Resubmissions
04-12-2024 20:49
241204-zl8dwszrc1 304-12-2024 20:47
241204-zk7qzazqh1 304-12-2024 20:47
241204-zkt5wawmhk 504-12-2024 20:45
241204-zj17sswmdm 504-12-2024 20:44
241204-zjk6kszqbt 304-12-2024 20:42
241204-zhdecazpfs 304-12-2024 20:42
241204-zg22bazpet 704-12-2024 20:41
241204-zgm76azpds 304-12-2024 20:35
241204-zc576swjgk 704-12-2024 20:32
241204-zbbl6szlgv 3Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
Payslip_Amendment12009.htm
Resource
win7-20240903-en
General
-
Target
Payslip_Amendment12009.htm
-
Size
5KB
-
MD5
931df36f406e0f5495c5d77fa91bf035
-
SHA1
01bbb0abb4f14451a48800e47d203732bc139920
-
SHA256
09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5
-
SHA512
df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351
-
SSDEEP
96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000835f446c5d9e8c44aab022c35627b5a500000000020000000000106600000001000020000000b192a5765704c99fffadc6536e0d21f3132812f3c2ea4bfd99f47085ca1bd74a000000000e8000000002000020000000714e27385f62c19a0bc5f074ec51d8ce4d72a5e3be692555994d9bf63ff0f3f520000000804f145668bc9f57f4e04747cfc3fecc477c4265d4b8870bc92b18e93477642140000000d73a92ed710e6bd0c49e487f0c5fc735e955fb6b3272c9899720ccce65f4af1b1ca903fb3d8305fe00131de4d9604063bbdb94c61b04e0ec51046822a6bfa237 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA531DB1-B280-11EF-A02E-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1099d08e8d46db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439507019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3000 2496 iexplore.exe 30 PID 2496 wrote to memory of 3000 2496 iexplore.exe 30 PID 2496 wrote to memory of 3000 2496 iexplore.exe 30 PID 2496 wrote to memory of 3000 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e5e78453ba0ed10e8a066e12b6f34c
SHA107161686140211ca95b2df5d6411466087f1ae75
SHA256a61cd30aae57fb55a460ddb8430246264d7a44ae5efc8e0a989ea2e91f89bf6a
SHA512c83fe37c60ef206dcaf49f1304f558842dcdd4d051527d6c604b28a7a0f63764e4149678d9f18c80b5f1bd97485bce0412c26034172f4c01df97c5e82471bc85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f389e18a6c0559d63aed3e3527c27423
SHA15d34532429dd57e084ec660adee23f8672c20cd7
SHA2565ec146f43274ba3719a6721b7c69fcb9aa713ed40b231defdc31573c947bf1a1
SHA5121da026b2f3b027f9b57ae8e65d83b35417dfd586c171781934148ec680b9dfa5690d23e5875a7d98825a9bb7018357d197471074004a4a021e0dc87bb26a75fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e15f867b505c3cfc73fc159bc16e9b
SHA116324d193d98ef2ad410df398080c0ce70681390
SHA256e3d4e781db909bae796dde780e3414283095d9ec2abaf33600aa1ded3c7c7925
SHA5127cc1b222ea05f88e1e197cd7392f29cf45e26eadb11a8f2af8bd7475ace1f6ccd0cb1ddb9ea4f19236452f7969d3c8d79dc335e7666ca03e6c49924061c368f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5858904e0c0203f324d5213af6096bcfb
SHA1cc5389a27c9c50594305d84c1d16d624a561bc01
SHA256b507eb24721670fdc42d0c726f8604bc0db4e19c751463dd15b9654fcac730b7
SHA5129e3456551509689552e36dd85931942a1c6d6f020b46116f012e9db5bfe13f86c7e7d75d6b31d436f1bf2d39c872e4d1caad9b980ec72e306c7902b9f92b3386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c18c770dbedc2a397b18583c9fb088
SHA1b2ec3298a26c327a6052ba0e965d0f28a496480d
SHA2565ad61edb75666a054949f0b7d07bdec40c4a3587e12176b44e706e883b895c0d
SHA512e14768ea632688a7448dd1d96907d9905da00d22bd771f778c2c0c40b83bd549a0e515b5d2d76c6706b3d7c5b25e9ff616069dc9e27106db7e54efed50c1aaf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc553b04ad21fa17bdbabfef6796e25b
SHA1ec1fa62c482f5a81db0bc20165fe36a878ef7155
SHA256cc72b48bec09bf9fe572a8b0e87206e0f122c0411169960b12daa756ea03ef7e
SHA512e3f3b53db028e971b86730d4d44da3dd0627270fd52a008f2cfa26e6122cffabef4daa1633d868ef333ff3d7acaffc570c0708c540493eda4ee11ce55b983f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24c2e65b6b4ffcbe9ed603758792cfc
SHA14bca45278175d6ac021b2e9b80fcd497cc3bb498
SHA25699036d5096ab5a77cf40e7f50dfa6cfb8d38066a7bd5f1c96142f012bc5508c4
SHA512fa1c759f8c1e097034dbe5c3c3d700b36ad0d02c637ff3fc77c8a94356e1a34f11795b0999937669b6d12c8dd607df95690c4cba6e2f94b4345e209b9ec0b1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27a4788eb4f1a012a41cc1061f82eeb
SHA11cb72ad575390464ce3784bd8d990ffab68ca95e
SHA25607c35e32a953ef08e77c6a7ebc832151728d70a52000249f3f80d194adbd8fdc
SHA512d6ad503505051cbcd74ab9a0758338e5d9deb9485b5babdaa89f24c3ad520c83639e42f3e0c221a7e9f4abb2b666cd7fc255543eb7c569afc3321bea814410fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da385bb2799635d101665fc7527d42e
SHA1b6d118bf8352f6f2017c27c4c715f1cd042403a8
SHA2561ba43400474aa34d434d2163b318a436eaed9928ee20387c856f4d3dfb4746f9
SHA512e245d0f58e1041f3e8409fc930c9c3f1964400f32fc57fe94a2ae8de50a18a5979c57092ace462630477490a136d15543ca04139969da523c77919bf939e597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c799b3c015f0f89b50f77d9d7962cd65
SHA12e9334de41b6972648200d900b7ed321672cc27c
SHA25611ce20291a755974827943bfd983486950c477f04a5e2224fd0eac926b8e9c6c
SHA512e0b75d98b356036c8da0e935bd41c92964cb7403e65c6823f520db749c437ddef37c1f73abec32ba2280ad7e0689d76d1d04c4da2f242e4d4f2b9837c61f6099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a422cc99a8542c1405b2c7585df93dd
SHA171271d3234da781e5c10f0a556aef81796038833
SHA2569e965a9ba28972b159c92f0e1eac469437707ae0066e20d3f9f9b7042cd63887
SHA512a3e14226b6c954dfb73fdb4aefd0446440c6e204a8506fcfbb1b373e13c88a7ad7c7c43eb03a76f39169487ef2ae8ed075b4b07ee8263157d4a785783870be76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3d619d6a888cb6cfc6ca83c0fc0b71
SHA119baa4062cfa189aca6bf7d88fb15bdc36998404
SHA2560db23d45795c2905db92836dc418cabcf352b402b2f4d6ad06552eeec2b0e6fe
SHA512df2c82025d565d76173e4e4314e1eb26aa4da6afd9056d01af093e54abf89ac2fd6af0eee2ed8ed70719b4f3bf51b619f0f7e9312d36531201f392acae520ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581eff55f8a457f292552066beaa23f88
SHA10f88c946a9735b32bdfbce958c204d2042f85dfe
SHA25679ddedb64adc4f7b5eb3b1928ae3d9575308bae48c996aef7f2dfc00eb702005
SHA512e6bb4fdd523d193caf0ab68feebf27c326af71a67d1281132c30562c120ec2cdc437f1010751beb744b5f5f58ee54d0c3d914bca8079438205be668cf4e1b3b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b