Analysis
-
max time kernel
390s -
max time network
361s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240903-en
General
-
Target
file.html
-
Size
8KB
-
MD5
b24e8ce81ecb235932bd058ee9b96845
-
SHA1
b0edfd7533c97b2cc17ba26e322d95c15ca07756
-
SHA256
31010cfdcbf084851f8bca16e6c16803d51ed69aa9ca91a63de4ad2dcb5827fe
-
SHA512
ab819d84daf1205990a88ea82b8fb5dd94f099d2fe9bea8eb6698045a739f165580fd2863659f5c5d0f8f727cf8fb95f6c1abee4359dbe1b49fad074a6deed51
-
SSDEEP
96:PNybXaotqEb0EZ2W87IuU5N2INgKvclXtbF8Y58Z9HaeK1gF+nTvkUI5SCKlWkq1:PN2x2Be+/Xtv5qX9WIUI5pNeWvik/yqN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0268BE1-AC07-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f2c33b436fb2ce2006432ffc6d9abc496b4fde2679cdf1f2835022934d8f0c18000000000e800000000200002000000039b3338e1980c289ea72e107e1332e9244c0ac7583cec3c3416dd57146e0a89d2000000055ec47589f86ed1021b5d52c05a7f1f1108a92d561f39fa8aff6f517686c6afc40000000587759ee9a8669d466fbf1ab1ff6e2542933fe0e6ce7df7e76254eb9701d7642823a349e02af404b25dd809d4dc97b0c1162f8b875366ff0eb9a5ee850e460fc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438795290" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7052ab741440db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 2440 iexplore.exe 2440 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid Process procid_target PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580443d106f096925a83a89d740caf372
SHA1bcdb7187c2eebdab5197395e6298df998c7e7f8d
SHA256e57bf3ee774333a6c9f3f4a979ace369baeaba53b9dc60510a7b9185fa70cd04
SHA51204d45fc243e5761f03a4972bc48f4a08c77cc80cbca6672970e058068f79caffe64e88fd1aa108a50c3899b4211a7bf77cef0b11c9a94c2cc478d99ae2605eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554866727ccae5bfca5ebb96a18a83231
SHA1385ad61a5ba034686637d1ce2fccb95fdb269e27
SHA2567257f5e82f0ecf74e5cbe52e938422c42633b53dc30cc9c11ddb3899fc9c6539
SHA512ee78b8756a5fd6b3abe8ee05169c0f67d148325f7b732d675e933a21cd0cb7d150fb344188184c34358c13689e3e16ff712b08474677678958f6b966f20dfb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e27c0eb0316e171b1fac7d097e9859
SHA1c85dbbd3731de9df8561f8c9f9ba6779b21c6bb8
SHA2569b054ee3fb9e61a3d9dd310bfd827d862396f74308ddb5213f15d15f2386c9f2
SHA512981f39f3e4edb62c1de3b58980c4076f2194ed0b370aaee268a73e5d5567238f363840e44672bdbc0d99fd1f3cf5898b3dc1f51fac532f74c121a6f3d17165ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d631622c19a43cca10520cd11443ef
SHA1dc6e443a0b0b18d7c3813b7d8cb2773fab291ea1
SHA256c0caf24b0bc444cd957d490fb8a9a75e08a5e8a8c0907c957db0ca99ed63c807
SHA5126e6e926f1dd2d2fd131bec6a8f13d9864c97d97f82a67b9a453e154524e808d5595e0beb1566edc19ed9a592eedb01926858b6494ec4ec96f5f39e7179b07c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c038b3a076cb2a158b327606a9f20b12
SHA157a263e9df0c9d0f081cd32418791e5c65d4d91f
SHA2565ae604b92177ac12c750b15648245398a9bc8c168119025812e454bca58975aa
SHA512c34322695a40c187e98fa3dbe1c2d23b44a86459256a44e09086a1c2cfec9abadf48870a7d84e065b74211ccfdd8644a8edb18d51966e0514179801447b0aa4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa52bdff899e4ca2cb4c6db7ee7a053
SHA1fc732eca7b2d1629a22f131d052318f0ddb55068
SHA2569a5a03cd9c5906bbc41988405e9ad8c8a8af6c02717d6ed6cb0c918911d3c6b4
SHA51279cc15af5786f9163d69a878610f8d126888d7afb346eaf736aa57398686c13ce10ef0cb0d0c7c9238cc8b2f81cfd0a65f81b912ceeb25eadc1634e59b31f104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b17f05abe98272f2531d9201f63c86
SHA106e8eef498431505f24aebbda44e3ee654c757bb
SHA256a96d7e2dc7cef0560173860f5ccc4a40d4b736f4c14cf09f98e8206ebdd0bbcd
SHA51237825a6de7085cc8afd8d571d87d70c145aa92feace485e8a3de41407530f53545c5e9793cf99109006431901957cda483c75423c9959e7015381a353dc1fdc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f1360c82a8163f236562ffbc5fc5cf
SHA1d955d99ee793b955086108e737f3cc7b9216ae6d
SHA2565b241c85de813a85aaefa15bd86f1ef0892a9751d1dcf7cec8dfb4ef49b598db
SHA5125b4d70e9b1ba549ecba7b87594de5dced40704f3ed11e417840804731c787f8c0dab3b076a0c81ef0cd72bddc43524df41e187d57bf290a64d2a9cda475b9e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc8c50afa1e6d7084f4ebd15a30a975
SHA12f81ae4fdc7949a8262ada6faf4ac8760bf6f757
SHA256c1ffb8d134ad546ccc09dba2f1b88fd4acb746d0563cb8069cb4cd1d6febc7a9
SHA512dd74649fb234872d49a264dab4576f0127075aed06f05f525098e06cd7994e1a03e6ed92e3505deda57dc9a7b61f1154c090d2fd7528cee97785333efcde9747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff19eea084b5cb3c1babbdf842bd0298
SHA1dd6d5138cdfc2f8f8185a7456b85b8c7acc0e58d
SHA256dc1b1110c3d9f3f0d133020a3c1ec444cf594d99aa4689fd32f0c2ef2505d740
SHA51287f7e535a53b82c2f98b87decc0fb62ac0d9a5bfaf078abf5257f1206b6dce846e250a864877b21dffa4448cf1b0dd33751135fb74a4210d9bd80dee784bb005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f176fcf82a3d712fd9f220764d2a2564
SHA1f2082e4de4f1ff3d751b2941b47b20f05492058a
SHA256dbd811c0cf61e34313192bbb4af097b043d20c49c8830b35d2e5495800cdf69e
SHA512aeb66fe669ac4ef23b97efa97684d7cd6bf366a9b2a18717a90e095a8c04b13a4b67a052417627b272366b2a8fe7d07f1af06895b7ffaebcdc63da1b84388c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94b08705495979e93be062bf6d41bbe
SHA14f5e8f8050caf2bea7c26e32d4f3501f1ec25e63
SHA25603aca773fe31ab542a3084f2f296171fb42959a314595d529197e29c4b0cbc54
SHA512d7850471fa84872a1b8fc4fc20c3036046fdd3544bb9b1d884843ce1c55c1acd4f881598443085a62cda812ae94ee800a3f35463eddc9e4e8e4e23f4e97433d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54639c07fb24092fd445942caea3c3a6c
SHA154bed54031f4680791bfce13c840d92819b876a9
SHA2568bd122ba36f29420cd81c7dad2af13146c82b113d9500a91415500fee5ca2350
SHA51216f79ab84c7bff6d91fb656bb3f6065c624595d6b94868765ef74b309def9637334d67e8a581b6f1049e069739176a140550acdc7da3f0d33667cb2fb2529ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91d56e92eb7f696105b1fc11d949385
SHA1c2f213b03d40526c161676c594657d1cf605051d
SHA25648af3eea1f1db3c8a240f1e5b126d681c4158b79ce9f23584e5d462a00e139f1
SHA512ee3afe5a6f8bab3bbc7676eafa338499ea8e3f2e432da1f3756420370a9f0c903f3bfc72f5e7b8cbccefe87496f0327f02340f209bd5db59c7fdf41ac6e0ddef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58410ef9184d7239ae0d93c25429ba761
SHA1e5e2d6a2740d3c07121fa2fbe24e12d181db25ed
SHA2561d45dbd0baec2e328dd523ae35a1083b19a9b924966eedfebbc19c3b9110b47a
SHA5121a1492cff35b95f2eec635dc8c6cfb69394eae3ce94e9e488729d0192a0ccf65e74e1efe3d7683f4f6c662597c214bd2056bdf1446ec6c7a8bd6a82126d655e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534621d297ea9c1a4ca2968d831970f28
SHA1255fa2d0e822c7de21060c78777254d0234fa5e4
SHA2562050ab1fec98afd9404c1ad3bafe16932f2785dd936ba84829654f73cda41e52
SHA512a5ced08150ecef8298e19baa9a1aa9001aa234a7bd29d69076a333a5b48041adac545da86283c184d227da8059a93b52d163d91885569eb49bcdf12af7a3062f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3278bdc42f9c74cbf1b5f43b573297
SHA1135c0927712699f495fdffa1dc271cf2c8595771
SHA2560ba8bb0e7f2ec08d1c8de91862deff7ad52a3052276c8f27061255592f6b65b1
SHA512ccb440403c7911232e466872771d7409b2c2a00337dadb2a7f9721bf060379f8e997b305ab40a7cd267e3d785a15f306ea98f33f138682e96c218e7c07b585ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536eecff34ea3171e9c03c2e514bcf1cd
SHA14b82c0ef67fc1227771798660d15345c176b493d
SHA25633a23f1913ef9b696bcf00ba4eebad25c4e58d51af186ce2151e69cfdbaa1f7f
SHA512bc9d99af4777f615443e2566d876da5ec0ab2cd9def449f780a4d8d037af9687d3a21700ff517fb2728b7189e7d2bd58680eb425063c072bcf2f476b5da969fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b