Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe
Resource
win10v2004-20241007-en
General
-
Target
ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe
-
Size
85KB
-
MD5
a1f719b70d6459764f3e6cd4fdb17070
-
SHA1
5b51ae48a3cdeb22b75758b78daafb0b22552934
-
SHA256
ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9c
-
SHA512
c7e670d2f0f99244539d468be51e53e21953945816a1c78662d57f3d880d291ffd434931bcd265dfe04d68cf87a0789609a5027965af77b262b13809ef4c70e9
-
SSDEEP
1536:jSIQGZbD3sPauwMJnYUuy2DqgcQW6zut:3QGR4J5nYUuy2Dq1Azut
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105449" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C568F8F1-AED9-11EF-AE85-F245C6AC432F} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2900 2856 ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe 30 PID 2856 wrote to memory of 2900 2856 ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe 30 PID 2856 wrote to memory of 2900 2856 ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe 30 PID 2856 wrote to memory of 2900 2856 ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe 30 PID 2900 wrote to memory of 2772 2900 iexplore.exe 31 PID 2900 wrote to memory of 2772 2900 iexplore.exe 31 PID 2900 wrote to memory of 2772 2900 iexplore.exe 31 PID 2900 wrote to memory of 2772 2900 iexplore.exe 31 PID 2772 wrote to memory of 2656 2772 IEXPLORE.EXE 32 PID 2772 wrote to memory of 2656 2772 IEXPLORE.EXE 32 PID 2772 wrote to memory of 2656 2772 IEXPLORE.EXE 32 PID 2772 wrote to memory of 2656 2772 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe"C:\Users\Admin\AppData\Local\Temp\ae86413f63cbd23ea52cc78a42ca04c4beb2c7ed09cda889f49d12a131340a9cN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d521dcacb72b7861475a48eef1bf5fbe
SHA1531dc32c0060e2b475ba58a1dc331ba2ec371963
SHA2561f654eedb275a55c9e29667c9457f7b078b046a38be20d1745b69b373cfa7ddf
SHA512eca3e76dccd81f8ea6085137689113a74a5b59b80dce215997f14aebd0192a5e95e2a49b3555efd7865351cc6b304bcfd3d4e1fab1bb903502c468cd6b573306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a12b8a9015b0d2b5ced1d683719321d
SHA11989802e97f5b03ef00608d437114d44c9fa7769
SHA256d5c9d000783d0b384b0640dfd9c012fbb25d45b487e07d09e464f5759de2a4db
SHA5123420d68e03906b3eed6e0c47df52b80e06727700f613adfb0534a1579cafac10121db91a224615c2261d6394fc39534935e1b5ac7ca1ec6921fc9524c1d67a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd84a78cda3c694dd359a4292dfde97e
SHA1276ef4a21b0a46f2a18e9f9bc90437b3854cdabe
SHA25625ccd82dcd8ac78674e5f56a9464ebda054e17c0db12c7161533f7fec147b88c
SHA5129ecdb71cb31ad1d30baf0a66ebaa469ce9d304d72bd393b775631507787cd205445582953b7a0dd766084ee8e0c5f640b6d2735600534676ec2b7d09194de025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e80c1be9bcf5ab31c51dc43d82c978
SHA1bcb66536f7c78c2557eb7b527ed432feb5616233
SHA256b23f8ecb8a122e1e4c0be5e4e8a3879d50d479ceb66a194e8005e3f7a1025c15
SHA5127a9be013b7c697adc31cbda3be48c413e67dc92759f49714910a7b016e013657c4a59c8e8890f5b9b410a451b0a773142208b2a7631482d0f28399e023d69767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25e92c6cb68dc19fe74aba957765f5c
SHA1d333494e1c138caf4744e04dbcf091191dacc245
SHA2566c2ba9ade3592c3168a1950e1c01d0c741f3442d738ab4b588aa628247937dfd
SHA51277f74f74c2f0abc8d9e3ad6ed6d5bde72b78fbd0160e14d1f9f2c61f82546809727442e82df2ed3a27ca1947f2ad5eefe36f0049a2d75387cfc9e2c1a3b5d9ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df9ccbdcbff82d1588f33c60bec4d4f3
SHA1b98de12cdf0dd9011372cfa39520754aa43a62b0
SHA256e7668679846975f487401f154fcc16f3c44d74960e3b59ed9752246f8cf405b6
SHA5122975df7341e4125d99d64b230e722e37e2dbc8041bf96ee04a968788d0bf7c4af97d8de46383ea68a1ba1b40e89a5886500f1211257320d9dd98c9a020d76517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142975bba52c6c68d775d1e2c7cc1a24
SHA1b65fbb65f27c5fb4bafdf00529c2bc85550fdcfb
SHA256e65aaa3a1161d30989debc50e62ac6e4769a0c322a6569bf9a6899443e18f505
SHA512c03fe9844d9207a67aaf27fa5215480cd2635f8afa326456e6d95b07be9c4a5a6b4397959de3d056c0ea3076730336affffe13c3ffe9abbc0494bcf96987ec5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c784fdabe6953c7aba5f1de9bccbf3ff
SHA155e31d4b46ec1552f1cbb77272956f3f9a4941e1
SHA25650f64fe1e25ed5bd44f3d827fbda5f119921577c43fa06bd612b0ec7c4ee2cd6
SHA512bba245d99254407027d76d4b4bdfb393b947e95086f4db41081d73540ee3486caed32a1f680c0e40ddcdca104aa715f77786ce6eeaade68e409082fa4879bf38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd0db3d16287eee2b818a16970d96e4
SHA1360a43ca35f8a49313c1ead88f0f80b1ea761a8c
SHA2568ab03cd6577f07bc47dd3994697d71074da36c890af95ae59f43073f26deefd5
SHA5127d1a678191e338dbc3fe39ae9dc390f827683b7bec02d1ffcded0c9b040a06499be0655a72d4e5506f899cd61ee6644ed8db5aca950b3629f356cc0668d94403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981e3489c4962750800fd4709543a7c9
SHA1eadb0ee7fbee68135e2af1aeed9d5b9fff9e01c3
SHA256a3782ed2b9d720b58afcc45ae17cbc899e91143267b3a6824c315135ba7fa994
SHA512ff772fae86e112361248dc1c18fa3329324db7a553c1b1b30500db0d917c8c2f53afa70c8ba4668c4e7f05f291fb0b1088d48e7e0d8343506e0e22c2d1f817dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3a83d1703b505585bef6f3b9b931c1
SHA1473e1ea600c00bc048b59719d09182eb3adf33f1
SHA2569757ff7e3f0bd6a7f9fb88b342d08795ac3f440a02d66a82329a0a636db97acf
SHA5127ddac9e61e29519accc7005f66f82befba006c558b0b690479ad6dd41273d280348aeb4282808546e77994058dc1cecd90ea265508dfb28a0c34b9437ec08613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ada63aef17b809de541014d06659d76b
SHA12c62dd940943dfbf56232f88eeed108d70294433
SHA2560bf4728b1ea9d25c7378b96e538732312d8deda4948b65179e81d2fcc54e6bd7
SHA5123c16c380ee9ad3cc0b8f8cb35e36309eecc1e17aea3c3600eee3422b3d47de22703d25fc89b8b665efa62c4dbe88e14c54718c753e5b779174846d4c477a5fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bab4556bc492124cc78cd6ef2a72d4f
SHA1e2afce4a6bb8c0748afc4e2dfb45bddbb1a7e398
SHA256d911120b4965ec96041b25491587f34e2cd731f0295bbee5d44f53e5469414f6
SHA512a42134681937695caeb82e48cbc828277526337f1cb7d3ec2a26f7cdddb34f36eb15da2eaa77d442b172de68a3e6408793084c7f8a0398d25a5032e40ba84b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dec824008f2fd0cf77ddbe15a498258
SHA1b588f0d8f5fc4cb8fb4ccd3f5c38ced2ffb6eacc
SHA256c8dbe3d1b471af3313194d3e5ebc2551b5322d5aa05effbf77a6d31bde0a0985
SHA51218a4b7a76163aedfa362988f8429e1536b784b831c7799ce63db27ed113f6b02d492e78d7d152cfb8e80660aa7f5bff5bf5a70955f9d79d12807e861fde0330c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4bc1297c8739d0b7c2b3177bde5da5d
SHA10bc90199733a61c7919dbf9b7abd95c3b8844ac6
SHA256f0dd858a52fbe294ec74e515172d368ff3d608b7ffafe0e1cff93eee4198f73d
SHA512cb4440b00c8de6f7137ae0fda5c4f460d0a41930f1d82a3e15e686b4a7cf90b8f344739afd7b045e7623e166a5b8ccd7100cd09c86d3771127ca5e5dbc2bc0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc2dd5f55b423e25b9b3955740f8cf2
SHA144b4d47c6e15898b807a3707e6231038c22f96b1
SHA256ff6878658e6560a03529494d654e00d3ebc0df36434812fe87805adde6af9323
SHA51213ec700e4d8a14e92b7378dcfc3740382af743bd1bc6bf737bb3bf0b875ef3d248bd82f13615c7e13ae89c43011ab99fcb13470a7d4579448c37e054016adbe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45207f4634fd80ba7798b48ef5c3e67
SHA1936801fd999444c9fc99e7f1dab9b4dcb3bb2c85
SHA2567cff631bf2b75c11cc1fc34b70c50ebaea73d6b3a5690a2971ceed2ebf9aea84
SHA512f2f3cd7053fd245a1f10063802b872d80a18e6bc5a414a1e0893f89f5dbabe3f09f0058046cd29cbb3243ea633108691d4d4ef8883180a8c103116abf3750038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55913d53dd9baf55ee9ae2baa2f5f72e5
SHA173d30fd4263b5a483e16d541b0631b9bf13a8dd1
SHA25672b7adf109d07688a6669c5d3106209ff166ea004d663d81719448a5eec95778
SHA51206782f72581d6efad128d35271635c63ed7edf2e96cee2954673471bd198afc2ea7a1e65ba8225e7616480c631a1483b8f28194ab28bcaf31cc16e5ce8ce39bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e621ee163ea597c7e0d1cfa8efc611
SHA1794eb5780a3ed6ff900706880401e55e4e3a8889
SHA2568e62723bef2956eeef9f88b44274af0af6734d1c74a7d273383826a45a9b2b99
SHA512bb89e45e0fa3540bb6cc4014b911e780ab7d87f7b455929c12f72fd8829b566f491a2a31175687bb4f6a1461997030877ca21b2594c4400b2446b6aa6863c6a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b