Analysis
-
max time kernel
838s -
max time network
839s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 22:17
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://o86o.explorrussia.ru/bQpOaffxSaSsx0DXtQHxPuAWdeMo/#[email protected]
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://o86o.explorrussia.ru/bQpOaffxSaSsx0DXtQHxPuAWdeMo/#[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
https://o86o.explorrussia.ru/bQpOaffxSaSsx0DXtQHxPuAWdeMo/#[email protected]
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
https://o86o.explorrussia.ru/bQpOaffxSaSsx0DXtQHxPuAWdeMo/#[email protected]
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
https://o86o.explorrussia.ru/bQpOaffxSaSsx0DXtQHxPuAWdeMo/#[email protected]
Resource
win11-20241007-en
General
-
Target
https://o86o.explorrussia.ru/bQpOaffxSaSsx0DXtQHxPuAWdeMo/#[email protected]
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b5b0fb2c53db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cb95c8709e3c20408172d45cb4510d32000000000200000000001066000000010000200000002936f62afcc3d3439bc2147ac671962ce1704f6b07e8036a5f1aa9cd9156b701000000000e800000000200002000000091bc2a09640bfea44b9a7cabaadbd029ec463b077ec624fbbe4a0711fe829044200000009906f6abf502fac57307425a2b2f84cfb48db5433fb1a248ef6b5ab589456c6a4000000005d11dc39546ec6c18a02acba5496bfdc9e2740fbaf445011a37e363bc5f880e58ac7453b9cd8a97f0cde6e18298fbb9933e9a215bb50975119d9bce24938c3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26D2B301-BF20-11EF-8E45-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440894896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2316 2720 iexplore.exe 31 PID 2720 wrote to memory of 2316 2720 iexplore.exe 31 PID 2720 wrote to memory of 2316 2720 iexplore.exe 31 PID 2720 wrote to memory of 2316 2720 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://o86o.explorrussia.ru/bQpOaffxSaSsx0DXtQHxPuAWdeMo/#[email protected]1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57287f806030ea28b6e24a105a86665d8
SHA1f6c7ae293f5ad0ec48e80744d572b00071ff0e5d
SHA256774e074d915e4c2219ed01684621afdc27a7ba426e4a22e1b7ba4735e23b9cea
SHA512efcdcea4afc6270f7802101f2eaf4e5e2223c9dcd3c6aa56c69f34611ff32554a1ae3247d61019fd52a633850068d053ed012076a37ffa167f46fa030023451e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50024a3d24a0abe6988114c159b94ddd1
SHA1e3f21dfb747978a5a18587e22ac2ac8265aa4974
SHA256c1d3bc7882459ffc330a485eb798df2dd0c47b9fdc99d649bb054e5551975a92
SHA512d5cc89cc24fb1daf0a17b51d73ba9f5107b631f7496da354f30ec94612d10f051e3f6d821ba0cb6f26216fbedc49f1a3cb911e86fd589e339b721ff213d1579c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a0964835604fafe4277eb2e29d5471
SHA13b9ee2a162051e8ad5a21397cd5287b53f0db427
SHA256ff419a2ade046273a53a2afac7a9b0f0659ad1346bfbadb1eff55b218e5b1913
SHA5124bf673f5e956ecad81beb5574064e5411be11609d8b1b3c56831154d2b2c391cc90c69c006751b7e0acce99c7395ac6446de47e4d429f4da69a00f0b161d147b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ffac9e607aa91595c749592024b58a6
SHA150e8df731d546483d060d8c98720642d94eff301
SHA256435552610550e48d1e8e37a43adc9cb2f22f2397583863b2d2eefa4d2cbf8610
SHA512bc1508faf37aff3cbe6271f20db26a702bc6e99e779dcce06921d69f58664174b5a8dbfcb9c387c1a1b75116bad6e03544aececa6270647dabd1b9824f80c456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ea15369792c6fc17755f145cb555ba
SHA101b471d64e7685d4784d78e57dfc219dc3ec28c2
SHA25679a5527d8cde3a5d957dbd74ddf61017587794ec282ad0e3316e302f504379d6
SHA5123a6bfb57e68d86c2f878271290acd5578a5e8f57db0b98ddce19747f5bde1df91c2fa6b87f604f3ebb8d8b4522ce80775aff888dfd31e2d729dfc43c778f2205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfba6c7b09ce387f176f2d51e2e583e
SHA181577123222730dbbd74fc9340fa57e2f2ee9fab
SHA256a8dfc7bb06b2caec2c48715b23ddd0f6dd031e9ce0fd91e0b25da203208b388a
SHA5122315d88a006bcb97f27d36e9c4a66ce7e135ae12b156820e19961ab98cf3e3de01a4124af36666ed94f2f22f451de741d1080dcba656e8700fb8b72dcd4219ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53305420f6e13a207f2463f59b051a6d4
SHA1504a0e798bc71c225a94fac0480169846c80bf63
SHA25695dc37c77bc383513fdb7db24dbfdc8b864538050b752154c2a6ca6e75751a9f
SHA512dea97362b71af0e7525cd580765667409adbad71e1dbef857ec1a641a869ed2adb792f8d3b1f7dbf7e793415f56242fb72240e9e8de8495d5d402d87c59ca033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914af6ff2d836eed4e51e4366b9bd503
SHA15561c3a8524e73239e9efac2637b7b761d0df836
SHA256544ca52f196885aac679d57010296c5fff8639e7d1386ac2ea4d9d7a1d96b752
SHA51212937733e824ddb89b19dc58fa59774e4e3d21d2811592e4ddac6afac5cd7028eb37b548c145e48a9ec422d8af253081856dd45cca23611ac3835fdf3a4b6e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095b0d02259a11eb6f760ebfe6f96adb
SHA191a787d9fcc7db307a4f400d78a551b4240d39e4
SHA25658cca2f72a57278e2aaf1b97dbd365ec12d1c9b0c08f996ddc439864a2f9abd0
SHA51286c87afa075025666668f867b0059a448b8d4093e672f72afe63f004ddb3ce1e9fb2594f7c6ca33d0b2a44a7143639fa3712f5212f9ac2805da7c3272ecca172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685963aff91f11bc6e7ac29cd846bfc3
SHA138a204e9683314cfd30d3c1fc2273b08f17bcda3
SHA2563bca922f04a90d8c34e37ca185c79dd7f67a82f12d158c6d3ada4939a185b087
SHA5126facd24aeebf8cc94b020f201f58420fc81cde6c3223a3567694667bad54ac973fefba118267ed475183c52845a9959ca325d1597d3af63d1fb06e68a7fc7808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50441872f82169f16d281427adc74858f
SHA1acc7d79e52850ea8f69b23758df13656b4938a27
SHA256ee9ce4704a8ff769f6f46f6f34dcdbe5d5579a19d194742543449782391a1886
SHA51222ebdb4f090e6dd310e28d6fc8cc4df441bf85fc9bb9eb8a05f00a7f532f8d1874c92b4e7f000cce0bba94d717066971465ec8f7c1425ffcb8e8d327b576a689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5252a01cb0e42288634573ffb22566ac0
SHA102b23276ce88daab11928c904f5381a308e12af6
SHA25627a4124356c71da01e6aef0e54f139241acf524b2e677c1429b40c2bebbdc7a6
SHA512b22eefd1d61a69183b308253dc070a2c76456af1d58c06c6322c9f1c19508bc011a69d56e5f3bdc4f6b3d6c6ae7c2ab6bdf3c455a49755b008ec7c11e737d877
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b