Resubmissions
04-12-2024 20:49
241204-zl8dwszrc1 304-12-2024 20:47
241204-zk7qzazqh1 304-12-2024 20:47
241204-zkt5wawmhk 504-12-2024 20:45
241204-zj17sswmdm 504-12-2024 20:44
241204-zjk6kszqbt 304-12-2024 20:42
241204-zhdecazpfs 304-12-2024 20:42
241204-zg22bazpet 704-12-2024 20:41
241204-zgm76azpds 304-12-2024 20:35
241204-zc576swjgk 704-12-2024 20:32
241204-zbbl6szlgv 3Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
Payslip_Amendment12009.htm
Resource
win7-20241023-en
General
-
Target
Payslip_Amendment12009.htm
-
Size
5KB
-
MD5
931df36f406e0f5495c5d77fa91bf035
-
SHA1
01bbb0abb4f14451a48800e47d203732bc139920
-
SHA256
09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5
-
SHA512
df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351
-
SSDEEP
96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000005eb8097351d95276ecd392f4ee4d7849125940689aaec2b82454fe16a7f9871a000000000e80000000020000200000001a278be74556c95f4d556402d29d65c112a2eab1df65cb1d6e135ba9ebd58f232000000095cb74c56c526c3e93555bf747d48d2f53095f40663fe267b03044a72ecc010540000000b230afbd32d3dfcce57329bce627815b33a852fc867549f8de9ce5db5ea900d2a177d6625b954e1bc63bbb1bb79b74df3094e8ffa23a5cc9f8bae151f9535360 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41E85D41-B280-11EF-9841-C6E03328980A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50566f168d46db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439506808" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1984 1644 iexplore.exe 30 PID 1644 wrote to memory of 1984 1644 iexplore.exe 30 PID 1644 wrote to memory of 1984 1644 iexplore.exe 30 PID 1644 wrote to memory of 1984 1644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c624980d7fba4b24c7e5db724dd7a3
SHA1109b92b9e4c6f404e93dc0dc69433a2ea10fad04
SHA25627a82db6833f2ddba25a4e69c79987c72db67c21646aa5a424288475729b3f3a
SHA5123911b3447d2efa7da8ae63e70cd40505ec40ffbf70d060ceb5cfb1d67890e5a803713526b1f84b6ee15e9b4d34389f206f422a1871c609dfe3a748fa05997039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f96b585acc0e58e246e964fb323710
SHA1274a8c47657f4153501371ab96f0c1c09f237e2b
SHA256c0b1004a397307635f2beaeaaef507add5031e9f8fb236ad9f79750a65fbf65a
SHA5125a24590b69c1cbd42c1da6f5a01b1f80c59eb02827eeaf8e0fcaa6a3a76e2d82ce30d3ab72bd7a9ce095669590408db0b9d4e2637aec41df261d760117339b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0298a60130d7305375728f0b03834c
SHA186278f07a76a8a624c2bde4a3653ab01b291bc71
SHA256ae8f0893d5cac43a2bf99cf075d9327f063f5b2f5f4e5cfb3c6718ff8ea77aa1
SHA5125a5b0d57ecdfb12bcf5f3490248d82d23a27a7a9a5fc072a31683e2eb49149091d7d51925831cb744e316e32e93d6443dbd815dca4f01e0911065c6a2ecfbde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3735b6f06e5c488766cd6e978c16e1e
SHA1aee0ee0d264e74c6ab0d8b3ada228543b4035b9e
SHA256e66947f6e1c4576650398aaf74c43ed5c24a138acc5c6895b3da17f0f0f7c508
SHA512f4949361db92cad1bdfeacdc977aa9cb72a5a5cc5808d72e65a9fa284e677812fe0caccaf46ede518b322eaf5f5135a51f2f2ef4a6028d00a6158b9c993eb868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e97693ffa509c139814a630bafa02ac
SHA176b5893c0c487abbeafd16533f7b277c3ddad23e
SHA2562d24123c6b36e1bdd8d5d94e52b837fdff4632bc684b70883952fedbda48e748
SHA512664d3d575d956ba07a967ce9d82a58ee5d373b9851c50e6a8682a09376661f469e5451ba969540d206982a21622718772bd4d7b4726b6c4dbbd48b82d1143e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af816a2035dd58b3dfd58a61ad11f848
SHA116778bbdc91147918901ada035a016864573c32b
SHA256ed212ae1d7a86e448a44a91bd50ccc30668696e4c8aead95bfb4e2073d40c1fc
SHA512522c3b609ccdb68844f8773048f3572c984f3acf0d02b0020ff50cb0a3a713c2cd5e4d0c333d10e6d0ebf6a8bb6cf3383a53cf606b00610b0d0edee968b85575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7bca79dba74f99eb057429540b4e2b
SHA1404121b1f141dca71a758aa5593539e2a3c4b10d
SHA2564ad76a23cdc319c22a4efa8ef40306d812747a80c53cf8ee43e63423c9a67a89
SHA512e86545fb7ea83be06d807f36e32856cbc24a61444ee4e7f6194b7432c1c031bc80af84cc37d2296020b591487e58c27c81ddf5abaa183b37f38b7e9bfd39c857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580f13dd6885447dfe6c9ff108d98c8c
SHA17e67ef500fed6b210c355a9c863e0512eefca6c1
SHA25688d51f952e4cf2ba08a5c95fb338d91271e2e9b2d4f4bdeb08540c24500fc331
SHA512445873461438b9d50a565ae5891ad2fe7d8b8377876aefc179a23d9ee476ffde8b0ee785d82cfbb6a13391ecb0be7ee1af06aaa5debe23610d2bca3322e86e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d4aa1ff84143c6d240d75b7a8cf4d1
SHA19f6ad8a0d3c97dc957fdf0e35fcafb776e72bc76
SHA2564082550e23281440b08ae1ef8fa59fa4f73e182c4f8f35fe49b77be73414ff53
SHA512ad043f81420a38603ad25524f19310e34e20897c43e8e590abdac2fcb739556a035b93ae2111dd2b49b6285fb77567e53fe4a7b8a2d4b71a31ef5898ab673eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51400278a4ca62b67a08790650b0e5320
SHA14c733df927a4136733f606fc11008a147723309e
SHA2564bb28802adef28c9b4ce978794629c67937a6b839598439053bb5a38e4804100
SHA5127b91a6d71483af515d70c0a3e3aefd21107abbcc2e3b4f91dd9e56fd3b475c853fc12a0c1a71b1e4cac0ecf276a330c10941588a5b67c155c30302895d6400ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928348a6e330cfe75c0660bc8e43463f
SHA115687d0bb11357b27fc68636b368b3c4f8a773fb
SHA256a078a1dc612b51e25474aef6fa70694c251932c43669da03fb3ee413b2a96c44
SHA512f2dd8e972af8587940a6c8f034c80f7c3174b8ec788b7aa32b628da90b3dd84bb588fd147c2dee2241876e1fa74922dd32a2a8c77f6fd1915499345cb2fc43d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d26b5b904e4e3d439afaf292a5128b
SHA1beee4fc832c6e30a2a91a68fefdce00c485b4513
SHA25670260dc4bbd4ee564bb92a5e4a3336a9c843da6fe15e42f0e37e6155aad64390
SHA512c7537fb65e5cd67e23722cfe17dc876039279348732856054f793ec080212ec2537ab6c96f3be656cd7d94c5acf0e622dcc4cf4004d559b4d39831a096916e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52420fb77671e6d1006bdb21bd589d112
SHA12ed0d17ebc154a78879797d6a5bb185ead5e7727
SHA2567d4872af503e0bd8cca36c5795990bdd52efac790c96e45f571e1dfa0c7fd1e2
SHA512ce5ee1bab9bcbe78131650c41a3512d5d7427bb390d40b14ec5e9e8c0f1aabd13b4b60a382d17c064fd03b75b7edafbb52c43729335fd738f2e8ff9bd75bcc54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593229dd0dfee54761e6f6e5be6834870
SHA1680be5d39598db51d453d090198d664880bf3438
SHA25619391e009ccaa8285a9c4e5b054369dad0315f3dba073f583401cf55b3108527
SHA5120405215b735b7c11f0569b060b1924faa1e1e7dd3f1f960dae800f6a0fdae8eb0de4baadf5ccd69d4eee12d1f86b975529fdc8db8b74344e2c9311607a9f4996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514548d3cd32ff34d74960bca769efa21
SHA1af8411c36323e14ee694c35b63a19be0fa529904
SHA2568a2fa6bc4497459d04c1296b8df17cc45dc1d8356573b7f676bd9fda0e615b91
SHA512f734c54b703f65210c6a8be6dad84ea732196c345479c135f10b761fa0ac35d025770451097876e52a848176bb88452a8f5ab76b0364a621fa308b234160a894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d49cfb0f828e5f5d153655f788559c
SHA1d85903642978734297363a9d324fc6963cc40e49
SHA256f0aba8dd6cd782dbbc8962f4af2d021185f92d18206cc07acedd9e29db51bfa6
SHA512a1945a44e673b173a9af5123931c69710bd1a4d4f1153b66bdc94dbbaffb5a5df42281720fcc37b49458ccfe92061714ca797fdbdf09cddd42fdf2bb50fdc914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cdd2699f90594a56b14801d4abd0f57
SHA182e1c796735dec76e08c241b272e0baa2136fb06
SHA25635364c65b9c7b225778d60704e1cca00440fe205e9676a512063029a6050b80e
SHA512e432a5623fe7b75cc9509e0e10e36cb5b5b09f87aef38a690186a094ec6416f8beca92a03b4bc7fb5eae75837d46cedf779704fe22fe430130472d953c23a77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165c514a0bb491e716f50c94a4086909
SHA1c67214709af8b02d5c9efd865e86c014531fe3e6
SHA256832fc11146bbab38b076ed2beb2d940529a23f62ac94d631296910f07c130787
SHA512c2e45d398f0985c7975bbd522afde30e81bad31b717b6189109190c8f1c8ee52d51907e1ba9ae269e00d2ebeaf2e79a753a69ffc7fa1a0314c453fa4e77de2ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b