Resubmissions
16-12-2024 22:49
241216-2r5lassmfs 1016-12-2024 22:48
241216-2rbyzssmds 1016-12-2024 22:44
241216-2ns34aslhv 1016-12-2024 22:34
241216-2hba4asrck 10Analysis
-
max time kernel
53s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 22:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/rLcRIQ
Resource
win7-20241010-en
General
-
Target
https://u.to/rLcRIQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000c185f2417fc97dd6265c0a6bedd1484822c7663886ab27b94984ccd850ffd69d000000000e80000000020000200000003257a29a083098f6fb1dde9dbdd8f4a6d71cc9c54a51f6a8ab640860d9873fc7200000002c99c86db9f4f7c3f145c80ecb2978fe4fc80a248dbb2b345a4e98652045a3d840000000b366ec64c27084a126715d4df66d121c667f991c1fc28d9799ba93779a5dd114734d713c950f2278b1c9671fd88e00f6430d289a226a3e60d2585ae7fa903f73 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000509eac3500a009c6b7c7f0acaad83795aa03f234ca392bee22a470596c9bad4e000000000e8000000002000020000000c7e30c397886492ed4d9a3cca28e1790643101fa47b48a20825b9c4395fd201690000000c22c8536066ce50c361e87a89b7b25db565fc67580525b72cee7b8abb0681bebc8715745888f274490c77129858071a070880d992225b85b3f2e46973e9eafe0dc7ce6fa0198574f3cdaafedd9ae5b410532ffdccabfc83fbb8d7f5465c406584f81d7bf37309bc18909b82a33bcecf5f145261e65717851cbb3f988fad82d66892e3dc567ca40c4ffb49ccf7d1cd9b240000000500c9f4b70e93b92d21152fd923ec59619d14e57aef01ba4d1c9534af1b7f2547e91dec7dc2d6fabc64b0b8a578d172670fa2bab97334e6b40870b9a3378297f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09828bf0c50db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7E19D01-BBFF-11EF-AB56-7227CCB080AF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1512 2292 iexplore.exe 31 PID 2292 wrote to memory of 1512 2292 iexplore.exe 31 PID 2292 wrote to memory of 1512 2292 iexplore.exe 31 PID 2292 wrote to memory of 1512 2292 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://u.to/rLcRIQ1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50986121f1415047e472e6428bc0ffa8d
SHA130bcfe4c1138337223fc50c04b9b8ae59702022c
SHA256691ccb585940e3cc62d366572771d00c1395d1c2159255fe97fe16f6d80e10f3
SHA512bcc385b18cb4bc4a55b6dc3369e1a6e585c6a75db5e5cf9b94c2de4f1f9f415dc07b5dbd948fd1499d5fe74b7aa7e67b3a70498e7a2d0dcde7a5bee1ebba36ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb58b7f4357d884db4b43df818534de
SHA1b27d128ef6c92c4ec3939f5533dd4c5d96755ab9
SHA2566113f2c154f0b7cefc943082ed2e61c3a2e8257d851ecacf01daa2ccbb08f060
SHA512de7f557c9da90cd1e890092d4192b8eb4cf1a941a8d681775cafcd8d0f0eb1ff042274ce557ad927fb8ed795cb1862f4726a5ff007111ddd15c1fadf99e11aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6656788a8962baa27be69adff99f0a
SHA120b1e09d0a070ed5ef7a0dff12aaf4bd486c48ff
SHA2561516278c3b3e0aed27ab5fd3bb02010f4713937a86e8bab5b011509b5299143c
SHA5126e8777fe8652f1ef4279e456f20f6153e7db7276f53c70d9916c6551b87ccf89c4b583eeda1ad50050f56c74a352cd0dabb68ee8c8831fdf728dce3c6279550e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f065f8c07115df6f19ffb7f1213795a7
SHA188d06e5c7d934d02406d8ee605965e860fd0d86d
SHA256278e9f4072a3dbbb9509c0443079cc965f8fcb468d5884f0e95e94301cfa2685
SHA512b63721ec23f643ec305203d22055d995861172b3a413e53187b66db86dfb48e9f4bece17318b367a62e02ceb7277ba87e6a30a113e84515ab4aa588afef6f017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516668918a23515a925f36801cc732248
SHA11e1a3641725a8b69f85aecb493b5c64091600c93
SHA256c4a7d4463e80bb2c4350a81c814d1ebf5ddca8f7454112cf3c3eb178a9ff5ba8
SHA512e1bde7115c428bbe09040fd62bb6c61cb64e1e833befa7770e641cdcef6e05bb2e5cf6fc5fcc2f197f9c50469a8dbe2174fcec3baec567bea60326a87e423982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566cfa7c663e54eccfac95b66577bc8ee
SHA13f8002d8103d752a7bf3f1ec9359755ff44eddc9
SHA256c179e861b515f8b910e02ce9d464e69eda7b7fe1d297cc70d41945f1e554e3ad
SHA512f3b18cc8c228d39950eb91f31590c39cd3959f0ed3cdb9940d590030fe7a8948786a1bfc16a176874dc3e19738bba4791dc0f9893557890fed84f91771616618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56081369680aeaa716802c9b1795c233d
SHA1f518ad979bad05ccf2d85b2b1e60849f498a7f40
SHA2561d2432cd6e0c75520e346df35d66adcf70130d383aaa64be4f01c8c15e002b79
SHA512ba3e1e9031eb6add4ff5119e7ce162ba4ee5f743b6501c719176f04025793a74825deb7eb8b876348331a2583d1f9dceb1d6c4c86045c8c23a0a477fa939ef77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff9649aac2505b64be3fbe08c870f23
SHA1334fa0cb103c05273d63d95d43f6bbd2dafd1016
SHA25691c18270c2c33ca54dc3411f4d4f51e919eda892705a73a00d70bd25ab45f203
SHA51228e2416ec2d34d977cefd163db412cc0898b6996335b5985e890cfe5707e4045f7895b895e8a3f0066e5360c922e69108308877fcb651c7e702848eeabdab06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252359df4c0cc2a8b5b1abe321be3d82
SHA1104e8e8cf8155775394ff8a6af4a42b33cc8a593
SHA25689770fdaa87bbf436886d8ffb89ce458e04de88cfed53148119f560942bfe8bb
SHA512eb818b782c8a873bff4e2d999092d4427e463f2ec8bf5417700139c5022b8fe1386ac5a57929e3a562fab74bbb3e65eb8d7a9d9a7dd4aba8b2482e7cfe4a50a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d10f2986deeb756fb418a49b69e90bc
SHA190eaf97fbb772e323eae8d44991485b293a94b70
SHA25603e64e270b94c385acbc22d9005a8f00cf7429045c2161a6f5816c0006489c20
SHA512f6e721c24e04eaef612d5bca41a59e018ae5a33a12e551e3d518e59a609a8ca46017975a4700299fbd731ee29d0aa6b9ce5397b066dd9f62031f4afec4a15084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52634c20936cde8bcc9180dc3c93a75b4
SHA1f830c0bfedd38e3830f5f7e9b823e7fba16cdd4b
SHA256b7e7bc243faa3703b47db4386d0e8603d518d6bd43f931fe90417973bdc1f16b
SHA5121628eef01c1ddee5e72eec49ccf15d450461a9b6d3c8a00dfb3eff16ed4052515359406d76b417a31ab0d87821ff73a195c1d720350f49ca17fe0bfe00ba0f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6c77372eee73d091466d5ab1087553
SHA1408c7e1f514deb9f6e629cdfe3ac17f976360596
SHA256b1b0dfff5081b528030b4eedaef8747e0341aa4f6a095667f00158744de5e963
SHA512f33f6398d9dfaf356fff67623d6f9895df0e68a1c50bd8e052bd75d976165dd0b512b7450b77347fdcad3ca63468311c306d382a0dd141f276e59f62bb6e14e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5890827e5d9a20703ce665ccc33aa5eee
SHA1d0a6bbfaa6d966d4d5b94a2777b71a353fdc9194
SHA25699bb6bd50d63122ddb5d6d5ff4046ab60430c7a47a2bed8de44e711d2158db49
SHA5124662b7de9e10352579529133386a2702ca907a36f246375546ac6cd94dbd27b467a20a4de5db0090b50b5d4017ecf2b64019cdd02b40fca2f6817e34931b61f9
-
Filesize
38KB
MD54067fb44a901eea8e0bcc2c05535169a
SHA188de549545726e10778926aa634932a897d3f760
SHA25694168bcb7f3f54b6f0f8cb50470186203a6c43d176cd98a99c24bf82d03ccccd
SHA512c06ba8ae81e739c585f293fa3a2c3f6a638429384eacc4ee6d4714b71b70ff2c792c623cfb68b88702ba2c747d08a7f70da213b215b147cf3765070a96dc4d56
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\favicon[1].ico
Filesize37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b