Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
ff923acc27e39737241eb55c857cc1d5
-
SHA1
78b579972644ec67de3bab5c274e9cf5a14721a7
-
SHA256
284458fecde8fd530b4a61d80c452424b720e05c04dd3fbb49b7e0f6b32754c3
-
SHA512
04f9820278f028d1139195b649bb02f28d91d6cf221b3295d7b6761cc8eb6a4eb12f456cdf81d13e9d46dba7b8e24eaa33c671550a409eddc7de337d68af0089
-
SSDEEP
384:rjhpH1ocy4w4lbGaUPOvhpNO9+hGERlObz6r0sZTL2fH1xCejiw:rjrH1ocy4fEaSOJpNe+8bz6r0sZTLUVn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0297ed93c3cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438372834" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000006989acbb02310785ea2fa45a744300f53ad0b2ccfcaf37ab1fb157020dfc0e59000000000e800000000200002000000029af3eea329cb407d8216b9cd89cb042d0fa9d843bbc93e0abaf15ed9798deb320000000dda41a45d45feff06726868f7fb19f18ce9c202cf8704da7d3e6965971d961e14000000043b53e40f3f1033cd12214870f9d8721d10479c3223ee86d7ad6e19c3160e34b22611e0d8f7db6b34801ef2ca154c53bacf5d8956505e3005c83f98d2a6e1da4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04719581-A830-11EF-911E-C2ED954A0B9C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2340 iexplore.exe 2340 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2340 wrote to memory of 3032 2340 iexplore.exe IEXPLORE.EXE PID 2340 wrote to memory of 3032 2340 iexplore.exe IEXPLORE.EXE PID 2340 wrote to memory of 3032 2340 iexplore.exe IEXPLORE.EXE PID 2340 wrote to memory of 3032 2340 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab007cef368f5caaa31724e140b8c46
SHA116b25b7ffc4a46248de8b13729e2dfc800bbd46d
SHA256abcd3d11de3db5b9cd429160f86ab23e52a6622b753966f4aa8aa18d55a91b57
SHA512287fc40a0cf7519ca6a99312baf9377f53a139f1e5298e19a69afa40042390b5d27ab72993ea618b2e273c3cc4888a69cc7ff28142825f8f55ed2414a3ca1f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe26d6468b1bc103c745ec7336679e98
SHA19c736462016b477b966f7a7b7bcee2dc51bbf9b1
SHA256d2dfbebf6188a1fc60318baa007cc54307f6aeb72a88ba01b267bef63d4160e6
SHA512c28ceba4171e0976ba3baa0dd0a817f44894efd143dfa4448366ab2f7386c0ebd80023da8fcaaefc5423b02c5d80f8e608fb7ef3e4b8550eaafc4fd0e818fc20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f9e41bc11c6a7877a13f1b62f9c3064
SHA105d5a207e46b25fa6b22023554b494e6f4bd9232
SHA256ca78582e8746bc679d883f6b0d3afea0f9a8e6fd6953698d0a0ec17a4ae217a6
SHA512dc63f1987f2aa1ad0b720d978b7650153e4d151c8400893a56561a0e6cdbe29ba5f431a02376de71c5aae540ddadfa53f314fea5deadc78dbc00b628d2ce032b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579265bb2cf6951534e0ba5222f842774
SHA102418c519edba88a49d1276bc32b136a1b356352
SHA256df01320eeecd0d898c9f644154ddfb278e849694acc05ad70c90bc169c59f128
SHA5123507244e72d619b45253906096386037ec71ef2c448be0c4656c035f0bd90f3c551bdd683cc6698b4b53ddd6053f490be7c3c8f42a19256e56041b98ed0ac927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefc384181c5fdcaf54330cc818a17e5
SHA1d51324a8d448b71f3cebd17c6e777854b036e473
SHA256c9402d126d6383a7ea2a56298e15693f164830e940bc87f71d9848101d768207
SHA5122db7a430ff297ae96c69bf6afcb2fc1c37c243c316c71bcd8808bfc8e8be8107e9325214cf0153219a36f0dea0c940347a1466d0e6ad7aff8e6b543daac20c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c7a6c74866480b067f62e1dc83c4d0
SHA174405fb8709bae01913b0469d7039c54005645ab
SHA2569b5105897f64465fe385b6e3d553f85157cc2a7e4d624afcc348eff3fca98b04
SHA5125851e6be99246abb2923d4c14f2f4b04687f573a3ab7266f4d5d486ba95c9733bc7e587c7a6db75b7b216428a82dddcfd5cc8483aa45659c556c093e4e8197eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ae22e6a786abe4e55bdcc1ae33f4b1
SHA13212db9647b3e32b41731241dea9c150f1a97f94
SHA2567fd33d12dd7286a72f46f13c1498dd63072358d43abbe54fbf81a707bb4aea84
SHA51256c5cdc50fa144c95a061b649a0a4cd3878e81368ee2cd89658573cf3a0c5d26c190f104b496f7ec1b1f27c3913a5101dc63b73cc54b9be5382c15e39a8cb799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a43c7f2a98548855187ce2550cacee
SHA1248281f244c816d73517e246cbdf7a286223f71a
SHA2567b033e19b55d383f47f2b04d731ae51c096d9cb848724466acef2d9981cd8493
SHA51291638e8c0e66bf1129d82eac955035daf5faf05d5daeaa247a4ed1ead5c9e8344d0eb43075f83e4b75f34972401a301c2ee1a13d2b3064ba679b190a23f79433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52991c3584a4d5793c30a70f25f9e9eac
SHA17676ad6cec5492e5b989482f7ce35f390250a4c5
SHA256486097431098ab9a0972ca44b3e953e5b04b9a2e1e64d400eaf76d0be062aa9c
SHA512ed9c43a6e2bc919f039097d2cc5fda82a3e95f0740d9929cfd595ed3ea4b2f3c39c732f6d6dd4f631dfc1d0daac085ccfff6a4f0cca7f67f402c8a4e375a1c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f660d05c0bd9a2a75d3d88fd0c45e30f
SHA11380adf7f7a7667b79b6a8b20695a1c4b3343288
SHA256b22aa7dc91548521f4d9aed954d12a2c775808c4135f94c45153e6b7bac4f9b7
SHA5126e1bab49772cef5dbcc41299217ff317f75624faca4610c6aa5770e95e8eb5c237e6fe7a4be1aa8a52f049323b402382bc774571e4cf3ebdfab7a14354a39835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a032c741a5a07805b276bbb4ed28d219
SHA111f33e87d3a274d4d08f4feb63f652db1a664d55
SHA2565738e2236da548911cab94f251e2f72d7dd1e77bb5e98b05db19e8845ca87358
SHA51236fecf3c044b1fdb75ba4b008fa68362712839ff29ce8ecb09692c5784dc1df8e3ba1b70ed41b65d03e80cdc512bce82148202ac4d5bf41d827a6172138e3eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a55424763577a1fd3f0b6df813a0050
SHA18bf4f1b8f7bd2f3916ec73e08b23eb32562d2456
SHA256714c6f39cac7c74f134b1d08f91891174c0f547cd7012b1b00be2154a5726d35
SHA5126ee3883f3b6ef45b6c282f9e80c7ed96e7e3998bf3bde484f601b382b5976ab3a2b3d7e0956d5e3189a7331e65da2f123b2c775c131276989fc84d5184e45bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076482afc6117eba514a9ad674ba93d9
SHA1593c99cd4ae18b4c961517aa88a3d3b4a42021b7
SHA256bdf80af3c71c802e7ccbea570157261151d854f81eba54382a388087f841b100
SHA512d30a1e3bf8f570dfe728e8334734893ad06063638ba4910a94c7a287dceb59c9de3b4f239cc1134f115631d40255dcf3d8527fd0e7af81c1c77b6d20672dc369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a6c2858070d222a3398e6832db53e61
SHA19d75c2cffca6f5ce269917002771dba3e183fb27
SHA2568dd964a7b25d2c7b503da630a3546e042e3c817e2d976785ef7e3a5a068129b1
SHA5124d7bd98a10168f9b5eab434ac28bbebaaa32f32246d2f608945d36babaaf2d12fd92b05c365527bf8071501a37f2f3cc78d2881f12f2be04a43194adc8bfd0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55334bb6d2ae7c74280c02013ff7645a1
SHA1db3897fdbcbf737aa8070bc761f714ddf3b8c21e
SHA2569dbcbb2694f8a3e36dae21fa8fb26ce4fef1cf5ac5381d08b510b57e0305eb80
SHA51218d11561ace7ad3f2a6731fe33289bb0062da6bf25bbce1ada566b73599cd931a3617dd36fd005fcfebe5640547ef33c73c3f1eca6f7eeb2aa1243e154ef72cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af55523a718d69af59d6dbadaac145b8
SHA118a726f1ca04999f9737fcbc8c5962b5723828f0
SHA25657e8ba686345230523df10f2360bb18ac13e8cfc7ee8f4b932b4141da17525c0
SHA512142ffe3b7eed11bae8c2d4ed71727e6a1b3b0a750c12003c3b65bec1ddaeaa7b6e6780241ffe112f9ce375358000298a4676308e51ece961428684d79612b982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ce6e3ee99171a6213801dd3c4ea6af
SHA1596089e619f65f046dc7e07b892ceb2504834f3d
SHA25690c9310c00621f6560acae8223ac3c1fd77b296163041a280beb8a08b114ad61
SHA51292a48f57c62fa077162f928705387ccab34a5201bc3496e2d07f76d28e6809713aeda3c336e8229c2e914a8adef7c434bf91cc274c8801c2f28918f49c2e0600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bac5f4a41aa465528f41c5e44be7156
SHA1c2b17e3e246ef54194a96ba6aa7228c61d8783ce
SHA256324d10cae61c7b4fb35bff03ab0e7e96dc3bee653494ad2aa6446d33448c7d6c
SHA512ff6d738954de817ba63676dcd098720c26bf975a2b375bd339aa8af5315a7f6558ddf2ff51a82b0c0c25b62ee63ce3904edc40e417ce8ae25c9506db8733e405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2ca7667b1c7d7f301ff4ef152a99dc
SHA15c568e14c300a004f4ea8dbff6d9d305e2247d59
SHA256daa8494632f1dc2040ebb8256b28158503ddbe24a468e52fff398f3e4691ad0b
SHA512a77d26a60444c78411f457463fb9f7b00427bb53ed881b2c855b6b5cf827238fdd883d4f04b1ca4533c1329e06b6de5bd1c8ffb1ae41b352b37faf70548f0bef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b