Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 291765.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order 291765.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Tikoor/Feltstrrelser/Ribozos/Quartus/api-ms-win-core-errorhandling-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Tikoor/Feltstrrelser/Ribozos/Quartus/vsock.html
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Tikoor/Feltstrrelser/Ribozos/Quartus/vsock.html
Resource
win10v2004-20241007-en
General
-
Target
Tikoor/Feltstrrelser/Ribozos/Quartus/vsock.html
-
Size
1KB
-
MD5
5343c1a8b203c162a3bf3870d9f50fd4
-
SHA1
04b5b886c20d88b57eea6d8ff882624a4ac1e51d
-
SHA256
dc1d54dab6ec8c00f70137927504e4f222c8395f10760b6beecfcfa94e08249f
-
SHA512
e0f50acb6061744e825a4051765cebf23e8c489b55b190739409d8a79bb08dac8f919247a4e5f65a015ea9c57d326bbef7ea045163915129e01f316c4958d949
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{031B2A71-AE52-11EF-A160-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439047142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c6390b5a0b06eb625f4d1e8b7d1e439e7ae22d87cc5badf20715cb9fba2e5daf000000000e8000000002000020000000f2585ffe1bc9ea4f695c368f2e2ff9f2fb829dc25972c5cae8a6c290bc495e94200000005f679b42f740286927287830a624b6ba4cf7fcdc0feb5c3a8c10d3e4e90ac2bd40000000fffbe65ecf82bc2b8df65065d077b0f4f1aef838fe9d77b793428465dd06aabaca3ca28a103ca76ddce0d0b9b467691bc19d1c21f9261d8c5ce52415a120ed85 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9048ccd75e42db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1800 1620 iexplore.exe 30 PID 1620 wrote to memory of 1800 1620 iexplore.exe 30 PID 1620 wrote to memory of 1800 1620 iexplore.exe 30 PID 1620 wrote to memory of 1800 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Tikoor\Feltstrrelser\Ribozos\Quartus\vsock.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548a11f099bcd4626e7d27ebfae14f05f
SHA107eaba4dae9fa84dcb13ceedf2948fb68a004495
SHA256f61d1efa4378abacc65ecab2637075392245a6619f38df0a50172964bc72611f
SHA51210f594d1188988e23f9a64040b072f1ca03240950133754dd3066132422c4cbdd48ff6ff44b110028415ef6f662b63be92b3dcec8a055c78cb5e8aa578fa9e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b826a78f79ee435f4bfb710ce0c7a3
SHA1d53bed9c3078812bd5a1558d9326c7349c546267
SHA256bbfd1d2f2cac685dbd1fd092d43b8939ea8bfeb1d0de18b0ae4cf5c170ffe54b
SHA512eff604641cd4bb19459c5e43857f2e69a4ddc708525425983ea71fdd523eadfa30d43d1a5f9931262c1028718d0288d214b67c55ed67b1d2c82febf178759c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c735e97d5038a3a7289466bef723c3cf
SHA1dc6a134db75f96fecb5e5e5ef9e1d8ad4eda9488
SHA2561c7b07dcbad9f7d7a05169d2477526b00a0623b246fd0a8a7c0b173cfccf0212
SHA512258f015656e26f36abce5b01f851bbf6999c37611cc21b235e1737e39f598a2382b5356d8e93320183d2ee5ae533a18dcc374fc0caa852de5f7f337537e63646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b2fce1ec94db40be748fa0f5498ea4
SHA1d02f32664f8081b3f0497a4c5e32a2b53bea29f6
SHA256d61b208c5d7a2db96dfb5a274726ff2f6cd5398e6547a0ec74c8e42d15de4092
SHA512c755e24ee44036d6698553824a0c13b5f303da61cc1a1c439a61705b414d55f44b5be9f2e9e161376170ca86f3c207e91fbd3fc2048098d968dca0f8d1bf3e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d0cb941209dace9515dc6d06332e3c4
SHA10aaa876469e6995ae4767d15b4179dda7e9621a9
SHA256d691829f1cf4c2e1ec7937653870c849b9c1f86f90ee683c2ea5ff25447a998c
SHA51234965e588777e98b8497064a6a8fdf35c38b3d0c943422fd8626a06d5ad0c8359a5df581ce6382a8c6944c01b3a3152b8b6a58b20f053cb7ad1503e468a3e776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a8d911b061adf6d93c883ef10a4a9e6
SHA1eb2adf0b48883dbcd9d5e1a5954388fa7ca6c57c
SHA256ea97b261c42bcdcb2654d1fbe44893b4db6faf6de774882d5fc4d2b83c0910d9
SHA5125307033c182c6e67f78f34eb208f664ed714f858f39d2606ca6af44d3669fd3554b97fafe3359f8fdec971b79ec03ea31c0cea6d009b4b279d9e80ec11a92465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5454dfc29e9e638df7f6ff3c06985f8d3
SHA161be70d5b14726d2276549997783ac0efd96726a
SHA2560c154526a1a7afd25e5db8ea9dada53d3cd5c162e971d4778888fc8d030ec9df
SHA5121d527e515bd262dd526fe00abd187f7c4d4aeebe9b88d5bec59ef78db898b17ee72378967b7123e2ec29bb4055f1f2f0b20ed087a82065d3e0f49ba41ee26874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cf761dbd469803a1b5dba48e5dd1e1
SHA1e1329de9d8d060d7e547be7fdab822dc6c44cb35
SHA256de8815f71dfaeb75c34d00b704d76a2f9aa57c4c03d1b071b1479f069a81dd03
SHA51291702c8f435eb342151ac9efbf1b9328df6ddc4b76c1276f3cf3fb04e1646ada48f9bfe297de6f77488361d04859bc04860ef061e4ac58e4a05779760dcc03cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56478151fc33e46744641f3b841b7d7df
SHA1959ba077a775f676bc0aef4c662013f6cc462303
SHA2566a46a15590359bfd7d3234e958cc4ace6660aa90d06e244525ba828f97b96e84
SHA512fc35e60f46e3d8baa04695a8b0db06547bc3fb494e4339472dcc87d35eb9bfdb5448fc24efb0adbb67892057320bac4ce4caa89b89529b26ee3349ad716690c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592f8fc66a6b974843c7213acf624dc99
SHA13373955146d2585dbd15eb4596b19e6511725de1
SHA256ef133cf2dd50a4bb588572a9de1735bbb92937885af17da495a803032ad4ed6e
SHA5127ec313ab7a2b0f32b584baa9ad848ebf6d9ecdbab3c93266391218579add69bda6cbcbd6ff081dcfdf45a8cc06dc2a504a44ea3f9282746283f49eeefffbc848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55811b60abd8f533d0efa6c7954329c6b
SHA1c3ad6a7f3454379fa5421d334af74705fa0c4257
SHA256c05f9f5cc1d16b7b5d83907497d823e58a9638d1bc7a0887b85fee242b59c0a0
SHA5129793b5e50f23eeb732064414faecac027855dc4e898e414a0eeb6538be9ffbc3e6280c0d991561f3d6fad45f6b1ca59bf292e3553e9aa7d1e8fd1181d6389ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d831b53eae7bf96a01aa08917b4d7afd
SHA157222f4de9b6f6fc5b61e9a096e0beff12458770
SHA2562fe737c7657f6cddf294ceafef1a67213fb835e9cb4d6c1c2059103031b856d5
SHA512519b8340c63b1c82bc422c3e997be9403f3d064da84dfd0fbfe39b2f9fcfdefbdf6d5344928b5dcae2e64e9a56a3424b9bb0d3bda1356602a2166feeac46bfe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d292b832ec9105ffbffa69de08f83361
SHA15bd37032777f93e58e29f27ea958c2c670968fc1
SHA2566c7473a7acb2d8afacd7288bb9de372980322d99065a9d6b579c0cbdcf5d7fa8
SHA512fdc0db428f76f19155c1771cdb176695c81eb28bdab5fec371454a91eabff6514f5df916c2b4798fb54cb40d47ec255fb22ef5f4c4eef8013a3633ec3ef969bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53314c8be6973e452920d610a3f52a2ea
SHA15813f230a213a949d050a3f780f06e7c5b50eac7
SHA256c8209226c25313d5f2cd853cdf7bcbb95610b6b1fddd94fa9dabfdc7b5008057
SHA5124c49175a69f873e01eb95fc7f9d71df3fd6c3b29b3efb1c33462b5dce64ce6c7611ce4e34f47ad82093b65511bd9385547115f5537a19e9da3b2bfcb457af9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9940e60674d327c4a226790add9b790
SHA1a580590f5bb8e7ae27cb42c626ae9652cae61355
SHA256eeab8a122e3e735a3243a30efe8995f90f20e0aaf48da7b636559ef3ed3c146f
SHA512e29013cbc21df5e49e22dfc077a44d105ee56fb29106d5743978ca110af60354c91a26cdf05ec116cdf7bec84bf8b0599d536cec4c5c7b8e9f0fe127c118b368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4d921015d277b0cee8701db69c85e0
SHA1c0a35e4364316a4c63e7e44b7ce1ca68579c4e25
SHA25637d346845a8a4fb8ce89c335fc7bc88853d882f59a7fe09e1409ddecf1959b7b
SHA5123ab6144ff19dabd1e3888da5b10b4792b71b4238edb7a0f588afb89d3ad8228e24b298cea18c541e43cd7e830960b78318681e44f4f42ef5d7074031019d740f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b