Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 16:22
Static task
static1
Behavioral task
behavioral1
Sample
nunyt.html
Resource
win7-20241023-en
General
-
Target
nunyt.html
-
Size
21KB
-
MD5
01b1cb3f786b3b2e00ccef5623228148
-
SHA1
dc7ad30c6f5c5d495f68eb247a7a33a902df4151
-
SHA256
fc16aca65e569048e1b768dc59093f9737f6d32f5a1db75182468f804f9c45d4
-
SHA512
453614e9d39156a1292a476ea2c58fad05edef6b58eb7d5c4c42430d74530d3f314679388c94ac0193bbb71b669c76a5c5a381ee2b40f748735ff61f5c36b05d
-
SSDEEP
384:EIbRBaATO0ZDgVKiHuKKzzN28j4Npa7go:EIbRkAlZEVKiHuKi53jmsv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60535061-D101-11EF-AF8F-6EC443A7582C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5011e3240e65db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000b5e13544c92d5425c6dbc570bf5f36e9fd518306c70d9dac873826409f690ea7000000000e800000000200002000000096f8f038f047507cc8a94adfa7a4f0a46d217a8b71342132533a4839c7d5f53b20000000f4e52b53f0c5459edcda2bc7e0f37325f951821038956073676dd446f777ca9840000000087a037a913c7188a59054681f824ac77728e7895928e6a552dde41387de5d4655a8eeefc7b9c9f74eb0dfbe4c934957de67d1759517d7ee7ab77464ba188e3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1240 iexplore.exe 1240 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 1240 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 1240 iexplore.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2616 1240 iexplore.exe 30 PID 1240 wrote to memory of 2616 1240 iexplore.exe 30 PID 1240 wrote to memory of 2616 1240 iexplore.exe 30 PID 1240 wrote to memory of 2616 1240 iexplore.exe 30 PID 1240 wrote to memory of 2796 1240 iexplore.exe 31 PID 1240 wrote to memory of 2796 1240 iexplore.exe 31 PID 1240 wrote to memory of 2796 1240 iexplore.exe 31 PID 1240 wrote to memory of 2796 1240 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\nunyt.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:209931 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b93a7722a2fdc3f7644ce6465d7aaf37
SHA1471a81fca8408a8a71aa77ab9ed70bd2d6b0c0a0
SHA256df04f62d5c266835373fa0125f3fbcf3a4393315cd49c998c79079714d490ce9
SHA512cfa5e515afbea025c80c1db98884b72e6841ea862aba5cf392268889966ca35307130871bc4dc1d742e1afdcb33f8192b125e56c4d9a046e8a604e5cc8f5b740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48c1dbfe7e027beecea9287e3689b1f
SHA14abd65162c59c24c6f1ef2d18e88fd55b51e1ce5
SHA256511dbad0d540bb4a2b1535b26c7fe6b3f901abbd07ccfd28fce29da52023b231
SHA512309b19e77a6388a4829bf2041ca5beb9792dd0da26cf8cd0b98d407435c48127ec7531b789963c8686d30baa3128439c479bc7f630cb1767fe322790b1fdcfbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b129f054702b13d74779e43d9a82b35
SHA1f9e6f94379d9869fb45c207418bd3abc3b5dc8a1
SHA256c47001018f9f03ebdab1ddd0a65a39dcb26a58c067bd5d26742d0a5f16b11419
SHA51270524541bf4fa625bd0c45b429a7db0a19883545f179af4427cf00fe8c070694758bf15e8e707a09a0238d505cabdc2a48d4adcffca2c91c6cb8094cc8adc7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6d95321ebaa864eb7fa13e199b81f6
SHA1df039fd10a7dc483783d29984259574fe1469f0a
SHA2567cc631d4bbbf103f252123df73177865960109cbf00652a06ac886e9f59806da
SHA5123d80ee157f22c0e926f19c0840c54d5dc0b924f2e833322e6663831c0111e96f75ab82d06b1202ef90bd8e295c99b1bdb947e230cfb261d21753d0b51f30247e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276e55e457523f993d4a9663cc6a445e
SHA1078b8e5f61e8dc012234a689dc508355bcc394b9
SHA256c3401b98e6db5307ea912031b7bf2f72d23d3d9d6b94168b978d37eef120863f
SHA512fac844e114db897f1366f002d87f977f12e277f137531fc2ffd01f75a3dca4ef8cb9d6a9a88e63e6efaab80886a6ce620fdb279f1453475403f621002fac713b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace3cfed2dfb69c06583ffc5cdb91f7d
SHA12f9ad8e9192ff78c2ea4335714d89d6bac8270b2
SHA256dcd72a369f4f6b690b8c437ec0d113aade88caa5773a373d8f089aa040916ee7
SHA5122eb8b31017103731cea61efa858e1b0687f33945d7912f13dc462d9c57e18f751c92ea69af37f1f35b6244fb3864da231d4a9202e2ac4e5718ee9063cd2f221a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec4a7c6f09c81ac1109ce78ab3408bf
SHA1dbb69a4f6337fdf30f28514517db7de3cd2b0290
SHA256f093373febeac0dde63c6d9fc0665a154966a4692b4c4e9cb95359f57561f5ac
SHA512a1c5c81cb53ca1af26b46de6d1b37a3e0646d172ed48fdc988ef17eda6cb9c77d36a7f9e0fff7b48af37dfa43a2b302e250dcf3019831381df375c8001d05f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef6a9ee2105676de4d86640b0ab28fd
SHA1c14e01492675f28d80dd9a20588dfe1fbc3b0293
SHA256f640fdd50ab969e2e03c3b25c1a97cecb6a2591c93e4885c0667913eee68026a
SHA5126031bb0dbbf8a26e4343c2a2cf237693e93d232648d22d14b1ad4783ef9698ba6d488dfb18663d12a217738a3e4d8271728cdef39eb5f49766dcd07a2ceaa4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d023fbf6386e142a61a667773a77bc2b
SHA11b8d4924e5e584781b4c61a12caf99aa6d95f212
SHA2569e889279c3dd318ad40f91bc64d77b9ec65551516144b2b4b222abb091c46a04
SHA512aed901ce85a63a6841fea030710aca341a39f6779007dd9f7a6d4e12e4f4941fae1e4d842d8a8facc18e594a53419d2888fc61ecca00218121a0e1b3c343707f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b