Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
betterzorara-v22r.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
betterzorara-v22r.html
Resource
win10v2004-20241007-en
General
-
Target
betterzorara-v22r.html
-
Size
4KB
-
MD5
778d2d5fbabb580507b6661e9b285386
-
SHA1
9b8d11714be44a32ea30cd02643aaaced7ee37fc
-
SHA256
585380651e1d9200839aec6e5af4d0bde567b20d06c05f3b922319da38a0520f
-
SHA512
1f02fe6e29ddd73a6e5247a43bbe695887120bfd2e10b6d23270601518e8d7d19ecb8b2b012ca202702bfbde14cc05bff2fd14b136355821ab693503594794e0
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8/ZqXKHvpIkdNfrRU9PaQxJbGD:1j9jhjYj9K/Vo+n8aHvFdNfry9ieJGD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000001dea23babc3b9e9ac00f50db58600c637e2256fc66d911cf9153bfca1e691b54000000000e8000000002000020000000ea0198871f7d4fc2ed4fdd2e66ca91775b75289bddac2641c18833f08068e26420000000688df4450e7ac141128e92dc4ca58bebc546ce9808c2bfbb01a56e723dd2fcd040000000f4f76ab7420fd563fbafc04bdfb3aadd9273f72a3fe7295129b179dfb91f9b316f677ca630c4cbdba7b92a93dcc16f8c5b8650450b22f464842b216a86aab81f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206e9d74e542db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0245F91-AED8-11EF-831A-D2CEB2690DEF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439104957" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2872 2844 iexplore.exe 30 PID 2844 wrote to memory of 2872 2844 iexplore.exe 30 PID 2844 wrote to memory of 2872 2844 iexplore.exe 30 PID 2844 wrote to memory of 2872 2844 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\betterzorara-v22r.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500330b73b3fca69dea3c53d0c37b6131
SHA194f2464e4812b8e44c236bb6b8e3849262f4189b
SHA2562c82b434a00639a21e5dad25b4a91c141a172dfe99d5553f0e917861268b494d
SHA512cba2b5d8f766e64d25813d633b5ec47ba0d36ef32f93f9b148074d37b03f6f2b1892c61eeb7fd078a62ade661977a913c0564dec215c107753e36f10027b6dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5cc4e0ca4789653d53e20a739092e7
SHA115100c52e8cc58f1d8d04bf546c7596a84dcd51c
SHA25666d0480cb70949e7e324f0f09d57515c932ce8fef5646abbab8db1fd471240ef
SHA512c4db66a6388e10006e0e30185c75d93d77bce8d3b4d93bae5fea427a1ab70b0ebb97393955cfbcdceb6793552c57e936c517bd6689934fce44488c580963ade6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e53eb1a38ca6428fe215022ddf1dc5e
SHA122699170a9e1c559d17c45caab06a9a5d41fc324
SHA2564f4c0b0ad19d2f838ac40e908243d60a6ab899be40a4463de7daee674bde1f97
SHA5121ba184102b04c663b593bb7c5ecf1d1c71e7461e76d3efffcdc335ade15b418e59dbf7fcae9d9a2d713472cbc1d6d703a38db2f6946bc144e6e9aed017b3202d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91d16b581d39579c850075818cce94c
SHA134a80e3011a4cc1ac60a8627da7394a5b09ccfdc
SHA256807d59c9051ee8978f2d97af9d32ee4725bb600eded9d361a78779d04ab79864
SHA512a8c4c418c9d640de9b50fb10ad3ebc807ad014723a59240ea7a3020b8ec5ec9f7c718794f3d08d4930c75979811a97b6566d8d6c210d7906e325911b4102c814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578494e3197ae225cbac0948519a0e646
SHA1db32cb98652efe2675c3be5d1272d3c18ac7e370
SHA2562814198714e3f65fd0b94576524bee366c3a59123ca86df0284722914594a032
SHA512a5282d429a04d69603fe1486b51c26e5988bd2226480586e3857119bd38af32f710eac1021e96184cace6966f6a0a3788bba793b08977f22e4ebd083e5dd37a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f48b79ed4eeeb90e1f5735a79e438f
SHA158c395153b58b406e30a8d47c9daa611d914870a
SHA2567ac93e2f9da92bbb6c7374c6e4bce0bf78d584746244c51e8586e2d93fc1bf96
SHA512665fe46e6b39eaf6bf36c38461d78490e6b947bfed42d5aa90e0029990fc11f769678661cf87d15c2fd9d9c8783551a0d538f47902b802c8eaf86561233930ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa64ae0f70588b15e1a11f88c10fe52
SHA1c49184f2c2e2a405adf2cc33ea43fd41d2fcd3ca
SHA2560f69eaf15c332d18934a041e7307c9c262814ec7668218ff02ceeac306a0e934
SHA5124157bc23a54c6282ada3a84122a50fa5facadcc43559fed719873d177c42d45df8f7f9dd634ed7fbd30abdb4877065c045ee7e45c4d2d019c998d90e4008e616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac5cf8af97c4c8e6ba52673550db36e
SHA1ae38ea03ac9d2900f6ebf37cc511e4c8f3d56164
SHA256eb010fc9bbb6a3b66d2727ea31838e7d001e8d11e09dee0d20b08da132a7df3c
SHA512726fa2c46c0bcd11dea42a42da986069362d5fc42b21bd1b5e6736ba1f534c064611c4fbc980a106832d24d04a0ab65087d9c6004c421442a6f651ff1df3882c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50184b8ea3687fa9830da5dfabd24d87b
SHA10de4e4310530a973667841dcba499f1b71fa8f89
SHA256e0e24747d911ba43d0d1b73b48bb0c5a74464d027ad38c9934b7a4c07e222c08
SHA512ec62e3fa01a1f5bdf8a457a3d5c1b41d6b9a1f1c8aef5ce1b861db15e184d80d3cb1e41ebcfb251dbecbafe0e065d90b524fb95cae43edd9112cc2f36349d421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57671ba07a0f6fcb5c68e237bf485bebe
SHA1ea6b693755ccbeb996bbe29d50d3a04e9a7948c5
SHA2569a7e51768019315d57b125d58d70cd0b6b3f4307de7e35e0a4caa08f92658d86
SHA512f7b7c36de975619914823c96a6cc08118ffa972fbd38104ce1a9755d6f8ccdaab564b4e9794313db5d5055eea0147a8849ddabe0896fb1c0e6d5c9c8c36f98e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5328576a24cd03993dc93d4db956ca4d1
SHA124325b89966d465562dc72803de8f0961bec120b
SHA256bce750a8f2c9f3de141ba78032137430c323604e5fe303172aa90073c8f9fac0
SHA5124734d457783c4103e0c0ff7d2b5b5eaea863181d37904d052c6819eeba1a8cb3ce56de6ce0f90d3e2fd40ace5caeb7619d5fcfe40ed152616d1d2f6712eee252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d647f1688746074ac993486aa98b836
SHA144964ae7f91a53d6e022c24c05b14bcadf77d74d
SHA256c3412be00d70a955b27e79ec6d438f1adcc1418a03bebd43436374c84a9c958a
SHA512f7d73e0a4ba56c8e9635b750fb8524fce55199954335ca1ebbdb767d70d7d98a48cf3d9eddb190b5842a656aeaf433b21c97de91a9b303019f23df0d1ebd0951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509dcca85566de5e5268cb8ef61023360
SHA16e877ab0ca1b08d0d744939e93be82a3928dd185
SHA2566c17c0480a74f1fb3aac4f2f0fc3c455147b1178f09eda7408c5ce76cc30b318
SHA512ea630c73102eb4348fb9b56009cfcb158e3c1fceec576f9eeca05318f3e3fa81b37c959e7b74f97b99cd76e29c4b175029dcb7cd35f072f0a20a431f5c81f19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2324232096e59330f998044c8eb95dd
SHA1b0e9cb68bdbcb7d6245040a10d129e694997d7b2
SHA256634660acb38b872071de77d7f630c44cd5f6b7df481739573aba76751e94897b
SHA512b703bbe3eb21ace6a041eaf078c22f2a7a8490466a77f3aee74aa144995e1a03c20b4b76c2bfe0ea1bc8dc086277bd6450631bb94a95688ca705db9ec08beb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ade8296bf70cb04ad3d38932474571a
SHA1ef5d5f7c34c2d84eac512918accd0afe09eebb95
SHA256e6e9b6d8b9d4cb4df967a6681d2f9f12fe3f97113093c36d82131e1010af2bce
SHA5129edc6172e06122b5dcc907c71339150397996f9a193adcbe07d92f0d9bb4ba35be71981fc9817f671def714e5fd4c59fc0ecfd2957b99fbeccd50c9020a25434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7753a50c5e781709cbbebdb0b0e69c0
SHA1bd9205f5e8c087cb3225b01239191321ba29392f
SHA25606643a819ce225e1d77277faadc608b03d24286ba4d75988022083ed9a9f3d04
SHA5122d4835d9578c0abb055a0033db58f84648db0c6fbfbba3ac8e1410b8cec4e2949de4b3cc84a73b94ec0074029d770d6554cded2606a45569623921ea616f73e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6084c26942477b248a8215af9e607a
SHA18c765b564edc3c494ddc4133e10e8595312ced2a
SHA2565fc23e2a5e72d46400bb00c7e9ee6850b72137f1d83ae8fd6237c8963a7bbc99
SHA5125861a87f9bfb93f89a61519696cff5c1be915ecc35988f6a20d138f86ba2c48eea743f06fcd272877b6bea48861b80e51f2c6c071a516c0cf299e74526fe6490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa80f20added4452ef4e01a05b9b38c3
SHA107e96ec38d155fe79e0fd7ae959b0bc6a63ed521
SHA256ca3fa03febdd220e3759a1636f525697ee385dd1b9f9a4719cab51c91e901091
SHA512b32b7b0a59161a49a423db9c31e01dc747f75ad808545bd5153bcfd7c6af1b26fccd189b0cee00fdcc75cdb6e8ad2db9afee67e6b52ea33c94cba3c07aae6d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f8a94460ffd2b1cfde40bd14251d33
SHA1fa5014e9bd20c975d066f0930f9c65bd05e67d48
SHA256704d9e770120a98ca4253d1d2a0778252ac82eb70df243098da7646d59eb4b8f
SHA51294610182fd5dc88b05a096e439358d4f4d4c984c8027bd7f4829b5f3b9aba56088970adf0966f9972398a8f9e1f3e0738e64a6bbd3154715b40be2e6203338fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b