085a2aab446f2f4ac18f74ddb34d6612
SHA5123bdac025279678e26d8a3d8f49fbf2d4264467ea5f0080d8febd96e4e485a72962987c6789e4252dcb9a035d72ca742cdd4f41f9961969c86d8218bc14d07f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3a4b8c7b02ee87768186b8ce77594c
SHA1488e10f1b3eeab4896439eaa358ca28d8bc7bc52
SHA2562c606755f778cd701bb994dab4b10eaa88fd00bf607e559c2260f39c4886c8ea
SHA512b67b12bbe6265171cfaeff9feeb7aa90c86ca81d8566319081429f0183a137f618162be84c13836191e539ff512aa70d4d6fd7a1ad1179486018ddad347914d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b