Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
Uz10CCLI.html
Resource
win7-20240903-en
General
-
Target
Uz10CCLI.html
-
Size
2KB
-
MD5
1bde1b7f5c3141cec6cc02d03abb74de
-
SHA1
66ac2eb2f1639f27c41a748f3db535c0cbe08992
-
SHA256
9b4d13b0cba8aa6731b137871964120977cdaaba97bce4e69c4cbf97dff17a43
-
SHA512
e8c9494cab13728de8aac1ed57369ba3a74920a0414bb756860ee531604e3c76b64e5df2a9cd3633d43e8d86c36560d94602d27a14a44d71faf51a599e102314
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3D8F2E1-C69D-11EF-BC71-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0245078aa5adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441718450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000000f7f863a6e9964dbf5f2e6e00d5285400000000020000000000106600000001000020000000d219ab86f13110168e630089d4a95c91b0d494b9a46a37486eff54f21f78c3d8000000000e80000000020000200000004762bd551099b143eb9a889fd2c39bd88d849d43b8d0719c818b1028870fdf1220000000e70d4733c30bbef33ff1c7913bafb4b84a59b7099fadfb00826b3fbd7a7adb2b40000000ae0e0b022c919e283b91febafdbbc5dcdfc7c15f467b13b983f0463258fc6875ba0502c400e5a9a6d65cf4cf7a1c377936b4a03214bde868bf9e9a24bc563a22 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2124 2440 iexplore.exe 28 PID 2440 wrote to memory of 2124 2440 iexplore.exe 28 PID 2440 wrote to memory of 2124 2440 iexplore.exe 28 PID 2440 wrote to memory of 2124 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Uz10CCLI.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc7f0cf5c72aa2ca8345d54ba507d81
SHA19c0d21ef0f365378725a9364279dfc86f2f77fdf
SHA256fe31b2088c53e1a247385d08e692ff1d417357c8c1b06e30520f8abbae3f7f30
SHA512538c4deaa12730b7ab6540f1becce8b3e9cc5a68ee1dac4ed0d0eeaefc221aaac5085ed56a0395b00abf61e47033f18862d3e2557c08797eca93bf8af1603e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349b1930850fc1470cd89448d595214d
SHA1ee9172ff81098f500cd30fd750bf19d60716015d
SHA2566c76ca6f45bc9c0b4240d201c0a5de71c097c55470c1b3bfd61d3cbafa1fea8f
SHA51229dc3fb7f2f0221fb36f763020f2828e4d615407b06b4b1df10ef5a534da31845603473895b821882ac4a566d9f391dc029a525bf2b384fca7048df299a2d886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c0a730ec63e3e408273b22fce4b1fd
SHA177c30aa64b04c2e91b80dd38f24792a65c7f0731
SHA256d02c9d3755da8166b6c3b18015cf6cbb3b6eb655ec92f31c9f1a65346513c556
SHA51255168b173ded87ed115ee50f44f9b13762eab8586f4f2b0c1588e9f7673fb0ece4c274c5ae53610378cec1d4a9c78826e590392a84f86013a378fb4b24db40f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535bc5e777ce8533584dafa83aeeb9fb5
SHA174d9f42042041c7be8d050c3f75d4c419bb633fb
SHA2560e376bdc1bedbd1bd0c1360b2c4e8678d3d75fb80202ca3103c512a74c38c944
SHA51228028550d252268a78b04e7c861d9a2d79514f70401430fa2224da6d8fda6d59d58c11d3dea0a1488d4b3c03546d4c8a8053867940596d4cfd19bf2fa6ef6ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2466d6a431065b4f5b07aa94d6a7894
SHA129f5e98b8a5fa2fcf63648186d6e905743fbd570
SHA2561034bfda907d444cd84a0e4415d8c0cdf713fb6730077bf3da15a80e56a64970
SHA512e3971acfacb1161c840bbfee7f67b09190d8e3e12d9ebe3c353d11c169de0c3df2b9888f4d5af077a50337dc9745ca4ff7ef9b665c32342fa1b19064c3a36d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0a37476ecd924685716d4bc7632989
SHA15668a35ba8fc177ca6d330630703303c9231fa6a
SHA25675b51e9db8cd8680c4a141d0c72f966be7fc808f172526c55904cad10b4ca91e
SHA512508ce287dc41b7ff907c0a888d26ad418173244e9ac08c7db81346ce2de733bb53c0ff510f5b4fa5b0c488aa8032177f1d2eb8ce1b3e58dfdcceffc2317f26b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1af23e6515d12db65e0bf15b785d43
SHA1a0b92c8c64c4743d6b5122ad6a2231300897b8e3
SHA256a7ae4cb032bba149d2955ebf36b97c30911285553d6e3141118136b05d7215bf
SHA512fc135d05dab9ec246185d7f2e88082601570f1ae6a7d251299761f9cb36a4632ffcfd728120c60ec52f46b2e1357ed6ce8d9ff952c5c8a45363ab4ee325ea9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b8b9800837c09f09cee4c68122cb68
SHA1dbc8c01594e1f57c76dc90aed6c59c630b35874c
SHA256826df8db44672a7a42a89cf815801d87cad718e614ef6112277e6a449e9bbe78
SHA5126722b3d45e7f1c4124c756b797dbd5926786e24bb50263eb9b5fcbd1888626fbe9e9a4dbb6ab533bdc800a2575952aa8e39d75153ed6ae909291d51c31d9c8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597922a66491ae7e6603518d8ed49587a
SHA13beadc7fbb6b1384b466a52fb5e29017c22fadb9
SHA25689d8a94211ea29ceb73088d456b32cc812bdb5d4aa830a630e38273c45e0ef6d
SHA5120e243ec66627198598972060f6d6cce16dc9bb83898ef513745f132513cb98d8066dee09f7260dcb1875d0cc666d612f322c17428f43e7fff5cdea9ead8864be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d80e5200d3e91f0927c3e4002b8552
SHA1db1109d10bb76e84c0f6f4e0c2a55da802d1988c
SHA25626283db6745506a6de15508912f48ef177b8ff68f0d0654131d8ac2f73b0f0a6
SHA51210e2f964ddeacf8ce9f397ac608d4105b5ca3213dcd3d4f3b1a2473f8dffcc74e7320f7ae015d2ad67f93f51677649e2eb89e657968af464e9f19726360a786b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ec9f06a3431dcd15eadf0f8459db91
SHA1748b25512a2befdf393df0a24a1edd1312196a4c
SHA256e60885d8d7eb78cdeb87b605f1d1902b13c835061f3e403de03a6e38e4fcfdcc
SHA512366556798d3c97d0ed08a589529eedf36f4a819ccba0ce1125eddcb757fae47f9d434815ee5d9386e8e93795ca7db05e4de705bf028bbfca72566cf83cff06ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cff4db90f409ba531b247272afe744b
SHA1b8bcf911538235fe7901fcad1c9180b9742d1b72
SHA2563977a8bf15e510c8747215fa95cbfbf01cf51710ea1dea6601c8a1453a671e63
SHA512c98e1e098fa8557fb6c87904a0831cd09d6c5bbbcd7e645de823f3951947aae7483fefc16ac0b7927e33bdbf173be75ff76bd366d393de61daa4bb421b2df72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56a84739a2f811700a3dc42e7c1d59d
SHA1c353f1d7329ec524ad75f12e5e8806a717c9957b
SHA256b3b3180ef995f0f1090186836628b991e16b8ba5f98304e99cfdcb32849001a6
SHA512248a21de07ffbe631d1687c31ee5a234708ca43de5b0074f1073cf9419d281f861a4223d89e42dce68b91f61543cc9740850bd5f1f23d849c8e79d31da7f92d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb666316309793364c3f8182db87755
SHA19ded1ba794f897b3666003f0427c5c82b7d8b4a7
SHA256dadfdcce9fd05d222957b30562e8af3db634854163e13b36dddad3160c040055
SHA5120876bfa4bfadb51653e8ec8e4cc2373867bbced5abb924ab8d4029c4c2b72afc93af9073d5e2bd7b330e21d60b1587d4f1d28fc6522da061d7235e47fd9f9ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577fa61ce81e99d6c2469cd51eddca3ce
SHA1aeeccacaabcff9eaf92677863dd7a302f5800729
SHA256e3034ef8deeb7e470d0f6d54f76319dfc1352201d372339356c2be3f6d30f3a8
SHA512f5e8585b9cf2a7bfbebaf978b7a91d38c8d362ed8e3639fef4adba9a86c88b3084549b6091c132573df7984bdb35658038d74feb266b98280e530d493e5d4cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f737273835b04ce01c0e53e8d2ab468
SHA180992ab999ba58fab8eef15b66ba1ae94dac3b6f
SHA2561caa175d5bc47d0f0810f3868fb4d6425b551ce3b51afd3ec0705fe3dd9532f4
SHA51203db840146b42f9b2ce4ddc26409cbf1efd0151ffb215422d1e00973c66253b3a54e0c0f7eb167b27737d20f479bca004165cfe76e9ad424d1bdc2070a4d02ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7bdfb553659e18416b42764ecc37a71
SHA1e65ac237aba705027b886827b4357942fea539f1
SHA25687d6a7009d0fc8079d1b4f0364173e7f9359d75089fee36cfa3305e97396b5f1
SHA512da12d590687143e39440f6237efa4ef90c125de56f6274f18267b71273a278f39779dee6fc65dbfb92f4114aa2027393acef5e6d2b3a8fe4fc693b9e260455e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b4f8e56726bd33127ac5b1fa533fb96
SHA1d3899d38300f579dbe7efaa21cd6e06503ebc4d3
SHA2560938e4276ef45e24c557a70180155ab50927b408f06c426a7598bc4eb71822a1
SHA512504421a7fb343832d1cd6e05d99b65a60d1849d884ec90f124ba21c06913314525d6f86e222aa93a505a1fbe83dc04f211d82e01e014400d5f4e5c1dd463fc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d18251583be37a1f2f782f48c16b92
SHA19b2dba9dcf9ede20df042fe6d306d1c134ff3af3
SHA256b5c41ddd4506409c00f8ee13be535838191d55449c260d907bc68ef1d5c1ef06
SHA512c83ad3c9d0e5c695d36c586141833ac2147cf4ce28398462878725559bbc67747e167da9a68f73bf01b8f6ae98e3993e68d779c4cf8f80cad001f457742a4f9d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b