Resubmissions
20-11-2024 19:12
241120-xwpnes1qcy 820-11-2024 19:03
241120-xqcfxawlhp 1020-11-2024 19:00
241120-xnpy8a1pb1 6Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
General
-
Target
sample.html
-
Size
18KB
-
MD5
eb13fcb8e05c49d2125a5d253d88c87d
-
SHA1
db5ba1b0b0c111c9946666f800bbd83d1cd20c95
-
SHA256
961c58e8acfb2e8e79defdc4bca76cca7a1b35093cff40de257c0ad936ccd7c4
-
SHA512
e562afa3f750e517ab9651d5e52a3c0c6948e3f38d63eb6e5e308060503d7e404bb598e621846ccd205283e1df473e5c0f76fcfa4724e8b577824c22406d0a2f
-
SSDEEP
384:wjn1ocy4OoJ4lbGa/MvhpNFgDR9CRlObz6r0sZuL2fN1xCejiw:wjn1ocy4OoCEaEJpNKDJbz6r0sZuLULn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0958d887e3bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3F2E5F1-A771-11EF-B594-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000002b778be7f77918447aa7a1e570fca5faa8fefa7b4bd4bd62e61b1439b23589d8000000000e8000000002000020000000570d534e2c20a841343365190ab7cfe63fe330d80408c7db96a55d680465b36890000000da48417d9ca3be5739410b75038e7209fd681824528bb17649c503f466dccf0a52818e331a04b26bae11290d5b4bc063a4c98884823d43a252c6a6f57f8b2f25822fa00f6f01ec652f88c3aa4cd744ec02a57f19f7341775e739cfd80338a67544877c4f5971e0f9e603ebfaaf6a7d51bf92bbb58e1c24118a9fe997f3b5c78bcc0aa5ba031aa96ac3736edb2e43b5dd4000000046869abeada8de5cd02aaa7fd3e40af27d68a155dd7bdaf1477bad027d0988f858d498f6ec9e76d94bed86c995b7f439f905ec109eea3b20e17acf4d50105b76 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438291095" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000836af66627de81d469be49a7310b5300707777e8560cf736c465cdd6a5a416e4000000000e8000000002000020000000117139f268c889e00c80d43620b71f1c1ef5fced7797009d8d1e50fbb0ef03ab200000007f81eb16d79af4cc7a7538739fdaec5031836762f89ec4863a0a1477d0f3c53140000000859baf73f9a52cbee5e983373306545bce2e554c45e660439b13c230f1567c00c4d3443fd26545c71b6c92b500b072eb601f738148195b4e99419cad37b8b6a4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2252 2400 iexplore.exe 28 PID 2400 wrote to memory of 2252 2400 iexplore.exe 28 PID 2400 wrote to memory of 2252 2400 iexplore.exe 28 PID 2400 wrote to memory of 2252 2400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be4ae1d4a72a5face2689bac1281c8c
SHA1c5694c6e08179290afd478bbfeb4c50986d8644d
SHA256cc07bddd24d7e2e8f7491f52fc263d63b70932fb86a55c0863e35073e2b7427f
SHA5120c33f4164152c8b340f62480a2c696b2a186a4e696d26da8f8b59f468520b4c972a4d14993e5e0fa919acda35d9364032f79904075e746f7e5895d8b327dc573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536525b31829649572cdee0fb74aef052
SHA150f55d9c022020d7d5bb7c3d1e9eea996f45fd7a
SHA2568e78363f8fd6b752789ce8d741384bfeae8081f09b7c741f91d3f7a7002bdf98
SHA512b887a6ef505883d16ec44a9c387816a8eabd2207473c014f7fce5ef3b555744afc7cd25a99bc28ed07392ed61c4934b0be49870495e9cb41c2e14b48ace73b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7ea1a8515a1a627c97cb1b6da5b05e
SHA10e0ff34d40dde6f2f562f7308287cf1360b4bcab
SHA25673cb5de6e0445ad3b2093c244593ac4d7b26e2671b0435e2d039b93fc50b88e1
SHA512cf5d1e44471ab822b9cb6258ebffe285210f043092af04e8602942416834686a2683137807870ae70c3c4829c6990069774897a82ddc0bfaa87fe6f1af042ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065c1a16a679d24ed1de19e40fef07c7
SHA149e21510136e6d1ef8be6575f5e00523f673b9b7
SHA25674f5f0058fd237c6b795bfcc01794db2419575529acd08f5e7e536a952bcb84f
SHA512a79cd3580be622328bcb245053b3100c80d5991c814cc68baf755be2cb4de6082ba2fb18ac4cfccc44b68c961546076efb100536ad14a589a2e3a7dd909b1a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db78c275d60ccc0fef4816edba37e7e9
SHA135b904710ba690a8c98ac6dbb03163aa8d8fc622
SHA256b37b28d27d09cf8122924dad895d7685419a1a406a455e48053f91529a1995cb
SHA512b472d67218285ebc38be60546678736c1381d1d8873c2d3a3bca9618c1bc00982af93c97400064ca1537eb4b1ab9a0c55fa80e75e440b5668bab2a342829ed73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e556043f7676a2fb4893406d2921417b
SHA1ddcaa1eeacb9bb740d994c52e8466ecad7b620b1
SHA2568cd6180381eeff3b33e6dbcae20dc088923a739f763db72fb772fc5805cfcfa6
SHA5120a13dc6f52a75be019d32b6eb19d80212b9d5e8f28bf0b7b251776a9a00ec6ee30d82c5555079c54bdc131b59fdff81dbda1e88d145fbaa709d68eafd3b6e71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e14baafac9965a77d12b4c7c77235c
SHA18dd65ce31e02876f964f70aa38485a4e45f28827
SHA25625892007c7b5b9970ee5d334ea172f330c4c4ae2162b1e9522b5f7962727e693
SHA512fe5f1322150401e607775c90a8bab2b499c52c44ba5ecf050859dd78d09b45e46099717931ec025f15e0e2f34f95e60b516ca579e14f517b1e72c8269402855f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e820fa38025c9d438eaae1116cd7813f
SHA1c75a076cc4639a28aa7db1f6e3da1553fea450f7
SHA2568d2baf8084b14a88ddecf472788c322c06dfdc7b9b05e9e7970cffd01a301f96
SHA5123d9fed73062fb69ed96bbd418d192085731df1a17b4583bb2076aa20a96ffd2325436f0dd65f6b571af1ea8e8a1a23a714522597c1f50f917af3add1416fbbcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e6d5d11a9376cfcdbdbc999f3ccdd6
SHA1a7289fc64d4f999a2fa0757e260b444aaa4cd1c1
SHA256a706916c096a84e1fd08b9c12cc6c6729aa9e620e85c9b478097e767446f3382
SHA512f8d2a5c7cc0ca0da540b2dba15aa7b1b7335422a38a9073ab9d01f4fddfb568357062b576db59902dbb7d0385fc9ae7691fdc7985e83f70edcf3491988bd1d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063c1d8dbf405b72b2f089133a0dc29a
SHA1bac8f9104e9f268b737dc83a6d0390cba56cb371
SHA25600f56f75177a895d07aec85c69007d36b61437325c256df1f7ee18894b65e791
SHA5125caada96124dd788804ae2de5b32548144d01375136d361d9c19f36ad0ef622a752ee73f2124effffacec1fa42bea1d79ce9043e3a0b8708e7f875d744bfe5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac09f6fdc9db15d7601e67eea920a00a
SHA1e6b2bbacddbbc0470da8fba232fefdeae08a947d
SHA256221872a35a7e54d13540de8dec2b93c8ed8f38e39064c679343d68872dcee111
SHA5129dd744ca0936652585b6d9fa49530973bf3eb61b47d513dd151c9f298b97f1013ffa6caf77e984823f5ab8a2477c5f4314589f18214ee46e6dd67ccaa0dfa0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f428cd4aec02f2ee7bcd9143684a73a
SHA16de90e6259042c76eb09a50fe2f257ec764695ae
SHA2568dba11a4002f7be840a51003906fb8659210aab2809e54a1f8cf9cb8cc97b734
SHA512e0565306671f9856e59798ea4d7b5144855c08b120c6c898517888d49cc7d0223f0f46b59464d46dacceefefdbd41cbc1b8d3aef2ddb01c5c049af34c0d6ea50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200a623fa7c7f6572156da5bb3040907
SHA183e5e413d6c09b42d49e4db54e68b53d2fde300b
SHA256eb3c62fa0cb37c0157c605b4777c60c7380b5454241dcf6096502d80a09805b7
SHA51299d7434e827779824e528081fc220ab3c806a3ba5b69a7f4a95d172c764f3628b858890cb0bd74a0af39cba521809cef3ec8c8bccd47c1e9fdd15a570c61e012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7af61923cf50b2d8dbbb3396e2a0f9
SHA11d4fe3b3b1bf907157d9d44d195a5c50417cf9aa
SHA25641047309d01dac092689ebcfe6ac07ee78d48b8ce975d3fda71794f03b460b54
SHA512cc5854b7fbf96267e3e7560751735db8fce802d23fa74eb03e0333a21e940f402033aee655eaaa110e474ceca62554d7c455aa551acaadbad67c9ab5c90426f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862526f90e03338f3c11d4d26df9ec89
SHA191c21fe2a9a25ac2643fb680a24a82efefc8fe34
SHA256145703d0de0bad5cfd9caadc0f61aff6196aa604261d6e770204f4e13af1f6cb
SHA512f07009793c0726cff8fed40c089dfa52ae732198c8efdb41be5a681aa812690215df1c712cf4304443a7f6087d6b9606b69a7618bbe6986bc5dc093888545241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb71a2206b03d084df259f08faf488f
SHA13b328a3fb8b818805882bc8b4f9eaf1f6e19112c
SHA2564ae31f99cefed533a59652d638b33c3dcbf9bb1e12970a3c5714b55eb9db2f6c
SHA51292bc539b97356eebb206b1e6f2aa0e48ca6e7ae607fd3052596152e61697598432249c439edf9e2185ec3afd982299fd9fbdf4dc921b1617e077cee5bdc9768b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d922de4123ce1730628a6c32b7966e6
SHA1a48757c6acce12183c1a0b4837a8abb17a162968
SHA256309992a35334c0d2b7d69744826963721365b048317b341b966cf732a094fa98
SHA5128fbbb8344261ee01428e780f5dc50cd4ec39636e6ea5d48e10f37948a1e508e4f94a2055c7f500a6570dc99c0a360dd43df8953cde5c52cf0fddaa04cbb08196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfeefedbd384d88ca32271c9391a4d94
SHA1d84d9c6b81c32ecfbfc0d7b0d62cdd3ce6a9f995
SHA256a01f741886735f0dd2fe7706233b479fb48a60a43c05af859cd7870dd6bcc758
SHA5124eb824117e9c25ebe318019212aabb3fa3ec3ed0a624646f586960e952d38b3be4b42db5b58cb229f982667be573dfced79365bef8e45c976a59b2247f90dee0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b