Resubmissions
01-12-2024 15:26
241201-svbb7ayrek 1001-12-2024 15:25
241201-stmntsvkhy 401-12-2024 15:20
241201-sqsexayqeq 1001-12-2024 15:19
241201-sp74zayqdr 3Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 15:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Resource
win11-20241007-en
General
-
Target
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb1deb5f1c5f164abded43cb1f6deafb000000000200000000001066000000010000200000005e362616fa52feeec2d8be72b8b292c657a511aab898d9e3567f63d2a35b36f7000000000e800000000200002000000090e4f310b33b2bd83be9efd319887fea5a6711601b16ffda25aff2833962b219200000006427500f71057902b0eca2ea8f4d488bc49e3dd28971469d75cf899aac6698d640000000245e8c21fb248603e563135e5d64a6c90cfb00e46c0f2a61d4b0579d23f109b98f5d63a43e24ae6550323c85d3333afcbf4328a94794487700e0944cf1d4cfae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BAC0CF1-AFF8-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\mega.nz IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "65" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\mega.nz\ = "65" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\mega.nz\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb1deb5f1c5f164abded43cb1f6deafb00000000020000000000106600000001000020000000ac539920c65831bf30b719fc9791b3ebfc3da6632b4804d7490c51f8c79d640a000000000e8000000002000020000000d3a426495c9b7bc14782ed4782e8e1931795ecae2caf9011988be8796662f8bc90000000e7ca2436721f3d558e5684c8a1ed18269a37d48844240685386a8107d18d759824413fff56c33f59b2364e3b279b4aceb595d5b43439a896afdc1a146ae4ea9767bd6dfbf3260983a4e241663b6fbcfcc6fccc77bd40b00852bc263dd22a615f6719efbe66fbe21284712d2a6abfe7b6629a29187920544059625225da6e270bb7d2ddce1983a18d50647ea89fcd6c12400000007573cdda31d9aa1ac5387aa3d893dcc8c593120e021889c0254f37cebee10f6a1339518b0be72af33608fcf2f9762caebf530b71017c2f2da2a9d5a1081fc07f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439228602" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f009520544db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\mega.nz\Total = "65" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 2084 iexplore.exe 2084 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid Process procid_target PID 2084 wrote to memory of 2176 2084 iexplore.exe 30 PID 2084 wrote to memory of 2176 2084 iexplore.exe 30 PID 2084 wrote to memory of 2176 2084 iexplore.exe 30 PID 2084 wrote to memory of 2176 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581cadb18c36c61cf2704e05d1a5e68a0
SHA1ea9eeaa0efcbe4ddb6c8c3663c0fbd446b0109d3
SHA2565adef885cb4dc7268a1e04462ef774a7a727ee78c898f25a74b7783528e18511
SHA512a815be287f2f47d687e0d3ae9ddb4f72669ce6e61007714fc88167a397864a88cd1ec1bb79d7b21914e46edc04228afd0c1c7dbf88f3db8997cd086ffd9886bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abce42aba33b56d76a95839f7f6e85a
SHA12f250549375de31613c0baccc14eae102aadad7f
SHA256b4a7b036893bee70779d276d7f255221b95bd71e6f304c1a2f2d09d0faa25866
SHA512bf3602ff6e5acaf24e3171338138d900a209fba9dfc901b33ed32fc142a0806be98d2965b550366b05a5b38834b8144a297b75110a29c71b22b540dc8942f459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d89ef63c748f2f17aad0d2643775e5
SHA111dc09d73da3220a7970a4916fc1c9f5559ae33e
SHA2560c358c0f84ec5344685cd4ed54789ee33e2d2b2947542792298738b5a1cb3a52
SHA512d6949373c3106c09574af55c723a649ae2220bbefd90a9d9817b16f6001e347177219d4168e74b7966883409f7e133e3fd7485c6192dc1ab4870a1b6ad7f5e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cbcc6d5f8e1cde0e75ba32c471f2468
SHA1ce5f563566ccbfbf8865539e02767b8cca181979
SHA256dcf4600ff6f722dfd4e1b4f67462c458ade23ae7c76c556c87b8fb9fa445973d
SHA512287cf81353bf3d6aa1264a5228a96be39f6a76d926510b2a20c59885b749a459de15aee3e4982bde1de41f47c128b9c38a27b831459353eb98ede55c4a244ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09bec99a30240bd05c59f4b40babda5
SHA121aeaf81fbc714fa5d0b8899d7acb17f38ed6620
SHA256782dec3ac6ed73a9c7b41edd0c041419cbc2908f3211332485daf9791535dad8
SHA512ea400857f615fb5f2455808ed9d679140ce699a3a116a0aac504a8ce4350aa2b280cd44f26936ea0c559247652ff5b2a57291125cc34cb1c2a3f74361cbc5972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd97e0b887796356b827cf34177330ba
SHA17b218a148d8072eca94a4c6567a41c460e8fd359
SHA256a67a9b470a3c84562dfc51a05a8819748211223d014475d46069e7b8be656c5b
SHA51206a584175c215e4395ec6bab1666dcbc92ec012b2c84787b3eb19de7d9b8087771c159756b256b2a0770a5b6c7440391236688bcf799947476e0141f5a9cac57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0faf8b1c71560489e4d32928aa50f2
SHA1b4c061dcb66479b1047b243b640b70c9fcbc43fd
SHA256c7e46f33c683c76d0a408710870fcc82d956f82063785526a0c6a27dbbfffa54
SHA512bf8b7875e49dbaa030a94617e3d91419e6fefa9b0a01d3202d320348675d87235151ceea1940ac1010d2a943b490a461033d14758ab434de5a883c7da2475fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbb4f68a2195774924a96606a7ae4c1
SHA120d443513b1b4c1d8aa2a0f9c58b2ae3ab8c1158
SHA2563cc9e2ab2a8b11c06af0b45984f7de22c4e1ddf4002d84b031b7702fb77301bb
SHA5123663e8e665978e7396292c96f77c33a24674e4a1614bc4675ef53f6f8fe36e39e1e7e8d38c51c9cf2b914d6ecbea0d13cee8cc8f9d49136619b6f7846b825ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c9935c12e7d082dfe5e4c7dfcebf2b
SHA1b438291f4234b4df4ad67865d778c5563ec4f83a
SHA256bbade84b68fd6adc422bee602b4f4c22b633d0886a5a46e84bb76ccc0438fcab
SHA512f128760e82b20da5de61ac5dbf9bf35d51c4fd9827e3cb5721ef75b42e5afacd3893b2fbd0ad7d65e3608b34f36d27441a4d0b293fd91a91efe086dede2ff2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d379445f7fb8428c8b9d74a4e62b9980
SHA12651e9d9834cd790f5efaaca58d32f60dc0a581e
SHA2566d402466af9a6a591f9458b232aea7170b972fbd3bab72d29e7c994c203c7a84
SHA51266a72416d4875cc64688c8951558f04e88aeb20ca94bca067a9b2fd51e6b0531797c929e6552dd3dd7cf9bdb4190f7970151ffa6b97ad44dfdb5cc3cfce142b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1c16964d39db891c9341690dec273a
SHA101af92cfcb9153cea036d56379cab7b76c265efa
SHA256fca0f76e395948ecae3e88163424c19c6e5f6fa1d3a8114e5e22d79c3a80a95f
SHA51292efa5ce04f8e76853e469683283f5a7f1ed46984870beb044a24cfffde4d61bc9a032a113351691b03692baaf13d083a53c4a5ce1f760b6c5b7be8948f6643d
-
Filesize
6KB
MD5ed9ed98ee5b745aeabb77899614fa484
SHA14b2f2ca1ed97858068c136bb20b26edc1156a042
SHA2566c76b7255ae7058ac90eeac161840772b0d6fa142f56af0ef729c451f34cb4ce
SHA51227d8441c1f36d6301919c0aee074c4fa4d07022c89785a5e76d4dcefa53b7b2f131f01084e05d8d811ed73958a375279db70df5e12c479ac294ee8f12617a56a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HHT5LGG0\favicon[1].ico
Filesize6KB
MD572f13fa5f987ea923a68a818d38fb540
SHA1f014620d35787fcfdef193c20bb383f5655b9e1e
SHA25637127c1a29c164cdaa75ec72ae685094c2468fe0577f743cb1f307d23dd35ec1
SHA512b66af0b6b95560c20584ed033547235d5188981a092131a7c1749926ba1ac208266193bd7fa8a3403a39eee23fcdd53580e9533803d7f52df5fb01d508e292b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b