Resubmissions
04-12-2024 19:24
241204-x4fqgsspcn 1004-12-2024 19:06
241204-xr4a1swncx 604-12-2024 19:03
241204-xqb55s1req 304-12-2024 19:00
241204-xnnq6awlhx 604-12-2024 18:20
241204-wy7fksvkdt 704-12-2024 17:37
241204-v67kwasrgs 3Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
dcb9d87a83da8972f5cee58389fd1805
-
SHA1
04288b3a9f36616088c0111bea2473c8a32a9756
-
SHA256
2ea93fd81425d720cdfcbcccfcc878f16f5e870139e14b851d149679ec82375a
-
SHA512
2e5cc2973b00f2d9688c4cd051c3b40073828b5e65fbb4cf24f0123a2c262c5bc09e8383d4a27fafd4acc96c380d9b7c646176d4d92c77f337065dd69acbeab3
-
SSDEEP
384:X6CdeU1ocy4K4lbGaIBvhpNC9CKVlObz6r0sZZfk1xCejiw:XVdZ1ocy4xEaAJpNCCVbz6r0sZBexPiw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000052f1058db1ae314bbc75580e7c1bb6960000000002000000000010660000000100002000000031695a5b8614a1c4746e1826bcfd86a561bf22a5cd57d0da8dd58c72befc02b1000000000e80000000020000200000009beebb7c84d6be184fde606739d0f8f1ca185e6145a7862ef47ecf84a951f99a2000000029d950638b5560709fd65f81271d88c5389baa650cf8f3e80a9b3187d54806a6400000006edca4a0bcee6ed469b29b6a17f8327293a066a7884a230c0428ce2efe68bf0d57aaa18053dd33e1f407c86af7afb1b1cd911ab928aa2c8eeb705a6894175200 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439500680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDF1FD71-B271-11EF-A2A3-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305d71d27e46db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2792 2268 iexplore.exe 31 PID 2268 wrote to memory of 2792 2268 iexplore.exe 31 PID 2268 wrote to memory of 2792 2268 iexplore.exe 31 PID 2268 wrote to memory of 2792 2268 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3cf43f04d27ed42b938c2b5981c240
SHA1271f3377bd2d8cbe1f0cb7ba3fd1544cdae8c98e
SHA25604195b5413c753e69f7831323102685e719fef91cb9fb8b5584772976af91a1a
SHA5123035422ad08f0230f6bf0df954b9b5750de88efaf0e8e4db257a39d9325a6142c2920217212269c4f42493951f00798788b3308173aa6a8096c10aea1fff6603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53370928b83245ff135c93e55571c2597
SHA19f86e0d86622e9bcc921c6a9271d7a239eccc639
SHA256d0fd31eb1cb307cf94d1e1983cd1eb7689085a78942f02ca5917fc0ea95c2f11
SHA512dba794e9ad45a242b102ebe2af16a2e6246a4e841b545838e5eca0226a0b6ae9aaf1db9c980e682bc2b846da449b9426adde630c0942e8fff1ea2639a38871c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55764b079d4a1d07e31d7ee2543bebce3
SHA11d5cc581fa5a9b9067620da159b1eec9b95206aa
SHA2567eed19a32067afb65b0fa3d91cc2c2e9ab422073098c0fd0a2d6e3e4a42dd01d
SHA512a4339cf4c84c5404e3f3d3be3c449903fcab04f4e37b598ad96142907231bb892ba05199f0e8f4812806bf549a9c5f57a00d8e8db5f980d8b146c7e66112e3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fbe715d06e83d2e49a380dba796f81
SHA142c30faf3215792b82839b6650c710364110cbfd
SHA256e52d9f42d8dd6cafc96f77ad6eb44f14b90b1e6ff66b18d6d8641f72743605a8
SHA5124f65c28de6465749faf1d295d2576bba692658c3ab0a6f15ac744a57fe71799a7f3f6902ef55b9fbf46fff6593540ff777196846fb0520317a0ff1ccfb58e032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603bceb30a175000b82f9e1551f35f73
SHA170ebdde9d844e988c8835fd37943f20c41d961b8
SHA25602aaaa073ce2569d5615df3c8b001b365600a9c771bcef14cd3740a845f46c77
SHA512ac2c8634ed045bdfb46a60fb4c0be6ccce1973f6bd4f20aaebf0b9802d8484f99857355c699b0c29c29c1ec98b4818dae58e722eb4158df2364d90ad4b1c98bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fcc83804ee0fdc21d603a7f9e87420
SHA12c7404f81ab638e2f595bf85c7b46c9b832fbe2e
SHA256d77ca918976e60a1973eaeb9eadc776f8106cec15fbb762b7f69406a57b7469a
SHA5123a2be45453f844519f8ebb8540ac529b57d7a117211098ce3e76ed85adbd289c8cb763b0db6efb9f0d7f6b49c1911ba99ef66419ccef36a563a306e77b1c3814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548064ccdf0739d622011377f660d2945
SHA10e20b729a634b8ac142642c576cf31b730e6d63d
SHA256c31958211dce70ac4ae039f53f55f1b3880b8c925a655afb3f41d68c34cb5d06
SHA512ed075b037c648560bf31c029909e63ec29b37e68c5af798dc0b6a1245b2968b31ed60fb709b3c773947fabad781025635a2ababb2b225631d9d780321fed9880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86b23fd5989dc4584c8b1a10d620885
SHA1b714f10e914b19419da9b9291153838bd72a699b
SHA256d50037541cd40d98376553666b8ac52b40821b79c2eaaf9f35f32e02aff6e479
SHA512458368aeda00d39e1a84327637c930c39c4507eeca84b6b3b3a3a2d2f48a451234d89a99e984c45583e59a3e0c2880dd851c8702335f5220ef98ef98822f634f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0d06ce16a143e84397fe1ecc9e7cad
SHA1ee07ff90f94358095d3c58268e2ec3f86538774a
SHA25650ad8fee341a233e326e8096e1820e0e8f539c3d1d59599f9edec8ced1e11e5e
SHA5125099e2afc1a493f282afa32ff679c2c14e5a1ff565ebf2456ce101a5eb8e40ea346f2aeb6e19f70301ea64ede69490cb675304710be299b32c2994f570f2fe3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7cfb3789757018d356e583057975264
SHA117296e17cf45a893b475ba09172fe28deef6adab
SHA25675970786778ee491e0c911c1e118201cad86f4dc609cb013764384aafd85ec5c
SHA512fff469351d25f8f9b64aa0a0fe878dbd619210688573d27bb5846689077952b7a7b83e6c1cde476256d50a927219490371d6ad2208915a76cac7946a800fa730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966741afc9709c868b94c71cb200bec7
SHA193e4fe7cfcdcb016332203687ec6d1a3ebf495f7
SHA256eb1ee616ab30227a39319d4ee5aef0883f7ceb2024ac6456db4d0312c1d5fa26
SHA51268bd0ca32c0172be043384907c5c4e881bb25eaa4775681248dd2a20b438b79ac019b4cc601d8bdf0d74b7af5c42ec6cff62a22f8f22924792899b9e3b5e6809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e70762aa3ec5b7a1afecf813af32a6a
SHA1fae43170102e7098fe9913c5b830bd10325df69d
SHA256c2f20f39bfba417563eae6a5dd31ebf2f2a5c90796a9f82ae63b010f0660eacc
SHA512ec2fcb2d77b96b4070f6e41e8949489d6ffa45992e43102ceb579960b9689db7e722472b487259f01ab59f185cf03e0cb3f7b5f407294155294c8f84b3e9c79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac0fddef7268313d97478fc18b607fe
SHA10959236912903162c5072ac8c476328d4d7b1005
SHA2567878f7274663b945ab28ad834c6c4441f88e6642b69162bfe91987d320ce5603
SHA5120c18fe55ed413f8cd9af49b457ee05290f656b853a3c7b3479b4c456530e63b2acbac00a631377868f62e0e66ec3789b175a34fb53318bb86440d0b6cc284150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a72d6c714fd868fe7d3873981ef8ff
SHA10f9625fabe18721e4a92c6edd12f0431488f35f6
SHA256ced169a86dc153b1dbf2936314068d64f954a46908f7c3193967cfc32055e30f
SHA512d4ef4e94af38591b1a3d884c9b0e1ec86d48a3f33f9e4d3d2387b978fe8fc92465a0d54043c589f6108b820d82e065f2c49cce78e28be293f1d4dba2a14d52fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269dbc22af94587b62a4d455b812ceb1
SHA1c64dcdf51acb69b14e80280e8713c69af6fa7e41
SHA256f74a548295f295f0d11ac2e57c37eb0e120ce7be171b7738107d63818aa0935e
SHA5124a58c26165fa499f98481f915ab4abe914520ae7cf717d1bfaf16abb05c41b4475f29ef780a7ce92d1ee4e156240144111450d296e7c70101c5a99a3a63b1511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bbb434307a0d285634d99b23bd3050
SHA1cfe73380f4d108dd356edd7d38537ba0332d8e73
SHA2565af8f09a44d2fc564f7860951fbc7bbf5aa7c5af6ff362872948eb0858619efd
SHA512399d9185a563ab07211b97af05507cca7ccb755dc27729a9ce8cf29fa4fc759f9bbb6bd2518833f0fa10c25973ad1eed9f5b70a0eb82531445a6a383ac2cf9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85bda741fd722a2eadc6e7466757b41
SHA165827414176264113227e7b6cef1e1e4ff97ed70
SHA2564bf79755f5af60a360a66d15fcd86efbba80cf1fb637cfeb5ef2079aa781cb2e
SHA512a1f7913c6a123a5fc10ccccf46bdfc85b75eea5c2a9fc0f9c8408acb4a37adbfa7fe162b5f96d6b960b5f5caba293986bd3a1e7a81ac3f86757327d4356918b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5a67179629ec3ea675caa1c67632bd
SHA136e120bc576b9c091995fce9bf863f2746b1ffd2
SHA256d7b1a8a840fd3609e12292cfc1f08c7c34ad8b5687755b5e72f0546d3ec393dd
SHA512ae1bf6493333e6db6098b55e6b52d078b6f89a532bcc140a99e8695f3954ac17b47346e9be43e27bbf50e331011f64b588de9eefb290536fb70400f481a56af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52613937be35016d695adcf46ef3ce5b2
SHA14db6ff33b94adfd2e8c3826d605c711d7b7903c0
SHA2568991fbb8d6b3293d683f3ea76cab0ac1269bd1785c8b38c4eb84f1fb32e424cd
SHA51283c0f30139115bafdf4568436d11b966f4c3888b725a8c4a69d18db2e105d309e918c8b31112f2c9a13162aafaae59979e5f5d0295dc5d47685aa50951d00fb1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b