Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
IMPASSE_902035.html
Resource
win7-20240903-en
General
-
Target
IMPASSE_902035.html
-
Size
167KB
-
MD5
bc499bef570abe27d61ff412869d9f28
-
SHA1
aee0bafbb9e84da527327819dd5bb17335b75909
-
SHA256
27141b9ab30f29debf7cd3ca27c8eff124d975b0cdf59101725c84c5e0b86132
-
SHA512
6eb7c3a1d7181deb5b9daa374636883c05b472dfbc3c67c2077d3fde2d6f4c27840c15457ef2b83ce9930d6ddd444f9ca8b3d002777aa80e7b5fe73b16666d83
-
SSDEEP
3072:vDgteiDehDFDkIsQJoSheIIEDfidfBhDhDDftDIhDgBhDyDDIEDHNIftD2FiDftq:vDgteiDehDFDkIsQJoSheIIEDfidfBh6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438808123" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000d5ada2283af1fb10e60947268f106092c2e1929cfb8c4b88c0ecfef9d79a9ca4000000000e8000000002000020000000279424566dcb95b368a0cc37215905d99edceac04547763f963c7135495925e72000000014e48252ebaea159428e4cda3f47a687b780e0b401a245c3b775ae66f6db7c3a40000000fa8e355aab55765888b173c105ab6767e63c324f3125a3ff30825b05036b74e39c99b1ffcff5a9bf7f24cbb7042fb8842da1ad125d5406b4f443cbe4119354a6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f083af553240db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8137EC61-AC25-11EF-9630-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1592 1620 iexplore.exe 30 PID 1620 wrote to memory of 1592 1620 iexplore.exe 30 PID 1620 wrote to memory of 1592 1620 iexplore.exe 30 PID 1620 wrote to memory of 1592 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\IMPASSE_902035.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f592eb8b77dadb6cea58e9ad3cf8369
SHA1858198d4fca0704eca4fc9d68ab82eb74534c9b2
SHA256518a9a31234faaeed6a270c87814535d15bc11b14faae973e2c73777c14c4123
SHA5122261e3b5f36198df547c4b6f9c88d4fd9849b16d1078bee531f4c886e6c45fc275bf711f8f8f0555317f97309ae0a6ccb09888d4534accade1be00a6cf459e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643749c3efe233772aa56c1b5ac25e82
SHA1173637dbf15cb9e9602a5998f24f3602db473303
SHA2568be35b33a4e276805b8b97e3776b4165d919f2306204d2b06d7ef50b2f54fe8e
SHA512d75df0b3dc94f5c2aa976e0f3110abea32f5d3c6bd5de0c675a405263ab2e05df623a41d9046b9168181cc8b65bc93d10be0a93e25b44381d97f960f700bee1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c324d20856acb04bbbae86df19ae537f
SHA15c1d119c6c821914f39926c868fb33be6d002f29
SHA25618e0b3aa6153862619cb8d7da87ed6aab90875e8596f0842d1c4ba1aa7fb6e45
SHA51212b37076dde1cecd8f435fbf5b27e47a1e21c57d247a171d7ec1cd598e49833eb5f1afd03d72e5eed615ca9eacca7543d9ff13f54d986131ec7b149f3b982d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da76d6b6b782e58674bffddc797e1c5
SHA18c5f7d79de4acc4982e5d79fdf48812ebe7b49da
SHA25684ea7140c80a5e7bc32e8dbf7fe9d36f8522ffa67e71a3541c5dec725a821fda
SHA51235c6b46f6c3cd92e9766e927a612ed2a1b4030e970fa6ff77787afc772ae444d93d5eb803cfc14dd0193c477f764278df407bfe1d86e5e78d7952d75fc3460b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3a1485f84d26bbdcfa880fd3b901b1
SHA1927f1f4699dd9fd1f0928aef69e9d78ed08427cc
SHA25682db0ea240cadecd17307bb605d2165af201d5b8dd9e8963b38cffddf33a3ac6
SHA512abd66bcf75f5f6de16cba7ad9cf25536df1c510266f69a2589168736d9e1513f4851518e7b3169462eabb5be8d58526882b860ee10fdb477d1ce280220264515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf6eccfcc55f9f4487b71ae52c41204
SHA1c6ea07827781209a19946424550d7e9fec84f22a
SHA256749f48042b723080e73bc8bb39bbef27a6723fb9aa1450a15ede18d6fcb6b3f5
SHA512b0872eda9c7296608779ee880f10ff5c6743c85155bc2cdad8be550c57030a9ce0fc1398b0596dabd4153b84ee42ac9dee1efdad9091b93354d0fc9e8e38ba92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56008fbae217947c5e18968ccaa8a7469
SHA187d3cb6787ae104d270031077694bc95e44df726
SHA2568e46a7470d066c3f28a46f08e4de64f23449baf52054d15fa55e3d311ec22eca
SHA512c1a0e9d842072a3001252fbc8a16b3527f2087f7d2e8a62e7624b21bf1a7dd432fede8d454cebf37506a5296d204e94dde1a6e045480f8d1a418af17c39c9558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9065475e73b39aa1d1731688703f6d6
SHA18d6a4754fbf10ee6bf3e66e0b195d39d047fa80b
SHA25658d4e9a568dfd4eab434f97a68fb768bf3c627cd383833a6670e629988a3f8cd
SHA5129cbb50c9f96a6faf94fbb0fa155ca1a8d175195947d3b54e9d15f35471c0ebbfc2cfac0eba95c298970be4c481584976903305b0e8e8adc887a9c3f5518db31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597cf47dbd37c3f17b3b941123cb0f572
SHA1a70daad2f3c6f845d495c688bfe19e6ca40ed085
SHA2561c57d2285e0f0a3c168e7ca5ac7245c4b95d7d6f65e8e6f7fc9f5d6655c361b3
SHA51262ac949d6f92642401ce982580fe94b79633bf7b43682429751d8530f5224bbcbaa72f4164fb82a7a335c60877d41879b2c3722a28f4b9716beaef7a47b0ee38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8aa40e9aad753341910aeaca75dcb3f
SHA17af7077b5428a0fbba353fe473d71d717b367e98
SHA2568453d408ea411ecd4fd364267559ec615639dcfbc6fa10b28f180e8f24ec8d46
SHA51231daa7b853c38d89d362e18b8f16956862f28a69d665fa2561193725497223923d3436f50541cf5a2cd307eb8210e9f997e7de74b1bc83b95fa2066e8f116bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fdd7dd48f04410c25df0aac95f94927
SHA1bf7c11bfe495b580d44feec9d3b622cf5be25d19
SHA2569572b04dede4bb8d958a2cf44ea2b0ce2f096b32061b513427d111efacc5c246
SHA512491b7a4892219bd9658f01756c81aeb2ed7572f71ff979426bca076bbd58b4b4cd2a54d045a406172ed6d1b0b88f902ab6bc14a8bd137cd2e1889df149ef3e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc60416b6a6f1531146ca375ddaa004
SHA1741d2ea4825586df7eec0dfe4cbf7e5a2cb19ada
SHA2561cf438f706f7320456d38a4daf9322864bd08c9bfa0c773af8a50d8e7659bb89
SHA512ba7097744d918c2c425946cf2f4aeca2560504f68c57f220bee971ef1a92aa3b2630f9d43d1ecdc66b27f54c17e4b2c109c7588c6c704387c8234c2d9feecd62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da85549f6835c4cfe46955b0a040dcba
SHA192624391a0c4931508d20a8ed726fd429cd306f4
SHA2565f61e17eca9d462ef6ec573edeb476aa0b5fb4faadf7b7d3bdbeb68b43decda8
SHA512e4c65aeb79a0c1eccd28e5cc8dcbfdc8d48ffc37359043e49784dd56edb6c0e73a67354db39fb6496998ec764cb491fafc9adbf80f40b284b1a3ab27a853b47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766804d526c7ab253ed0a69fc405b93f
SHA166bb2df79331b16232c903fc4d8c1a6402c09588
SHA256d5ad352c85f9ef422349b3835a9a81ecd42a705b44037723ab7f97730a21524a
SHA512581d312e49ebfb6a3413717f2435df7724f180caae922943149f1539ab3785d5c6942a14b065b9455877afd19c0fc017cdee8ef6cbd3c8b311c43c7ac99580af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82c7363c63c924f44faae8492aa6713
SHA1bfa3cf4aa628480d4c857a1bd759e0b23a5479b6
SHA256584e54f01c91ff9437a9f5d106468075a6132202630859195eca8e7b520082cb
SHA512d3af0c9e52a905568abf14802035e7b98500cd60b1813b6728c59521631be5c7f91ac8a932a9abc824eb877cd7639e8b0983a3f6e469a74a0eb0e84622fab539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcea06443372d43428a6bbf36909f840
SHA146c4b7cb460c5c459759891ce4f6608a266b854c
SHA256cdcf3d9585caed5c11b029a997aecf11ddc8d2ce390711cc84951acf158c286a
SHA512c44a5c5e4101136d04e88fe5a79455492b5c75eb403db44f496613f2cb37b0ea24c3f5743fffde1e8eba0382967e5d93b4e1d3ec4aea1f5f483edf0a364faaa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d567d25f4cb21a27f4a9fed560696681
SHA1d26873421ffe3e906bef409bfd076fcf206de322
SHA2562901874c39fd205dd6413bcaa14cd5ee87a6263094e5a0e55dffaa8de2bda8c0
SHA512374a87e34ebfbfe8f5ca7aaef84c8cfd41d5f4f621b6c5873beaefe0da3e8b2e418250649658ca41f1c01f991fc41eb0e7679a9c5dd9c014f598a9d1d1f33441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be9b6fa3991e88eabbe5a0346152c43
SHA10a2357ce34280e817c90c7691c78b7d23008f617
SHA256ad493384d97acfd41824fde90e28c4f0cb59bccd6c74b1f227afdf374dc18fc2
SHA51215c73113e3cf457db960186b47f4c556fe6b34ba79358bb0e52cdacbf50d66e181cbf26066552a8ad263ec84929d61ce7e819172eb7bf68820cd96210c7bde64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba0237a1de1374267be9a3aeaacf655
SHA13d96aafd6a90b04319c30e728d8ed9ee70143ddb
SHA25629d2c430638219d20e90cc0532ac814b14ee850baa354875584f350352b4c335
SHA512bb195e321adc15bfe96ca642962c14ea7f6b1eb67b801ec2ab810966ef7d1c146381b5545ae3c8d1d3eafdb634db39837d0fec66b0c8923b6d6e5d7e8b6a93a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b