Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
5a8c00571aa28b32c62dbb7993e5b55ef795833f.html
Resource
win7-20240903-en
General
-
Target
5a8c00571aa28b32c62dbb7993e5b55ef795833f.html
-
Size
18KB
-
MD5
c18f7054b4d698e48de713440dfa77f2
-
SHA1
5a8c00571aa28b32c62dbb7993e5b55ef795833f
-
SHA256
6c9eb38a68e5eda86c4f37d15c5f9392a6647ffe89540a29a7ba9b3a4af9a052
-
SHA512
02169ba92f534c5e84e5fd62277c9cb9f16e0975ee8e8e7c06cb66c2d2400e85477ce47992377244baa80601d64aa0ba8ab6b096334d63e3feefd428da29f21b
-
SSDEEP
384:xNlnwgFv2fY21Iy2lMqQpVGCBH6xfyv1fkCh6c/Z7+XUmgVOA5:kF1IJWHpVGCBH6fytfkChfX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438515335" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDF379E1-A97B-11EF-B594-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009566a2883ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000081ed74234a55693f3ccf9a16947dc7228e6111c3d78effe0f284861852e4446d000000000e8000000002000020000000306153126622c628ed6fecee2d841f4d4ce92e931ce6db20f540f1619a8fd10b20000000008ef793687e2e0d14c5fe7e06210aa48a2a0be3eeb39a4ac585b7cbc87e36b3400000004321711329061deeb60ed219d87793e04c152c657d0a4f8cfad793316dad5892b078aaa1fb75e0f156720f49c8c95424213eec0cb006d33fb7b3e8b4d42d866f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1652 2292 iexplore.exe 28 PID 2292 wrote to memory of 1652 2292 iexplore.exe 28 PID 2292 wrote to memory of 1652 2292 iexplore.exe 28 PID 2292 wrote to memory of 1652 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a8c00571aa28b32c62dbb7993e5b55ef795833f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe84c4c34f67c7b5bd6ab3bc16dd859
SHA1bc7bdddc4ee0bfd98ef98d2df8b5c7f0854dbc5a
SHA256ce5ef5cf682a07d0a808b3d4da389246d9c158db40a7904102ea054e6b2f1f7e
SHA5127f72263a09d523c48b8d3cb0b8da751b185ff43caa6f4f8783029cd96d53a03572ca3502c0efbc0a1985485e138f83d535419e7104d3de1fa9b3c53f3d29b705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1c885105d011cc3879dd3b7ef3ec13
SHA1df84286b65bea770534ecc02f7fbb153876b2010
SHA256a408a2b75fcf04bf02e3d039fbf4d81846e7a94f559b1fc97139e8afdb7ee2d0
SHA512ab9fbc1f2c8f10c48979cf90e23844466f8256d2435906922c11b5b16549b0938299292c726871ca20bd72e4eeeea760bf2bccfb045468716d25b5fda4221b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2f3f7467821065d36754c7fdeb0b6f
SHA14a873b17032b234f1bb4ed1fc251c8aefb173f1a
SHA256cb200c392ee12dc3fab55004e8b93ad5d77a97be2f504919b64ae54b429a7530
SHA512977067b882a76fd395d8b119ffc1602c5a060bfae6cbbb741503f6ea9b5d0984b7bf555091ed8cdd233866d6ee2b809606da3b4e2b6c2755246f0ce500d82ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554931ea7636edbd7809391a16d2a5983
SHA1324cf97a37182c7417a13c22c504206bbb0e1eac
SHA25629cad805856fd547444d4783c4c7d41d57da308db7d7e2cc17cd53e899dc2045
SHA5127bfd088fb4d54d8d914ba8520bb71d56ce01188ae1952e420de2b86998e3a59db03805507118dab27308d7d0851f962e93277ea24f1ebb424e76cf8c227429dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00f2a7d14d477383b6e554e97d5e41a
SHA180c122f3c555bff996699c88c6845f383f556468
SHA25603bbd92a89308f88c99a7e95617c33efd302e181c4fe79256aa34afb4b10a4d3
SHA5122a9cd255e5e394c5c6f9e6e8286ad8c210323605776cd29f5fe00c37f92284cb47b1b404f7771f099afc913d9a327e2e24653a0f6a54c2fe3c2de8f43646aab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597d7e15824e16d95aae7e9a141d1f7c
SHA17e27fe8e9d8776002e0fbc7529028ce1ee0de261
SHA256b32f1baea83b7b218d236581b81f73b3007b7ce84278b6ba191a97f458bf6ea1
SHA512e18269c5b74ec6d2205705afc085774eecefcce6095e7190c5a962ebff364caac4150c9e935131f07e64b7ce17857fed131cf0ea64c16ae6bdec30f84edaf32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50a37ccf8326dbc15f5f0770789a205
SHA14d8c16bb57ab61b47f716bdcbd6283fc0e9c4af9
SHA256769abb7e61dc689afc4af992e1b23cc86253942e51c42201350c3b6433e03cdd
SHA5121ce47a064c11ed4995f95780fce6fe18e72c87881803a509526bb113b6fce44d134e50bb7e770795bd0704071c1204ad019f11c1c3171ce2cb1eb456d75e2b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acb09d6f45a3cb97853d387d7fcbc8f
SHA13efa795f0594ad059f41fca9c1f7481b77d9b2f4
SHA25643224f8c65ab54fc4b3bd982e36d9b3846f5b172323b60578cb94b16f351ec18
SHA512bb64308cd590567b5470d86b6d58073a5a777f27a446468fbac2e8c506deedd1f41876b423606cdd070b74453f7aeec0b8c8d8086be0b2c43f7ec9d53695cbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5f6b7e89f8468dcbb72035319052a3
SHA108e48cfae56451d53ca1c303edaef32f01415676
SHA2565f062d51b5aeafbd72e07dc60110364d621a039b352f4ed83cc2d0b17b5b22c8
SHA5124cd708ceb5a142638f6c94ded99bf1cd828c2d93af12cebbdbebe52a886a08c673423a9985bf42b05383f1c694f4b256b452bbb8f9ae41da7976e1f6e612553e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a8be26c3a5d8b62861e07c3e031720
SHA133fc0b9e68932bbf38196954fe0f30c670824e09
SHA256e9d93dcabe92f8fc35da777c8812389456a1412bdf0dd3b4afd5fd4de571fbe6
SHA51288292185e9ff827f7e1a5974e44a9f053c0cf6d3053e9680969ba06847a29d1a7c83e111bad0500e0c85d8b4023fd8055261013e42767258a2326ce020a92903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e21387df4cb924c946818068117b55b
SHA17e94f4c532ffdae7d258cb39c1cbe42ba13b0b03
SHA2561e4a835a5fbe6b36452a4502a0822075169f16b2072ee6b3fc403f104c3f3847
SHA512a8496c2f1588771930f6ec2dad89e5d539e5d39cf6a9979e5e68bbccc56b1dfeaf8fbb26aebe3fdff4141e195ce0889c9cd37e6010d7be29d18d6795c25493af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c6a8ceffb6f3bd10a97dbce02eb1e9
SHA15eec2204a6f8d792a2efa3972ce3e0e0b0a66f3a
SHA25604c854b8e534a399bda8da03988d670b759d78abc52a697cb663a13102c1a40d
SHA512cf81a6946fe0edab25c10a6e6b20492902d0031c3808d8eb622edcb47ac0e20c468318c348dd6fa45aa2905962abcfd55bb39e23ffc511766114c2cb2814e42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e5db9aed727befdca0f251c1408663
SHA1101247f5e5b50e13aa4985912883753fe5630bb5
SHA256e6c3a1c16da61a0d6e23458b08d8f8415475832028eff080c8a96a988c9b05b8
SHA5124a9fd131e99d674946736afcf8bde820b581efa8953522ea60eb4b4280a47b6c3550e5eefef1b37ba545beaf4314bae5685479f3d13b1fcdab741feee6f52266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ecbc5bfe5b31f4089ae099d6237c93
SHA1d04c9b39ad20e573a5446240ee5f8475aefa7cb3
SHA25638fadf4c5ed9826735f6fc55a4ac2adb1f25b0da50f4329255cb7007bd60bfb3
SHA5128e64f0a65b4b82faf9a96bef7c519caba5120a5a17914c752fc79f58bcb529953283a8666e0d85ad2654568fbb744e287827a7b4c43d95d158321a7ddba3262d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb0290133ec694870cb912ce66234fe5
SHA188395ff88fcd390d6b2f3e69ac6b016242e746e9
SHA2564e5a8bca2ffd82c46406a92dc5b5bc120df6f5734985b678131e7ad0c5c2d8e1
SHA51224c4934615614c7224aab6257ab550dc715f216ce6246a00a00fc77dc43706a74959a28cb1df3ea44e5f81640aa9f27907a8c02c958051370b8351b48e7ffab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579558eee79520fc0618e6ccc21a979f3
SHA12a8737b6aac211ccd12c591bc2e9a882b8c7c2c7
SHA256e5ac6bbc6ddc94d1466d27a2996721b8c46c5321662daff15dad3a3428489cf1
SHA512c0b30fbcc598268a084ddd703daf565025592aea6caac3d2b462cd485bb68fe57f1366d01bb756c2c481140a943a2dae7c7ec86a53c689c2b45a3c82e9ae7da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48646fc09c3f5c11f253eda5665e7e0
SHA184b48a3a800ce3a4a7aa0e1fd93a9addeb0f5b4a
SHA256cd424a8b7541bfc9258266a083559ca8b167ac27c75078ca32c70db89d35802a
SHA5121e19859383e05221650aa5d2343f0bebf4622dbc5fc50535d663d277824969484fff391a34f65c95722c6e5f755483849a4a62bab740b49738138b3b8abf0b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682c7821c21eb330444aa9eb16feb65c
SHA136a0fa64c2778f1cb007e146a359e666ba353db7
SHA256742e17152f1684b15edb88cbe17cb2df846394e70ee72665b85200baf5deabc8
SHA5125ba73efa82051acf583b984f268669e7e15c32267698f9d4789f7ff103a3d033efeb77230a48b64b229402e8a51aac2f1a700621910bdacc4b6800e5c8484bde
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b