Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 10:52
Static task
static1
Behavioral task
behavioral1
Sample
Leak-New-01-05.html
Resource
win7-20240729-en
General
-
Target
Leak-New-01-05.html
-
Size
7KB
-
MD5
5246d7e1141b4c5a5699d725bbe5811d
-
SHA1
e428c54b65345173302aec4ab6925a65de3a888f
-
SHA256
3ae6a78cb35bf01ae180a335de4f67d9cfb3b3435ae07de53c57a8341f40daa9
-
SHA512
73afa44b8468821363302931df427d1835f50ea8c9a222f55559bd50a55103ed525ee5237621339da681f324d6e1cebd1b3fbde41371e02aa86836bf7bc86688
-
SSDEEP
96:7suWzyOiRdzcOiLjfjmZ/Q6d38C9F/pePJjeIJumKF95RZjieojwXZk9qPYf:S3Gw7m5QGLSJjeeu1hkrb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAF38DE1-CE77-11EF-8A1D-72B582744574} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006256094d2e26c94f9330efa9467db57200000000020000000000106600000001000020000000ecd40cf5a448127881faec0cd3db7f88a23fdae5e165062a1630301f31081813000000000e80000000020000200000006aa35d6b4339aad56b83b1d7ce527c09e283cd7eae778d4270b349a29284d34f20000000062fde24e81091f6d99ce1f6c64d8b080881551366a9000a1ed81fefee09a34940000000146a507b494351c8e7bc1b22a9f0c42f0740768289669dfd1970b566aa3143084bc0ee6341ac49378391a8db797a15ac20a2de4b336e597188a94b31afdfa8cf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006256094d2e26c94f9330efa9467db57200000000020000000000106600000001000020000000b3f095e879aaeedf211637ab00c100e8e790f8b82bb0ab97c612633308698c7b000000000e8000000002000020000000ea3f9089f5585a17502ec0cc8fac857b4076c4b8ca0341b90d8a5d257d5f4f3790000000e0dd68e24774830b90688288ff93ab484e795c67ef62d3ebe14ab99f03337a727a50dcece77ad020810644ec254883d01d13e1b28471dbc4e3faecea76334705ee4ecfd1ba6f51552d05a3b04bfb978c8747ce39a987613489b4e6b29166700ee1e932f5ad2d83c1fe764db0ca59452368c05cd085ed1ce865ad9517be180e3433f4b1cdf50f10691aea4553df4a92cc4000000002311d6b8c688516232c1ce1694ec7364bbf3e4a9ddbcc7faac44c5a815518b05fe6e62596411b5ffe96794114f24a33cff257a8e2f2ef2d6c6ce1199902df0b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08d13a18462db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442581804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 792 IEXPLORE.EXE 792 IEXPLORE.EXE 792 IEXPLORE.EXE 792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 792 3016 iexplore.exe 30 PID 3016 wrote to memory of 792 3016 iexplore.exe 30 PID 3016 wrote to memory of 792 3016 iexplore.exe 30 PID 3016 wrote to memory of 792 3016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Leak-New-01-05.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1bdfe3ad4869ae5c3a61a72f024d027
SHA1f16f19f41c30c7299e4267566b7a7d1dd41897dc
SHA2568c7f17935e7770dcb160efc56476d5722a91b9f2eceef0c40c87a4d7fce35730
SHA51264b083a674beb44a42fd70f16beb0ab5117202e4143a285b23a0a6baef87f12e62076726a59991d2256f2b8a16f7969f78b4cb0a0771470e571b865be4d549ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71acba7ff1f718eebeb1f2b9fe0623d
SHA1d8fd4c7cd9fb548093ed60e6a4ee7461f10805b4
SHA256cb8860b84eec267497c6d5a64b7c77146ab2f5a3d2ddd42fe0a28f3aeeba7172
SHA512dd92e27f2eb5980c8f9f4eef882c38c783c4cf337360466aa5a73719f26ac13486f7ed44057352a326465487263ae4bb0c498d2ee9c834b2f2a5526c7f65826b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b3dedfcfdd9d95af905d245f7f11a9
SHA19c48517dd769dfd6cc640b5295a9732b50811cbe
SHA256781cedd945830587a4d3c3857a17f7cfb811e6f930d6b160e782a2bedfe18520
SHA51208926bde3c8591e80d856c51f5e62d0df010b03c6d14e5e8e213f447a6ac58971c492aa5f26a8b5d76c3d8b0494ce43d31aaa4c0b151eb72fb74c47f0135b51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a1ab06d3047a505f9fc8ef5c68d591
SHA106a2417b7a50ed6ca12d72c67e42c87de0aacac6
SHA256eeaf1a5ab078c8a9786c2829a09eab7ddbb460ffb4d552ca5b200c8549b9e6ae
SHA512e1ab02dd480210fe6970fe26ba771c567f63cfc82725f34c8f785b8f6367bc8017a16a0271786a6cd433675620e0e30f87c671d940025d88c119e94d76cffd36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a707a87de8292f701089b993cf8adf86
SHA147bcdf3cb08dc9cfadee31c526f6d4fa6b28fcca
SHA25626c357f8ce25ad4af91073d7af68917b863f97ef500e1e29f3ea0a5445770628
SHA5126a38a7fd7a6e22c152f7b80c19bc75f0b29758b5ab89d8b7b48357cc162832b9033c5c94073caecb83d8ce934f1804e96f7dbae4a3bacf222d57c589bcf42896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c96a679c520541855a27d37d349d7c8
SHA1c08d775e554060839b56d266bb4a0740170265b0
SHA2562142b70040d0a5fc027b06671335ff8791b29b1efb17fe64e1cba49da8cc286d
SHA5120f324de9ea4054e09178eb809f80e65229d3962eec9ee2e0050d16f63f688bcb675dc9c0dc805e925d951cc634a205fbd00a7d827ad170517c93eba611e6b77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb142d276642d3d81ebb9792ab0380f6
SHA1448bead2f01cd7c8ff564db1c97fc3a8efe5da8b
SHA256c48543f5f46dcabbb2b0a69593e80ac8e8bb45e75701edee385f78c4e207eee5
SHA51235850fd10ed9b49c165834fb3f0bf59ba9949c9ffb2114133debd41e11b6cea07a310c0a1fa6d498dfa0b5cf41ca5e35bf833ddb6bca93f9a43b82c4185d6a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4a5d761a016aa93224bc536f4a785d
SHA17df8de502e69d665909ed850bcf7bd5b412640a0
SHA2565a872672a78917ddc836af994fbc6bb1059e5b0be7ce4d673f67f0be223a9e1e
SHA5121e159efd38b69475d27dcec620e6a650f0c47455e1da544b1212d2c07ad0e4254fb14142a0e4a6d647f6d965b185782addc37db1b7c52c14cf0f50be41eff8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a444446cd76c1dd8c6e02f012553a3b0
SHA181e0c15aef097c1139ca71a82e2a339dc34f6b0e
SHA25631539464be9c6ed29b54e620bb6faab4ecb8b74784db1c887b018694eb7ea61e
SHA5123f5b103fe6dc81fa37b193dc8764a33ee45194170742951d0de4d6b979a20cc976b5fb08bf94b4e6635378d5e28a2563334f899a1fd9f15118dc927e9391ccd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f12bc6068b8f77ac4595f7c9941a27e
SHA13c25381f62ad7e1093ccf3933bef4e973f061203
SHA256f76ce1e6ef10710788a6e3c6f8459c586eccb0cba584576b0d2cbf970a0bbba7
SHA5120b1a833e3160b3e7d7d0d35ac5f72d7f208e1af57b0d7c3a177db2d4bedeee888bec13f2fc32926b781d6bf084be1c521f4deca7d1e129f349a38a1fb34cdcab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddaeeed9a3949a710298da601c615be6
SHA1b81686b3e712ead78fab90564386539ed85e4234
SHA25623201c1ca9a46e1bca167f9dba483423902f5946cbb08bdf8762e27273474044
SHA512beb60bcad21a0aa65ba3ac680ee1c36aa0a0fc06023c9e42203ef703a5baecf6485b74dfc179b49e03bcefe74ebc78543a5a66861c61657d5eba77a0b410962b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a2ad23642e1565d141a3018acc5572
SHA1479bc430eb35019090c6aac621c905b5e7991a00
SHA256995abbee42bba487d64cc5f02e063fff618d069ed178c3260d3f49d8fc35dc4d
SHA512fbfd930f16b0a3e3f182e649e25adac1e73d778f88698d367e0947b76c6d3f33dc3c843da35747f7c9706cc3eb2faa1910bb7c7083dc50b160f5aa8a137e07f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38b48690cc60bca523297f5dca47bd6
SHA18e2f92c06b7c40bf45e30091d153c80c215490ca
SHA256640094dfcce47a6d11f5d8a96a8c19442ad0ccb2c40393a330ab5b16fb722ee8
SHA5123527298c479a0eb38acb1fe9d3ef150707c9c5b74f24d899249466c85973b80991e4d4284f6f62c661fd9fd11b3a07ea5689de8f65208ce3d1b7cd1deb1148d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7757a37405db5357ac4939c2cfeb22
SHA1dc1f36767acedd6cc56f793a3f2e7967962cee8a
SHA256638815721ce62523f37f19c3e4a29a501cb17a06a03e6d63387e676efad0faac
SHA512e7b9fc1fef261cdc1a9e4d35aec740b66b8b82f2d630507c9df06d16d7b428b3209d99b52cd21793bfbe278d3063e149ce30e85eb19c5084e4024df3dc964dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719eaaf17a75e88039ff7d81ef6e8756
SHA18354b88ff9e48a89c1d5bdb6439a38f573ffa2d0
SHA2560112a35b74568f5b175069910844d5246cda22edf9b61889ad5a36878977ef1a
SHA512c9c90f015a9bdf3f9b2ea47012ca9da0496085b1b3f7abef3a0e503b9cacb60091bb5dd5029fd21725b7cbae41bfa5cbc16a46680a23fb141d754ad7623b9f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b169f05ce2c48354bf3c9454dc293ff
SHA1682d121c38e98e118c901e215b6605736138782d
SHA2565196647f29575122f2b53351bbd133614885fd294d237d5f57d48d414099740c
SHA512d6d77619be1afde46f84267f94e61d666ca87e60c2b33ab8ca924164a6487930d9b2e0868544ab76cb20728bbfa1a54d82ed6a3960c95e0c89055838696aa778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523854d0e440e37b307307f17c3c301e0
SHA18f33705bfb7967d99dd8e45adce2cc70310eb7cc
SHA2565062389de9beebb2d8e841e428d02f0662e1ea272825dd3054703bbc2afa1d6f
SHA512a26e61d4e670c161763325aa131deb0c560f31ceb7dec709bb6a25f8c5ab1700bd09a4a24de8d8a18c8561d3062b9607c3d23a185f3e48d7d0db1634277d5c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512dd5adfef46d801ba45e2cb18bc8c2b
SHA119140624b1c8267b5538883f99543beed6c24353
SHA256144d26b3fe52f49a4bcd72f123a25e98b42cbe625a4fe614b1e62b6abec6b418
SHA512cd08bdf2b7fc00af9939f58520a5b8457e049db300dbeda9fe73cc73b21f0c249aef080a0c3ded5498fcd9241bece17efeee0b70f0f8bef0462ba6c48ff17849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502bad43a9e29f88f13b0a712c2c8dfae
SHA1fa8c997b3339584eb6e7d4ecfbc3d564ee1907e2
SHA256f74f5b2b352342d442a8a6a7bfdb198b7270b7d2bb474f99618542f03d1e2f69
SHA512eb4ddd633f5f64bde1f40baeae9e95be552b034576cbc261a297968b1b363e031566a6f751055ebabad3ba25e00c7d48682f091cdf93133a0182618a4ee35cb7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b