Resubmissions
17-12-2024 02:08
241217-ck2hmaxrgk 1016-12-2024 01:58
241216-cdtt7sxqhs 816-12-2024 01:44
241216-b517xsxmes 316-12-2024 01:41
241216-b4dp8syqej 316-12-2024 01:28
241216-bvm8bawrfz 1016-12-2024 01:13
241216-blhw8swnas 515-12-2024 20:09
241215-yxkarsxkdn 7Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 20:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://noescape.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
http://noescape.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
http://noescape.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
http://noescape.exe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d032c3672d4fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048dc1d094c39e842b618d787a07847ba000000000200000000001066000000010000200000007ed5bc65d0035d6ae1880fefbf9e69da0d98357063352a799c98755b91fc2f34000000000e8000000002000020000000935e5b85ac124bc5a28a93269823b686b4c08576e38ef0822f9afc4026748366900000006bcf151ce22fd29d7116a3a6bf3f8661dd4b705ab0423da67d9079d3917cbca8a4e14e9870df439d78bc3d18f8ac09e52c223733a69cba86e73e8059f99d8f5ea19c50e233cff9a7966f8b64a57a0c9314e116a74d15c385428ad4e5cc7b043cc983e881d70fca70f9d91d1a2c382c6340623f5fb5afa5304bc02c41c7cac3e52ebb95b0b93bdbfb66847691dc010a35400000002c516b969ea1fdd8860f7da05c237d053d962c4498d01f8d5b41245870162e9034a88dfca6a4c0762e4aa0f4a80863aaa61b045ad19b325242a1115131682233 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EEF55A1-BB20-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048dc1d094c39e842b618d787a07847ba00000000020000000000106600000001000020000000e5bee7e16be8f841ddad793120dde75d8fd686cdf69f0d897927f3ce69f61354000000000e800000000200002000000000d0580c2007c426957a03f4bc750c08f4b6e69c61eae16ff6f2c835248a239e200000003e51f95e80e683366ea404dcb926b871036aaf49b3b7acf2c7622d7cd1661372400000001e6802f8c9be514758fd95ebf26299852049c2edb2e69fdda2b3beb7b7f2183952e6c1307c48cadb600a6f52a87eb4727e15219e6bd093fc90a54e720a50ced4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440455266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2404 2388 iexplore.exe 30 PID 2388 wrote to memory of 2404 2388 iexplore.exe 30 PID 2388 wrote to memory of 2404 2388 iexplore.exe 30 PID 2388 wrote to memory of 2404 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://noescape.exe1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d612cd0769bed56b4b0f988d8c8f0b5
SHA1e18c897f09afcc82d820f6f45efe372cbf5b4a4c
SHA256c84185823c8c82c282cc5dba2969c43d5f154f8d37ffa0fe8f472418fe0284a2
SHA5123e8bd99fa0a63880570909c1900ee8d2ed5b04953233998597cc88acfea1fa094e7536b0d54335eea2b85a6e16d819958d7d7d4b54efe5bf7099bcc05f77b68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064ad0b6462b5ab537af6bd17ec952a5
SHA14a4c42ba93d79edea2982a62ed43eaa42767f22b
SHA2564ed2f70219839d7f76715c0eacf6221bd97b0c9e9852aee65b0ba2194f460aec
SHA5129dffc310be6f716bc8ef6be7a816a031804071a6f92963711756e007d62cbf7b73db22b3f03a42be1d7eb61d13ff036c01317d1e3a8436d9daf598f3993dc48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a4a78e1bc859826771577b108e1cd8
SHA1aa9934a2f2adcaa6ec36e0a94c4cff6b0a040c11
SHA2569ac87a9e8fdf182d1fa85b21b0a135f5cad21241ecb93c58a7eb7182f233cb92
SHA512855cc2f8e03907092110ed6609a7e4399655a099718f918d5ae9b006768eba6c6c1695dba932cef67716b9f4f40f09723f14f36a94a905c9f1fb1c7b99807d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520de0e9b9420189cb6d77debfd81adb9
SHA1fabfa5a53d0318550e6caf8062288262f9c4927a
SHA256ea7a024c3a9b609325952c1163a12167fb52d6513cedc25354068da5cb9e7b3a
SHA512f9734b229ecd561ff59c20540e502ce5b140deff6667527bd875a8afb326c5ab6b39de8a4bd9e84d6540daf9b789923c63b8e6025cc9c6b706490d2c7c6db3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514efdef84c2c0557a602ab7d176221ae
SHA1da52c941fa1c7b4d420739318c187e05b29929ce
SHA256cfb85f6f679130b6f51482324120863723c449bc6320885eb241e3902e431546
SHA512e43806ee22eaebbd89963b6f9b28653d5572a649176e0c4e1a1f6f4b9b00e43f6a21b76f4cf35ae8fc1500623fe6f8a83acae433d011f38db4100f182923b7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b7ad104fdc5a66dfacdf6efd9a7f69
SHA1da41d12bcdc8edcb07ebdf0ce41402c4c774f282
SHA25623c7932cb7a6076bf1a0fc085f9833375c86a43ec97f121909a6aa102f763430
SHA512e3dfbeaec2c0f77953ccc06909426d8c283c957ca5d1242883b6c6a9e4a024c084f7b362d5c3fb8435641276b5666f640af6a53d6da472c7c1c1ef85b38af578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6edad8af05d8cf48761c658cc0e209
SHA15823f7a1df8f3d83d21ecd6944fd2627529453da
SHA25602ec80922f71ac5a22f03382fc09c34c8ecdd7c0276e4747daa5b702cf377988
SHA512a58a23e29c232ad032f604b2ef2180b3126622d2f93f18cbc577198313756165b234262e885ec1c750e85951eba49f97dfc9c0e183443f65e5c51198f31a4a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ec6128a0cd2acb05fda57346baeb6a
SHA1708c3b0cdc63a036a540b763d41a67551128bad8
SHA2560eafadcbe3d7552cbf9b553619adf0bb6ef53381861d69c47a8893ce467a814b
SHA5124665817df8250ea08842b92bdd8d99b86c34c202a6d8e07ab67c32f50fb3b2819604243f8ce21b0ece6f5ca0faf3240c68c28e2d767610b6c0cff956997e5e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2f65adb545fedbaf584b125a1f3a6b
SHA17404a596ebd60d2240ac6b943a7368234505425e
SHA2561e1918e16bb68326e74b2f333bb091a32a8103105128fcc14de11e74edce880d
SHA5120295cc55f4997f9c9f1a65d72f6cb8f551d7f6a34d08d49371d97e45e91c24c04ee4bc5e119d94cadd75acdfd2e345d9f8693f2671a7f856a229a4448f82f09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc620f5603ade45db8bf75da2bb91355
SHA1215e6ef594adac95b60a954ed88cc8fa55ed7bf0
SHA2561456b0c0ba846309c51b2003d5b102eae7a5031abcfe31c3afc125b623df7936
SHA51226ba9111d513d08cdca9df73a556617496d22dee6618d363fb3f84e718a1d23a6223f408ea457a3b9e61d5064590e72d91c726b9b7c42527b133f0f1202527ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a780bd4c140c44f6a0de830988126140
SHA137d97837244bca003a0d199ba891b52c1a05a56b
SHA256d9b172934065293ce9230d221c162ef86e85f40e1044fcd688df395985acdf1b
SHA51265645adacbecb456ea0e1ac94be804140c531159554f8a28fa4afd7f2a254f99569b931f4131e7b85c62b65cf2df06430af4d34179ab0d38013ca6a39e15679b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2ff7bba0391aded8585bfdd796b0d2
SHA1f65fb2a8c9cf19f4c2ebc561b203b1e6db4b1cdd
SHA25690eb6137534aee97bc086159c63fd18a48af62cf8823838f213fa59e8fc7da59
SHA512c258efd842613c3e6c2f48932a51f38d3c5eb802dc973184e859988110fbc0a7a7170d7e0b4b35ba82812478747503e27f2e866a396445e5263afd491dbad82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578021450b172312389ae3ec623a683d0
SHA1dc74e2c58542b1d96ab7509676e890a8a76f9206
SHA25620e48e6a775f44490058167f04340e2356253b098e38ff362c70692c3a5ecd10
SHA5128379078a47d64d2d2661bbfeaf7eb948e1e1f0db06c5a586c76a2a0a029b3677d1c97b31ae2e3df9d8f6a9ebe13a20a968a19aa74221427b1a5494baeb748813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e9075d3ff8583ac9784a051dfc01e8
SHA1c3efdb3eb944acfcba8203d2dc5afe4b784d002b
SHA2560aefb4ae04d7f7d08d4b7f24f842bd6a10afc09eb2ec9968db2c03d6b6c31cce
SHA5124873654d27a2743a4a6f3630c86b5427983b24b1265df166f62c4bb3a933b5ced14693bc0663500a77f833df00f6788adc6ba7950adfae4e06d099dd3d39c4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c45e00661032848b512c491b272d08
SHA1e8a68727691734f3d30a9959a01fe5fd7020c7d1
SHA256e7b8c717659dfc7f322823c4efc75e6ea13b98167f23f4b28b76bcbf98238677
SHA5124875dc8d85ac6d0e248bb6b1d21b8784b4a2577b35509c86796275073e90f046aa4116888c6090ee0fe3b0986c10fc0e448ebb3a25882cac20bddf99022b7d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8cc2dfc81eb994478a9892c82cc403
SHA152cedfe49ffdaa5652a15192bc9dcf207b87adb4
SHA2565d0819f7b78ff7e164040143ee27ddb7ebb4955bb1f14509f9e27c1ac99d0145
SHA5125fd7e8f033a382abb8103b704cbe490ca4473d12931ecf72ff6d41bf5ca921d4dfe65186b2227b7f07fefd7293011587b05ceda37eb0449653c695f60e330c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff24cd41a797de1f7ef7624f2b95c2d3
SHA175c8a66467d71fc50515573549cd1f29da98fb6f
SHA25696528d89cb40b0f325c3d72bc442f052bc9022da208eb2a5848b1d1d877d7f21
SHA5126ebe48d638b6285219913f5bafd83ed8babb25bb5a1deb941148613229aef4b112a3fb8d44318a7850de19bcc862357ebdf24ee3461e56b4aea7355cd27451fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041fb00342973253676a17b603bb463e
SHA1da3d2450b0419b41198202886b17bae800f3fe43
SHA256649ee7027e4a5d1655dd7602a134516062fdac664a6ca1d1c2b9221afa05c476
SHA512b20bc431df017d5c56756dca89aa7f28f8d563ae79c9e2d550bfb7de9e628883554c7fe704426ced5c820e22ecd5934a575f463e3439abfcdc46ec7d829a8b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a65034ef4b333cd0a6d8ff26c96b36
SHA1ec9c1a5cf838cf7f308073c6c76b90d25d62764f
SHA25676c8721430dcf8f62194b265c35136e2d8f732200f18f35adfe6bac8704e6c4f
SHA51272c09a3a2197326f4c0f84591b16e2acdd311e9d48f67b55243d0639ce98bc74d97a9bf5f83904ee0f53d6a8d57a868f7304b629f6a70a2829f804f1887f0d36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b