Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 17:35
Static task
static1
Behavioral task
behavioral1
Sample
cs2-free-cheat-tutorial-download.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cs2-free-cheat-tutorial-download.html
Resource
win10v2004-20241007-en
General
-
Target
cs2-free-cheat-tutorial-download.html
-
Size
29KB
-
MD5
12110ca12b30ade16d4b48b372b4bc37
-
SHA1
9001411405190a7dd2f88a46973699c93342b951
-
SHA256
d85c39e9de837871cc385785a08282e8fc3f4a84e8f66b17cda5776b7d9b8d0e
-
SHA512
2e93cbbe3948a37f1459ccc18fdf885d43ec8b270f24c3af8a392f7ba6d56172e5b29d87c66c7740e148c71aebf0c079bb6ae00ea7434fb6e95ffb7745c37c13
-
SSDEEP
384:c0+6GOwNvmMc84Kt+6H+X3KoGJoTgzCEgA+ay1YSYKsK6vnLGDwMK2xBMG3jtOhq:nVGHdQ6H+D++ay9wMDYcdnMsMm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC53C6F1-D5C2-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006f03bf11d493f440b6f384c0b59da59a000000000200000000001066000000010000200000006cfa9e5a9c1bdc119d716e5c662052b6d3ef56af407e5a067ca80369393241a1000000000e800000000200002000000050894ac9173fa37b29886e175d3360400980f21003e95bcef05c455a573a853b2000000017c21233951245b51146ab47ce8bd88261ec85044670d49cd17f82a3a1f32cf64000000077ff1517f0b78b64c19434ce25e0a98fe4ecca6efa363660d9e0d32a0c909f74127789947ff27769b5b3a8ed341c60bf54614ab9fe0d2288aff957e2325760ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443383635" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0898d8acf69db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2356 2520 iexplore.exe 31 PID 2520 wrote to memory of 2356 2520 iexplore.exe 31 PID 2520 wrote to memory of 2356 2520 iexplore.exe 31 PID 2520 wrote to memory of 2356 2520 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cs2-free-cheat-tutorial-download.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51dbfcad5a5cf323c80295a0a3c71e16c
SHA161fcb2699e69872e888e2976a9d25835e3271f28
SHA2561f133515d710f3fd3870a12bab4583cc0e02c9b187dda0ec535883e9dab9e2cc
SHA5125a37329ad562f634c143e0e804fddf81f54d9da95eff2537e8762fdaa6289ed3382c6a7adeff83ef23ca8c80486dc3cf96e9e63acec35174e3296b5c4227579a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fec003f939358a1dcb479c117449200
SHA122ae871ec6d174fc5de75bfab65589d18de329f9
SHA256573a473f158005a3ab73463e573ffef31fa57709512f0692d010f47fa92103e6
SHA512525984216011f0e0a5f64a1438d863f32263719c4d736610941437aca29a4e0eb7ed1aa1d9b936b4e048996ca91dc682c4504ea23e326048f4393511b3f49993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d585f8322635bbd2685441306a051b
SHA107c674e712a7bfe649b2a79baa6ea182e1689371
SHA25631a035166af9def689eb5245607a680126a6f05c29508bb925bfce99149ad69d
SHA512a2fe4dfbfecc73bd486320312a03068538c77b59ffaf007c74375cd2cc7cb9a94e6edcb2ded7967e55a3b57c5b962beacde054655f0e28c0888b65c80e70a812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53085a7ecb8355eef7bf8cf182cf5d706
SHA154f645cbf522f9c73aef41d1a01929d531a09bc1
SHA256b39ea684403abea0c6d0f5c3443b4741d02485406b06624a4f3f79f7c1581864
SHA512f429c2d0cfe43a2ece339ee54a635a8975fa8a0247639bc3d4bd96c24b58ac0daf1c3094c0ea514c8a55d3d753cb16a1296fb0049fead9056eaa1f87647840bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2263292e3050d58758fe8ac619a9c6
SHA1a4b2d3ffd78b781168ae42b69b914d564ddd7fec
SHA256d640e4e873b1698dffa233cd42e77368d5e796b323911ad044fa3e25f011d0ac
SHA5129f77fc451a61408df63f687ced462cf6927bedaa2e519b0eba68f0e60e2360d6c97c880fe6c9f602097b9efa0e83072f57c96156ce48d2715e57345def722c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56d71b545b38a9a7777aa6517194e7a2d
SHA1a51e2e2e1dd84537ebd221a0a32441c986b755ef
SHA256a120bf521303cd8f1319cbb77f17350d0ce523368797ea9695b150504ca0fe48
SHA5127470ae96e6a68adb9d7f3a8aadadd60e737c5ef4aa27f9536332e1dd9336119f79c3baf0144c7fdfeaed2732526598e1fb28f1c928cce884453df7c951a3b8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD551a9c6f7232aafaa6168808d9f529553
SHA11c76935f890d8c0ad798a3f61b4d7b0ae3e24ccb
SHA256d686efccf4da99747570dd56373d8deee2c8304278a0286f19a132543eb9d0f7
SHA51261b003ccbdbcf8744ec951b4191be5c791684aa89096b4386dd28bb0f69a37a1f99fbbfac8680e39554f248824089146528403ec014b433e817051ac359a7947
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b