Analysis
-
max time kernel
1562s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
disco-duro-kioxia-exceria-plus-g3-2tb-disco-ssd-5000mb-s-nvme-pcie-40-m2-gen4.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
disco-duro-kioxia-exceria-plus-g3-2tb-disco-ssd-5000mb-s-nvme-pcie-40-m2-gen4.html
Resource
win10v2004-20241007-en
General
-
Target
disco-duro-kioxia-exceria-plus-g3-2tb-disco-ssd-5000mb-s-nvme-pcie-40-m2-gen4.html
-
Size
5KB
-
MD5
e041f9e3cf8f308e7d1b6352f83a1be3
-
SHA1
3fa85c9cda30e60d5a430f687246ee25e9646277
-
SHA256
1c794deef8ecb59979f340cd296fe1513ca0ed5144648b0070edbf4f18fccd43
-
SHA512
23b73ed4c3456d2c8f96c272c121b8d47168bd68db91c4f846a49a99a899f49f6634de960fb2cfbdeeb848480c252176041ea82f11fdcbcd2e9b434fbad02ba1
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C89ZqXKHvpIkdNlrRU9PaQxJbKLnx/IR:1j9jhjYj9K/Vo+nuaHvFdNlry9ieJ+nu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DA03BF1-A800-11EF-8FB4-EA56C6EC12E8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000d47851603ce8e90f79e7233c967b1dbb16e42846aee64449cb8d903773f7120b000000000e8000000002000020000000b66fda3a2aca843cefa22fc1ed423c5a7097b6f8258c83b9ee6a2dca9c83a7c6200000009d95b0d5682b1ce43dbd5db10701a0934658698128450716c3db524536f2e0e340000000addcd7fe48b279e078db5b4e8a9eb54aa5374afb5b9de06585c89cfae290543dff2587995b0f8008a26016bddac0bc6f2d220f043230f1765635d0fb89dcd439 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201c4de20c3cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438352237" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2788 2804 iexplore.exe 30 PID 2804 wrote to memory of 2788 2804 iexplore.exe 30 PID 2804 wrote to memory of 2788 2804 iexplore.exe 30 PID 2804 wrote to memory of 2788 2804 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\disco-duro-kioxia-exceria-plus-g3-2tb-disco-ssd-5000mb-s-nvme-pcie-40-m2-gen4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a128cb05014a0a9dca8c392774dcc5c7
SHA14672f99d139b68d59aab20bc8a1dad6890cc3201
SHA2567d0703e32e5376f43a9faeb4a23320770e784f3c92497e276b6814e0e41f2eb9
SHA51287122ee1dcfbd08d4497ba1b2dd401266d8877281155f2932847c19bcc45b59d75c639192e434c2286024a2d0383ae63d44845371edffa4a6239d547c00d0477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f103e2f5e8cd7b524b0274a352cd6860
SHA15bf54371b05d846a2f3dbb7c7e667888c545f94b
SHA25684939738b776acd7dc47e11d1cc67f155598d1017db7496dfcf43cb75433957e
SHA512e938d04a4de6cbf6e28f5861c9fd5e4e22377ccb2980e7fe075cf23900f5c7bc01218f2281bbbee3f0b4c1fd6a675a9d1a3ab559af38233bbc66c56844141706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5615dfa7cc865518a1b0ff927b44d593e
SHA1c546e354469775af0a49fb5d803992a9f20db2bb
SHA256be89195b67c490703e3ccab3cb3d232bbb29cdb55e7365ce68e82e0df9b43dfc
SHA5127696ae0948efb8dde3ee9c8db94cb6b1bcc63d4f9076f24cc824811526499451b3c04cda06f08d605bef886d47727c6aff668b6e52385d13ee7ada2de742b3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8beb9f26d32a14c54e7be15474e2528
SHA1bd4ab600104efdd506dfcf91fa7788c90494a77e
SHA256f5f83f9c809141cf5980c8d58c685c2e2de7da20ce7bdd58e12a955a6b4d43e6
SHA512d7b9cce0eccc0b8abdc40d575df10512ec2c82a8eb73c7ddb67924b4e6d6fd210312a5a0b518e9c9dab7e107b9027cbf26fb12173b7cf4b0ac0e150660cc9f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a54931d52d687e08ec163e4721f7ba
SHA112a02761b70f1943c89a2f5d894b7ff9b3a3b768
SHA2563c024b7304c5941e32b2260125df763c4b933f4b41a362fe01da9a569f509762
SHA512bb9c6d0b7260c20d4ce4d92595da31b40ed618671cc27aade9632adcf0c4f34fd5789ccbef7346aa4d3af006f2f1c301fbbd3c985c342975153235346d002a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568119b962dafd401f633ba77249780ad
SHA17cb513a7d0e6346b648bb02bd540ee9850ce4459
SHA25676cac7877621fd33c57d75cfc1979de26eec62011d2ac69047df5a82ebf18c5f
SHA512f66031bc62412f1632b243dee6366f9f4af5a00592e6c67de19839923cb94d25d39022bb68e2ce640125b8caf00dab5e5a43fc930e57c567b0e4986a9e892bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b554a65abc3d905e0311d0ead54e967c
SHA1c20061e7e5e651a7b3ae3b6b2e711d901138fbdf
SHA2562eede51c687c800d18e2b4680669e0d4fbbdb0442dbe97e1921df3a677c6b8a6
SHA51228ac1603dfc2b99b9649666d6e6a9d62b866fe6a3c0d0eca8575e794cf42e279f2ca07d257da25ea0182b83eb81feaed065c6f4992557f9512a18695274a48c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475aa4908ad544346e1d1f23a7c85f39
SHA1a54b54c613f73e2bee658a152f3109e6c9cd3604
SHA2566172083c604f9154bb32ab50f3f8bcbb5a998d4a6388a0e3387f2192b719f5f5
SHA512254a6fa844ff5a3b0d0c83f84f4889a67a245e7ad956ae34f1259e50b616cb93680b4ee46e65da1fbbd1e87764285b3e118296eff4f6abf04999e786c08f318a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5438d8a4d3cd25a5abc52f762e28446c3
SHA1277c2ab2d9a486ff2010555e281fd4eba30738a7
SHA2565d7e7761f28772ef40c8d4dfb87677d959112546cadaadb588c042afa0415310
SHA5129e5826e5fe6d9aa4a1c911221570b4b6acef7f91d48bacd5a9e207478a345f1f3f426370e515e1cab5889c471e86e25ae45c6c4d49bdb711e98e2834af919a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380c6d1ba8a7b5ef8345537ba6eb4386
SHA1975f75b7fa4de7d38a817094072f3639a0b1badb
SHA256e22149701c038b31f16b76b57415dbd43857ba6dc24d410924ce289f68548963
SHA5122bf7ba05e2821869aa201929a99e235f6829689832177ae82ad2f83b96c371589f9208830bdda00a39623ab6c155e15fa2a85b56a99c5d39a2166a665a1e66fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ebb6dc3b6937358d8d2866be64709f
SHA1bfc80a2285d7c6caa2124475bfbbedc8917aa11c
SHA256f6033483fe816a5933becb626d473251219e468c947d711715d36a378d118ad2
SHA5129ed0d3ce7b5d951782baf191d8be5f9b51d05733feca34c44422e2960470bbb695c2587ddfddb6b853b5ad265bc742845d2b79cab558268a824c20062565b39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11451f569db2100b3b233c75ae7bdda
SHA143e994d44639b2e485b1918462aacb2b922ddb43
SHA2565f05a7b9491d10319dfd1196ec2a0211770b01335ae25b46aee9a584596834a5
SHA51294c667504f88588a1174e56f9b4e65d0851831098bb4e1cdac296df9a557991b48d5659142b5d942fe245d34dc8b32adca560432941c7035974cad0b88455b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573c31cf05efce0407481b8f5a0b516c
SHA189bab5ecf568d8e875b2c2c50a2edc2a6624d6fa
SHA2564b921c43166ecf23b12cd19b4ebf9d1fde49f54dda539d96673dca8e03ce1832
SHA5120beeee3d70833a1b99791deed1523d8ea2ac557b79b514e8a5ec796c6344e12787fa9a354e871f3a9e4172ed60bda00adb1c50428da803cf077263acec5bb994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58844da8cd73dd39a7a7590011f7d1ef7
SHA136fc7d6cb0c82b31101cf3c0c3ac7cc379116c51
SHA2569d7b4674aff2b45f0bbb9e6dd39b490de11180b24a92d55dda77be6ede4f4d0c
SHA512d7ce69c40aaf8a9a1b5cb2d817f385237965c2fa796130c93ec0528ad78fdce1d5444a3dfe5f2583d96b580d41de9da8f037cb0c20b0297beab725396cc2282e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fc548ea6c09923db6f86e68f4ec427
SHA143d5ed2e26a39fa8f237fd6b6a2adf350d9cf5d5
SHA256abcc9fc6abca27271f01d3ea4f6ab971279dd8042ad57bb6ccd3a4aeb8c0796b
SHA5125445807b5424b1c3175f87a2976262e8cf5783df1a41ad0a0c5f1093c2175a4682631b60fc9ea587c212bb970730121d0f216d5a9372836e9732f6f3b2f3db1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8003cdbecbf55d1c7244660af9e661
SHA1c7334bf1b571e62a97c69d761a52c3c2b0641604
SHA25645cac940fbabe32096d9c0fbad073eaf4ba764719854732ff309b5cc520bd71f
SHA5126840c3c5775dee3520d766d3d688b92cf57479b9d1245ed38151a93c93c09ebe2fc292b994c924ff1a8fd6376c8179e51f1dda2a09b9aa5abf71514489759614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba2e15ddb611ca07d7a65d291e18919a
SHA1d4b8e5d45f32e582a87bca7c402a51307c874f99
SHA256cad39245d44cc1b770126d5c6631a96b6447dfee852bf8600bfc74bdae3905f9
SHA512b23c375a90151ee8eac8d38b3f137f53691d417fc4e3324c11b090bf51933fb367d2091c61e536d7bf44628bcb875baa927f16c21cb29c2689f30f07dfc426d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13bb8041ed30823098e36e3b073e4e9
SHA18f1b1833700de5e649dfc4e730fe77055b4fda85
SHA256c2ce3ee26a0bce43b14d5d91408f873beffac830048a22ab88b0d10e00a78e27
SHA51222b4eddd6234580e35424c540565bed027a6754bb3e8b3abaa523f47bbe22a8c4c74b4eb4282d7ef602880ee066be54273ebc937fdebcc3b26e452aae9b2752e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b