Resubmissions
04-12-2024 20:49
241204-zl8dwszrc1 304-12-2024 20:47
241204-zk7qzazqh1 304-12-2024 20:47
241204-zkt5wawmhk 504-12-2024 20:45
241204-zj17sswmdm 504-12-2024 20:44
241204-zjk6kszqbt 304-12-2024 20:42
241204-zhdecazpfs 304-12-2024 20:42
241204-zg22bazpet 704-12-2024 20:41
241204-zgm76azpds 304-12-2024 20:35
241204-zc576swjgk 704-12-2024 20:32
241204-zbbl6szlgv 3Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
Payslip_Amendment12009.htm
Resource
win7-20241010-en
General
-
Target
Payslip_Amendment12009.htm
-
Size
5KB
-
MD5
931df36f406e0f5495c5d77fa91bf035
-
SHA1
01bbb0abb4f14451a48800e47d203732bc139920
-
SHA256
09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5
-
SHA512
df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351
-
SSDEEP
96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000290f7568d592ed0360139814fcda116c2b09cc8b458220d6e194fa29f1a46bd9000000000e80000000020000200000001068da99624a79cc6338e82ad77e5cc677daff4fde359ffbda7402b15484697d200000001b13fffbbe813f68b5332bba816e0292b3e4812cc7ff0b6e5d64418ad59322a2400000003ed262811ab7384a38a15d2aba3e444de3b157a6f6ce988390ca4e291128eba112a992216603f3b263cefe0822ee848c932837235dd6b27754488a0559df2744 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE2876D1-B280-11EF-AC67-6252F262FB8A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b09fc28d46db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439507097" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2620 iexplore.exe 2620 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2620 wrote to memory of 1964 2620 iexplore.exe 30 PID 2620 wrote to memory of 1964 2620 iexplore.exe 30 PID 2620 wrote to memory of 1964 2620 iexplore.exe 30 PID 2620 wrote to memory of 1964 2620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc5a069f64ec40178c6780c0eab2a7a
SHA186b78f7e30e133bfa8a1aeda3e0ec338bf5b0adc
SHA256308a99bca2d612d09a4bf371604667773e4bf72ed71dc2fd0693dfd4595c489c
SHA512928caf4280d9547bd1751b9f324a7a71965762bc64ddd42896acc72c06703e9626f589401a66c01c193ced3eac69a76a3ea556614d50deeaa1568f72af6cc964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55daff74a6761f47f1ad4d0e83c9674f1
SHA173f7ef32c251592569c2570fb993ac12b4423889
SHA256012b554e4c0b495ab6758d2444b201aa1b25edc4ce3ccfb555fbe27a53f6aa78
SHA5124ac6af4ab3ff1d1bdc0316f2b80d77401c6c87efacccf2c1fb83ddcf4bcbfb40043caf084cf26ce08767cf4d4bf6604615b41dfe534dff8f1dfff2f000d194f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54caaab9a6fa488ad58c4e5fde1546a57
SHA14ea97a0bd9abe7d1ce7ee0e0be0ed0f674aaa687
SHA256eb505bb74cce5e0830425262e4b1af440393dc17f1b6a6f58a72ba5a0c4ef1ea
SHA5125edd08d9f3e2b792c0006c5cdd01e468153695388c1bc623eac15f573bf43bc09c8e1f88e97901c0d4d78049d89f27bb9d31e2add04546d63cde4d0f763e96c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae80ef41371645598d560537ddec6d9f
SHA152f5c0e47c6e1216127592ee3c4bd5caa0acb419
SHA256d1756a510c221b99d88d95d86099f3f097e2678ae4fbab2f530398b31d8eb8c9
SHA512c269f23f3090e2c6dc3f3907d15e467680bd9a2c758d0ae382950d601903bdda66f76f0ef9ba373cbd584defed571e98a0aaa8ff48ca2693a09daa773a6d38ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d58fc9cdca9e3d2d86dab06dad0af9
SHA1cf080b216b1cace08301aa14220bdd92b1a9ddcf
SHA256470c65149e4ca1df1c5b3fbe043d907841926a5a5fcdbe3732afe75ea65f5ab5
SHA5127549fa307bc146e8d86029d1e659b210ce60716647921991e712e44c25b662406c7c92333d15a9d61c0a46d436900d275e7ac1fed33076e041e026bb2d1c0654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ef5bd17f476127059c325a3114042d
SHA15f94d847d9eca8b39e1b1393c71772da9782bfcb
SHA256cb141c175e39d2e4de1eb8465e4f84acb68b95b0d12ee8db36df784d118e41cb
SHA512a825c738ea3935f2470c93cdee4155fbf0afe0efcd429d3445e321a83c9b8b7942c6cd35a7e407e81a85b4315cf0eae32991d15ca12bbd886827be86179dffde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534208134c3bfb1c72129d3caffdc188f
SHA1a68b5093f8990277ecbffeaee6a5808151b8425f
SHA256f05d1d23912b52113052a001a0371f229b5be6ad7992979d7e6f489c1627451e
SHA5126c0acee200056a363f92966ac8eb4a51de78687d18cb92c54b2e571ce7ab36023163a1fcf2872a1201f28eaddd5778e2fbe6ece11876ad0cea055d118f111649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50780f8f8c4a4be39f1bd7bd74bb4a55d
SHA19534a05d72ccb2fedf560a36706f8346c33e31c8
SHA256383cd29a375f503ab8409b55c15051aa7820936b2fb1db341ae8f31c0df10052
SHA512e68ad00af9ff3533bbb5524ef9a896caedf1e1fa0e4503d3ce18809b482900e718bc7b901c3d3150a08a9bc7494a1943e9284749dfc387e42b48f3d8b8e3dd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c25f60ee4a7c8e867b66274e19b348
SHA1ed77e7cfcfca59709e4aa227f760759d29d14e83
SHA2569555d7e9d68702ba4372bccaebeb184708e8bc16b2be5ffeb551bf2ce6e8c6cc
SHA512459fa5c5b84071ed0f8c7b408f2361a6cae7a6575ffb391d744dd5e76c40c22dbb3ae69cd0650f8744bca764d3ed3ef3bbcf088bbcf6f7615a190592dcc17d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240ba4c4d164eda87d6e85c9b4a4423e
SHA16337270b20050329fca292a00ae322261ef9eadc
SHA25643205d1f5a406270c44a845b7e3af541d3be7fe1d49232c501d286eee57ceed5
SHA512eca6867517ae7861be295f77b46b49074a5e8b655b7499b5d5d9d1e388c2f00d502de97d0eb842f38d88f0e4012a06afeae2fa9aa6053017ff4dd48a11a606eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29d850a66e8e8f5c3add47b989c3a9d
SHA1c01a1920d12a6969e1a6e5da77415349bc5ccf25
SHA256c59e84e96f5f5967e887d394a4b19a0ff07a57a4bb0fbcb395aaa7e8e9869950
SHA5123e5c5c774efad4382cd7a3835d78674a78e728b8620e8d3f2eae6f54c023742e9a293e213de7be6405f462a227b57ff45025881c53facbfa14c82e5fd024b4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f4979820ea30d21b7591b16756f84d
SHA19616937681e2e5a4b487235139a2c7967a884fbd
SHA2562a7677d421713f8ff19bb858779c535ab874c91f4dd86cadad3e530c9831e355
SHA51252056760dec3d94fd3f7c32a79b5afb2d3e0b215bc279b746d0f4f78f3e6fc46295b2f1901c11f3e0518a1ebb95d772b36a7a3d1c003a213f7f857e9b20bf88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556717138378b847560e9dab125bbfe2
SHA1ac0064c1dc8d9673237e5225bbb98224e909f765
SHA256dfcf52c1d1fa53a3f0ea1699cddd1116443127aa7b96fe4865b6a78c71aa83cd
SHA5120cf90f6705f0c523c000401b0fc086e4a4457720359a8d137862d8dbf04088ee47ec5cb7aaef34989fd2255b024f5453c2be0ca0327bd74957c0d232a5c19073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1cf9050c3e289d0c67a7d7bafc6cf41
SHA19af4cd893f4f833c09db963afc38e317ab73ac18
SHA256e89e32c49dab7ac69f024dfd08a3fb73242d908001516a3070b6c86e8194b892
SHA512818e2d138bd4bd6c46fc8c9aca617371e5dd921c61a906b214b939368a9ffe839eb899a76a7eed5e80c961dd9e25f5199369695eea57807be11e1ee84db8b62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57190362e421f90560a93bbfc86998d2f
SHA1b4a706c8d68e7cba94bf91f193ec75343baf505e
SHA256db2396d9838223f739fc0c667cbdc1b33e48e1f389afdf1bf49fecfe8175824a
SHA5129b09faaa4ff8b2d05b2ee4b6af8b756d018c1bd33aae994471440c67926cf300c1b99495bd2638e29a2ae805d386e0942bd680e63fba5a57afa3416ecd6fbd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d385f4f14c7a21c08e29425e1ccb1b
SHA18f6c1d7bdd151db534255ce591fcafde6f11ee65
SHA2566f901ef0e7b8652f1d0e608b9a3ee9be0232d258bfb801616154e62a8fa7c82b
SHA5129cd0debebeca98a8d46986a5adc8e74df4906cd9b97c7f3525a428778586c32dff19ad0f96ec9c1a0ec197f7c2f7ee53e343cac1a989bee9c73863953be24c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942250d3c6cf71d3a1270492a2a300fc
SHA1c20eb1cdb89ad25d0e40570251009275fed2a3c0
SHA256c75bc05867a598275a103a808c2544db5d6033d2f5fc4469f761e279eefed9b9
SHA5121ab897bde93d48e787cd8a2ae801284eb2d0df85f68c3811fd3378d503de7f00a72414a8f0ed21e1c964627b4af2b4cba5fb6b90004c0a7c5912f5c236a8376a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8fc15955044a8a616e4bfb22e778c7
SHA1a69960a12a74aa35bbc26936bdbe41bdff5a7f78
SHA25677138e584f63b5fa7e292c115d8b1670ce6480bd47888f9b884e75dd66857d38
SHA5126056af313bd6c732848469cee578692fd861872792a7cbca7736dc692f14619ae864035e00c9c922133aa44b02af4396752287c0ddccbe8e3c178dd32446cb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135e34a9cf5b3ff1a39bf05346ad4685
SHA14c5e4e3a486a0b504d44e0c3c852fdf530eef523
SHA2568f52a308768648b4ece231a2ac17d26612b5f556f489147afe31e556fbbfd5d1
SHA512421180634688c190c2cd5b592b1ca46527d2198d081d05699add11a868630957d668309e49db70f5e4ac7f3c3696ddc7136deda15db9430e41d61e3a95778023
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b