Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
3607b83cdc618120372052dd91bf60ce
-
SHA1
d99810e06d8889e006b6e3970732db6baa29a5d4
-
SHA256
758779bc1823e327b356e41bd5a145f3dfac68ef259856e5d8d49ac8e0a122ca
-
SHA512
19e53cf61aa67d548c3abac9be84316d6f4488ad2150461d9e15411c696b17206f59a049c863cff61a55c3de5878b98e98563b5a3849ccb983db498716476357
-
SSDEEP
384:rj9nkBx1ocy4K4lbGa+SJvhpNeT0RoeRlObz6r0sZIL2f31xCejiw:rpnkBx1ocy4xEaNJJpNg0Ybz6r0sZILU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000006aec34f4a20a07c5b1f433f86f8a2c622d0a2364f3871deb3bcc08ffc79adf9f000000000e80000000020000200000003eb9354347fca1eec3d6607838016ddefa4bf44bc4bd78178999135f485a05c8200000003c6bcda35963182fed172ed179b5a73918c9f1c11fa513db587436a502fc60e34000000076c74fd7f6c1d741db0b18b068f86c11126d43f037931d8f188e8f93d4a424d38b1a739400213b8d6c8644c276ab92dcd54dea2b79cf18eaad6885720205bc95 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36A334F1-A812-11EF-BD8C-6252F262FB8A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000079f62f8ee81176509283204c95c8b99132ce66025c7bf206be50c95c5c952f3c000000000e800000000200002000000077279d0e9346b2704611865987a22a2e6c752aef6ac9b3b3699b4d3e4926e43e90000000653f5cbb918bde42c988092415b1da5f2954021e993f6700cc3844d80faafe89d968dc9769e9d224f114889d4d0e7de6088e1a7da9233a586b69828150dd4c1cbdf21ca902eb41939d4ec1228c17cea14f0b9e6bb8855504f03ca01b1578781762a1b18bc539259c4f3ac142fb43974cf4f142d2c2294aa52f2a0416af6730d9550a645f8ecc8a59820cf54734a40ca540000000979709505889b6142a8e42832a574d33304f5ea86b99961c3efaaf8b51dd9df7c4251449ad39507888731cc9e4ef15e200c2510053f11f69a44dfa94bdbe2b99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438360034" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703fa80b1f3cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 564 iexplore.exe 564 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 564 wrote to memory of 2824 564 iexplore.exe 30 PID 564 wrote to memory of 2824 564 iexplore.exe 30 PID 564 wrote to memory of 2824 564 iexplore.exe 30 PID 564 wrote to memory of 2824 564 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b996b7f0bcdf9372c4f29ee39d85c05
SHA13925415babc32771645140fbeeeeeb87b55012bd
SHA2568fbc53243b1e2663622348a1b20604d0cdc35336081aa73daa8c0a157d14d3ba
SHA51220c5502690d15ed17f8b028dce9bbc3efb1a3d864585da4d3bda0cb0b94ea49a30d75ccc5721d74a09b9a37dce3ea39942dbb86c98f20008e38331c716e0d15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126e1e09de35db02c54d23038f4c7d99
SHA106f0a555eaf8df65bc0c3e81d845def18b445e14
SHA256a10fa4f3c3bfc0369b43f896c8ab92e47b57e0f09098b047931640a57fc4266a
SHA512aeb76cde8fb6df33f6ba2d1092307b1a29fa21cdbc6e0901770c8956305f14defd896b1fc9ea5e83b960327457c1cc48144424a610f08a037087cdf1a7475e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5d4c29899a91710e487d3db46d2001
SHA173303f2ee0f188000aa875b09de54bd025dd8a09
SHA256b225e66a46f06dc75c9d996015d8144a5731e601acfd8eb5c3419126aaf3b3f2
SHA5128dd14bacd591d5c3fb38fe849b63f4daa8662222efa8836484460622bcbc72acda19f29554968aa252520042388ac03857c0c49686f3ad3c06ea1dbb43d64bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb2d5caf77f75f85cacdeb460cea78f7
SHA133976c0c80639496bfcd2e0efd10dcfb0fb6a5c3
SHA25649b22792008c676f26eb2fe8a91783dd89ae13067bca6fdf467d5786a412f79d
SHA5127b852dd7efbd117669d9eb53046d2f5c0579fd6cf5406b7ebb43b0dfcade4bed8ac078b516f62be5e31d5aeb7ea283bfeeec786ad90cc6eca27dd66d5b790ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e68b619ce45e4f637a44a5f0f1dbba9
SHA1234f3bff71ca75c866550333bf4560fa2b9780d5
SHA25676702cb390e3bbfd25d4f15101fa0836cf9fc704d2f6e28b4f0566e95fc73eee
SHA512c31e28a1561cdea4786b945d693cf4059b4455fc596b191ebdea44a754e68d748bddf6e9ff82f621551d0e613ea7af45cc957faa6da4f607b4c555ceabc3f08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63194b5a0b9b9b2e447c7e6a69aa8bd
SHA1bd68f9d80bc59436b9d984a06836ef948b7f2275
SHA2564099468b773fb40471c3a4ae2a0a9e56e842a8302bad012911ae252a1c4de4eb
SHA512ef9b2eb9e594614c20b0d31957cd33a726c69296e376de58a82ee7dcff9ae7224afff7784f251330de5b4c44ed8de0a93d728c4805fdf08093f60f2e83cbccbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559433b9b084dfdf083d510fc1b6492a2
SHA139b33b25c3a87922d303e49ff43844d4488018c3
SHA2564d4c09fd1605f947243799c7d338082f62b7c3b78d8fd805ad1e02ab869e28e4
SHA51295abad29dbcc63330d0b94c6ea8abb0939c25e89dcbaf03709eafd4edd2eb0766a40f46ec3b14cc36b9d4a04f264d81672124ab55ac024ca3a6e0238e0f8d698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d97273a65c871cf08b4c8b72f3a97c8
SHA13d4167c9a8b83557a0dbe59a65a6fdac0517ce79
SHA256b12ce57a14252091bc37e0a6508b15cfbfe0eeda9982d69d4a5fe1fe245f7e31
SHA51283341731025cac8b5c315bf2aae8896be7cb80870b8f1c43b34a85823e7f9c591bef5d792c477b0eefe949136a68b1c1b2d38ebad14506a5174dbef481ecf06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a533fef023390669b0f40d78adc002
SHA1228e598cea99845e4f228aae9f77d4f5c061c310
SHA2567a103f0e18b3d906495eecf9264bc5d6234372895dc89120b611103acd0a6102
SHA5125ca30ef7bcb25dc5befb9ac0fc3d7a6f0f1563cba1dac2fba56a72d7f37ac7428004f72138fb24a4ad36a3d555855614abf977a9e2fcdb8d9d638d7961595c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf6bb59aa97d47d47d8650443515962
SHA1cbecf142fe5ae7a3ea5763776ea28b23e963cee8
SHA256757595b3fe310d990160164966cec963e8eaa16ade23c937b29b7ac1a670da98
SHA5129cd82ae0d0b4d163f7b6b06b91844d2c2675dccc5a75917537a9b4843ab77549649f57e53635c74231465d972d234d3541298dab1ed59104cd799385e73e8e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245ee2af8bdf1af64a95d91bfa2645a6
SHA1e2082d30a15e31ab7247cb705036430f111d2e79
SHA25600b625b8ded5269e57b0788d0fbf4ae8c84541bf79ad667c940c99ada5085796
SHA5127a378c53ff468adb5a698feb52779a938ffb997f7ccb4c7ae98f72bbc89e9e12ac9d3f8be22afee079692cfb26d251be47f86e82a368b95a1a17bdb78d005949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae3987a86cc200cd33b2ec0349847f7
SHA1f0b81f466b38ef24ed88215a6b518f06291a90ea
SHA256a2a306be4ceef02f8b44d38628dcc3a83e3d10078328487ec89b42bb523a680c
SHA5120b05601464d568016054bb1f5d16f3f27d830f71d02f98e7440e6bf0bfcfcc4695f9ebef0d2c57bfea8b4afb994cbdceeb2a6a251583d15cf5068f9c064d17d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d74e3c48db74b31ade901e5b30b0623
SHA1b832dc8a5b2cce1d07a0ceed601302b4216f7bf8
SHA25634f4f1a6edbcff7aedf42e878d2869bf8de0f6de2c4f53ca30af2c1ca0442e22
SHA51238b60fcf445c8a3772abc20036f6fb9262121119afcf0093400d75f6129c4fb6250fbe09f68b7ad6026558a07d81f01866bfc771026f581d663c52f3268e82ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f4d6f46d95e754a46c9bef7d5d6bae
SHA13a4bb058e59993fb51ec6add2fe8eaef263e0bfe
SHA25641ddff2f951cebdee9ac64bca94c9527bff7be6c0f248860b551ad6a0725f1e9
SHA512c06034d5ce40d8cdf00dcb4ce4cb45cb1a068d83ed6fcbdeb3bead4649bc89974b7927980901d7a704fb62be88a52cb5d26da606a82593448da241d410755d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8671a060eaf1a988fef54bad79e65b
SHA1794827c281ffbf91740b0f8dedfa32e339dc0636
SHA256f5237c770b3625fc671499bfeeecba4f89a5e3fce890dbdee1bd8a79b785accb
SHA512078b5b5c4e0c778f319a6a47d79d8dca7cdd751180b2cffe129f3bf4f5537308473a5bd1ab932d44b9bd42425fab80385f1e9579a4bbdc2e33acf2915d56b3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38a5ed16c25945ea51d8fb8c7699f8b
SHA1e641b545b6a7eb25b15db5b70a748ffbcab4ad6e
SHA2566afffaf76ce0d8e7fc02e04610c2f829074cd28c84e9dd289084fb1cd36d0511
SHA5125b68fce779b8c2e1b7fe8235c315ca0a361487b9a2df97979eb1c050fb0293e9a73c37b4ee16a98d7ddc20b3e3b7430aa13191845cf846845182f43e3813a09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2967007a9ce5dc04ff6a550f7500c28
SHA1dd5ad3904f6b196d159d7ea81a082ddfac085608
SHA25616eefcf2a291d5dec78bf344f0256fa1e3c363d8798cd0b36e5f3216c5a6bbf8
SHA512518877bb096b1f347b3380b0e1e4b75113750488115143c46d3c55e4a009638d04101fe1c3dd4b55d1b701991b819bbcb25c93b902a6f7adcd31774248deb293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7446a235227fdbee5d449fa781a292
SHA13b8167970a11f0c579ee4856e5e2fb416f58e920
SHA25607a1279a9d3451df3499b659c6e36c7694e10659acce7d2769a5c07bccb777e6
SHA5129ef8d26dd2d85012e62cae119b0662175ac012f33f5bfb952ac791603ea26285a1ae43b15ff0081645e8b077ebb92158ba0d380916047bae117e6e26da90ac4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b