Resubmissions
04-12-2024 19:24
241204-x4fqgsspcn 1004-12-2024 19:06
241204-xr4a1swncx 604-12-2024 19:03
241204-xqb55s1req 304-12-2024 19:00
241204-xnnq6awlhx 604-12-2024 18:20
241204-wy7fksvkdt 704-12-2024 17:37
241204-v67kwasrgs 3Analysis
-
max time kernel
1559s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240708-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
dcb9d87a83da8972f5cee58389fd1805
-
SHA1
04288b3a9f36616088c0111bea2473c8a32a9756
-
SHA256
2ea93fd81425d720cdfcbcccfcc878f16f5e870139e14b851d149679ec82375a
-
SHA512
2e5cc2973b00f2d9688c4cd051c3b40073828b5e65fbb4cf24f0123a2c262c5bc09e8383d4a27fafd4acc96c380d9b7c646176d4d92c77f337065dd69acbeab3
-
SSDEEP
384:X6CdeU1ocy4K4lbGaIBvhpNC9CKVlObz6r0sZZfk1xCejiw:XVdZ1ocy4xEaAJpNCCVbz6r0sZBexPiw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85CE0BE1-B26C-11EF-9D58-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f5159c19682b14c987aec3bdd5570530000000002000000000010660000000100002000000024307d52932396dd8148f402b63ee0b55014f10656073924c291e25d3f104306000000000e8000000002000020000000d1a0734445ec0bdd680bc0b90d20df63c2e019ce3e56c580ebc6d6dcb1998237200000009237efb7846e851bc1c26727c2fb17d8e985efebc6712a2ebc4f7eec355223664000000079d6633f57617dd67fd6081f0956715013ec44b663084110f5b2edee1ffd15331b1a9b746b6da8bf1695308518f7d78e0181a6cf4caeb3b92dcca5c5317105b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f24a5a7946db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439498332" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2152 1732 iexplore.exe 30 PID 1732 wrote to memory of 2152 1732 iexplore.exe 30 PID 1732 wrote to memory of 2152 1732 iexplore.exe 30 PID 1732 wrote to memory of 2152 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51668754b49abf2753cfdc1affeb01066
SHA1f76ff58b93e3d0edc7b11c4b509ae655411a9c9f
SHA256452fcaff5ff842260576e8762ad7a9d33c3d82d69adb9e39061b72ac2a92ce0b
SHA5122f0df9aa9c6fd256a2897ef7976033741b76fc2ec16d44859f583b9bcd194b4bd767d0665091f09b2e3ae98fd49e70bad7706862d759ba71fe3e4af4fb93996e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72dd4346c38e94a63b52393ce80b4fa
SHA11751f6d6d39f79e37fd554561874d787dc4f5bdf
SHA25633d729f095f955c85e411ab6fa5d7e7b90136b69e18a06040517409a95ce98da
SHA512420a0857910d7b151ecf5a05873fbedc350fa71fcc90092cfd0b8ba6ca2933abcc51f07b8b3a07b44b269940e7202025605771d5c967a6f9d3c16621493504f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569fe4eb927ddf8fb564aa3d3c712378f
SHA1443f800a197d79a1e58bd509a6a2bec7ee288853
SHA2567a36f2bdd4565019fe8d4d19063d91ded4c84695ed7d33570abfe19941857d4e
SHA512245adb8d438d8b728667aea9e1d18200a16257652401809642a5b694d04f9dcb747215a5aa96125c30288ef4fec60b6a114fece190b50c37e3e1dbec159301be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e97afe1c56c2a7fea181d409895176d
SHA1b44c4237fae34dab2e45fe3fe99d5b3be4306802
SHA2561945d1da6344a87a2bfbf64868021896080555210b1281732568495ccc4a5a44
SHA5124c792747f5b9aa5a03406133d2f3f7de32ab7743f7f9a0616cf6b5ebdda381d6f851b90d38aeffe009d5546baf1801326d923ecdc1e8830d4f55e4b53cfa045f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd07ec40db6b98824e0f596caa11cf3a
SHA16a3832454b6cde45e22549af1a2e5de61c3b0d33
SHA25672610b1cea8561304acd8e06d28dbe5371381d7b21c22eec8a6e065ae0f42d22
SHA51248399bf344ba09bef9d4eb77a71a76da3340bde88c6990b7ec465e3e1ab2bb66d087d3a9c11a5bb883a3bf88e8adf78d84c9d4b0384a5d77775c0583f0eac4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9430a6d876b6a3be991f146ca53d45d
SHA18120db79973b0c381efd8576a7c28e0a4dcd939f
SHA256e50e310385071f3b52f2ca06a7c3946cdf6d15cf75912cf31fcc4ead4731bcf1
SHA512d284a54cbd3eb450ffa719d5064423453998e4ab55d9eeb11c661a1bf2f2ef3e5096424c7eae80d3c4eb1fcc9897e2ca8e714922f47983eb544d08ac6137dbf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42fb8488bc11cac1874151760bf5ac2
SHA1a7972032d29c4f36e0bc20a38f817e7d4fbf33fd
SHA256b1a575c621fa937309dde55024d34a3713c5e13affd584c3a358a8f012f8c4df
SHA512da92af76f0b2807d1dbebd003eb3b29add64bf0fd6fa3859386cbd88abc2f72f77ed02117f62e2ba380be3ae27b0f0deaf33be811aa54fa9a9b64ce0daa6fc81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398307a599c44c8978b18cd582d1d79a
SHA1f5b7d4b28a97f854cb6ac6f6edd6386c7c9eefc0
SHA256797e97d898df09fff822361ee9c8e02b99175cc30e04c4914c881530cdcf9b2c
SHA5125ea7ff45480faa6e95a20aa05e3bc2f878a51a8195bc1b3aec2a177004e44cf689ced9bb7f2a0ac9001cdf1a625a617168a15b75c4c9831691457654b0d29a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf66b9ee4f7dbab0d848ebd6578b7b3
SHA12dcf6921dcfbebd47efaf2322ed448f0345ef53b
SHA2566bbb8d0655a4b7b931e309e9b203bbf3ae44a58dc5b43078302947eb7c63f27c
SHA512e08d399a4a98618fa11f489559da2b7706a3e55aedb5cff95bdb54bd74e14424cc07bf5b76df5317559cac44051854a69c0622e724cbcbf369939463d9afdbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47aae322be5e2964e45dcc7ce8c5cf8
SHA15ab682eb1acf527757fef892af4dc25eb9021cad
SHA256ed6e766205ae2a6c310ae2763f557155c5bb42c3ea91bd3957ea2930990a3f57
SHA5121a4da74e07ab1081afdabfc3cb381e4333e42953f249c38106b82f319cd6555c7f255d45bf5b41cd52b8de264cc9214e476320a840dc49b16278ec5c88657c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9bb0521d08cf979128b44266398682
SHA11c64571288e79d4ea840d0f8bcdaa4c15d746bcf
SHA2565f7ef347eab6ec2ce209910fc0df4bb82cf5c30a342a1252ba7283d76bd88f78
SHA512c635771970eee9e63eaea6313c34ded991523299bb6807532c3334cb1253a0aa75ffcdb300507b0bae4fb22d188180a36fbbe4e45fe0fe1a42743beaccf85c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524229fbc47c3688ed0dd54f95999aed2
SHA174953d9946ead1cfd3dfbfacdfbc39649bea4209
SHA256caf15926a94c3d3e7a90ef5a9c2e09a0426f71c4805e10cc25cdc861e1979413
SHA512d8097b5b84c49ae1d37c987c11a50867a65f65ceda876644f5c1ed4a06f1f0c899f46d623b7ae6178e3234d667c59d66c0d21a56160857adba56020b99bc2434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584de67fbb1d62c7d488ac4773f0b10c3
SHA164175388be55878345df77a9d773a546a211476d
SHA2566fbef57ae0d950e8bb31d39483cd0d201ecbeb93daace73674dd6ab1f78fbbc3
SHA51229d81661a20eeb37ce0e351a10d386978a38e387c8ad959bf9536d93a44502b849e2f0eedc17b709fb8b1d4774b4ff0e4203a8145486518c8bfc1c9e5f44889f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58001d59c81a8c74e6d3d4ae40838827d
SHA138e8dd062ff0dd70e8f984f8e217693552ef6b97
SHA25604265f6ab1ebf9d5d52f5cdde2ed4d15b1e24f15166b72a15acbdb86b100f9d9
SHA512e75219c6c8096ba7e51517008c45dce19e4ddf958b3a92b36dc25fc88718b379e9839081a4662bcaf7ac3aa11c19b39a02dfe2f5c8aad0983d767a3b01bfe224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac2af5a30a13ba9e32c0218bfe9bc808
SHA178aa94a6a3e32da0d49bab73dafe70961cc63d3a
SHA25640f9fd1919601467fe94bedacb006276db95ddec85c4b3c0ec094a17a31a316e
SHA512f2a12ff84361542dba1014602d3334b58830ddd15ae5b89a842bb9451c2d149f15284302a55899653c98fde8d4d43baa7567a6b2e59f49a842a3d547afb426c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59352ce6cc2a522416532210e85939d32
SHA10b21b4741707a236f0436d0a046706d660adbd74
SHA256612c771f6b23d0de6a9858c62886ac5884d3563472de421401120a6341a8e136
SHA512ffde6236c93d35b1d6f72c7b2d7502276307f4982bca55496867a9fde915dcfb63381c877ef508fa52543a6cc2b9097aa699929a9187ac133e534fa0b24394cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001003b20898cccc29d54139fb9d788e
SHA10de2188738875563be9545370a597a0d29117fb5
SHA256d1264f0e5db177523bd861a194a7aa8b12bd8b0a933e82caf5b0a2c83585314d
SHA51236c54ff0f1223e642a1d7adde1f6202e10bce2269f7624b4e624ca0af99af5cd7adfa35b5a425c48695ba16bfbb26660fb14c18139225cae0c8b0147d6434235
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b