Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 17:07
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240903-en
General
-
Target
file.html
-
Size
8KB
-
MD5
4e97081fca4258ac92a9971595b85cce
-
SHA1
51243820f66f3e66011931200ff346505c24a12c
-
SHA256
3c68421a6685f6a82d80d9a821555845b4894f2ae5300cbcf62bca64cd170373
-
SHA512
6306328cc40af481a3fce3eac1de69d233ac60f80b0c5c97ef30b40fff4f1a02b4df7a1c7b1a25fb7ecf06cddb19962dc68e4715174ca3dfec2809140b0a51cd
-
SSDEEP
192:PN2x2BB0xJj87ppPpDv7AwkEJQ8R9RItZXMjYyIN:Axe0xA/POwMSwN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443554728" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b066e35d6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0ED660A1-D751-11EF-925C-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000061b6f05824c77349b2b3e6758fcd0496000000000200000000001066000000010000200000002fec7f016ec8f2cc072c07a3b8655931e93970e521e0002704d5702d1f5483fe000000000e800000000200002000000006587e99da61e520bfdfb19959b3bba2f1ddac2c1ce3f44c070abc2f6a06726520000000ae04c55f3c1f9852244bd5b18450889b33e5a3ab2bee5d3af2b5a882f4be8ee140000000b7bbb7e8f82d1c859f0fe7ed1e0cf8db4ea37b2f7a968cf0aebd1b0fa09be9e6317e7fd485c32333273e131d31b2dd3da42dd009c91b665138021896dc79f5bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2576 2032 iexplore.exe 28 PID 2032 wrote to memory of 2576 2032 iexplore.exe 28 PID 2032 wrote to memory of 2576 2032 iexplore.exe 28 PID 2032 wrote to memory of 2576 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16bb8cff8636dadf3d3da43d29f912e
SHA1fd635ca424d1239c3fbc37952272f162fd578e58
SHA25676804042d7a4e582df0ea89800e84346776b82055bb028f95d0f5d75b18b5050
SHA512414b46576fb72aaf695ae6b95098a524fa9ae67878f6e812af31881948029561ce099b0266b1deff4ddc4962f720df32c3ae42eec0ae9c59ff1ca2b6c1080583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be37acffa5be77faa5a8f1be6233a5d
SHA1f642b70cc861251cabe4d1b4e03a714af55ec180
SHA256becd366013f9a49325e487d4417a6002c8cf9e4ffee71f445ec5fac667534958
SHA512b0dffb9732b3cabf8f04eb41f8bf150e182d88686f83d61d834130748991f639a6dd3836d4e9e173abdcd2bfc5779d3a3e69c19bf166029825af0290b444f4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e72781d2cc80fe7b8775e1ab11bbab
SHA19b6d7955cdadc68582695bbd2e1b9ce2e8dc0b2d
SHA25674066ca1553b34c102dc5dac89f67d25803e0ffb8ede18ed5db2e0e51f933de2
SHA5123864b08dc488868dbffaf8a2cdcd2a42190b3c751fbe49ffa361b7decead4f2c6ba52e302aadf4d17dfcd4818cddb8cbef4cfb80184c310aebda410d5305ccf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aecf9cf8a517f60d59cd171194be78d9
SHA19f3d46d4f3cbe2bbcd4af6ba2e013c4ee893a031
SHA256e954ae24f4504ae67f400ea06cc92952a365566eaa75e172a89a9dacb2c17e1b
SHA512ae5ebaec7d523a8dabab249baa16f9f9083adcbe89a51247c04cc4568dfc0eab7f17685ece25c952712feae8da06a10ada22f6cb5a889b692ac98445da416fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a95b67ff8344e050e91094d17c9c09
SHA1f292677485b4ff047ca30b3085068c52e26e671a
SHA2560fdd043f586ff4374759bcd2079225f954a63416d3efe02f8be778aac6ffbe14
SHA512959d5d035ca37338011fcb2a31ac3101382eaba6f9a317e122c3aaa1b8b6ebb245432e288b73a9a9676d0144ab96fdba536a3270be87b80d0990bbc6c5004f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f1a22a465308e9367b17d7d5d21d73
SHA18ef1fd2f123cb1c313357bb9140b4b96855dd0aa
SHA256a34cab705cca04cddbc49dc9c530766d96b9f5d3c30d8e18fb45284f3d472fc5
SHA512c216308a5954aa1b9579e4eb8a4b39c33f3bb0dc8b89ef63e782c0e291e6b7dde72d245aa7aaa45ddecab695883371ef06452155ac15f9862f82de67a073d65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce0428d0c8f05ab98a02a85b8a6fffd
SHA1c5d26d8df277ed822b5c2780da639220500f0dd2
SHA256c450e44cdcdbc49e71a5c4fddb8d18aa3d362b7568749bfb491f5e27fcf26ad9
SHA51211b6634c5b49965c733748026aa655d8b909098e9f7cc6d19386beed2a57bc6945b18af218f365100fa297e0c943827fbe84da63f15a5a3bea12904355692366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850aafb7a364111bcb77f2530452d22e
SHA1d35a5746e245ce40d7cdc958921d7e7295706801
SHA2563b236d59ef3bfd624c83630044d66bfa300680412c5a8c8d6504e5685e80e87f
SHA512f775ccf74882bf73fd1c4afeaa80d316488b0807a2cdfce1bf287a4de6b55fdcca2dda9b3b9ed488a192350f5da67d9fb39a40bd11d129d3c1ddd882c7466e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa565cb146fc19e58cdbe9ea973db0f1
SHA1bc5bb67fd7bdd91568d224bab6d72b6376894114
SHA256b7ea58c66cf54fc178122b2f0d8a7d75db78f20c61ae7aad4c36bcd5dbffad0a
SHA512a389844d084612849dde12d6a3a1d9a4382d4abc566ccacbe9ed0b3b49be0278b04c2f59cbc07b2ca5e3bff1fceacc9024c6989a7bf76231f9c3dbfac52292e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794e40068e37d8dab24e6dd9e76bdd51
SHA1a4a732135db485c2090a5f1daa6d27436b76fbf1
SHA25636bc10e9e84d76a49879f95b43d51acc9b7aa29886b650d39b0f29f79a82146d
SHA512721222766485a586c068638438417f5c20cbb8129efec960bd46eee24a7e322f563410f3f1190b39aba594e023b48be627b42fbd4c5e003f33c29025449321fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50171d2aec05795b275c1893fabbb1945
SHA113fec0436ceb94207aa2860068fc6d9c0ce5316a
SHA256562df2d6c587ae6a1f32893419570953fe6b7fc95164b9503eb7df35f5dae4aa
SHA51240f4d858caf34f09455502bf5c63793265f4960a5f775758029f16a564317e85094850117a6e23c3a151f2bd1edb182ce6d74f4468f694fd6c75d92e6a2b1afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b437868bfdfe5d5a9994c0d055a1651b
SHA17c1e73f0f9e5cf2352d5b51d863e54be32337d80
SHA25630ed64c1626f30beb78a48bb5586c82589ec060b9b29e1ca553d7b9300846cd6
SHA51254615702bcf52113d85cf46e7c1603a35760130557a36ecf28fc36d990ede40b5e5d380c025bbc221ff17fcc5e62a8d35ea8cf1baed5e4b63e43f70c7e8d482e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529136ce55996a783b3cf31ae9c931269
SHA1004454a2646d72682d31dd580070f8f28d007198
SHA256682873e1dccdc5c4ba6f387bf54c02bb5dab1fe93ae453e1e44306004952bb4d
SHA51200a2727fc4c3a819ca7567328443652c3b4b87402e8d1a20fc3c9258d0c05a645010ff79b62bd3ed2095e3313a8696962298d5f46b2ac6ba84811bef1096a374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56917587bf01086730f184c0683c0ed87
SHA1339810871b04bb5a5951f08433f9d41c86757b04
SHA2564686bdfcba77c775bc7a6fc7a5afbdd7602f6917a20b38edca2b8eb8ade2ac0c
SHA5120942a08c2be96752f925b2c44c4ca4f75fe7ff44abf394bca55fe1fbfe3ecb6b769a192d9ac41eecf0686f2484288160d9a6170e413eb06d017e7c38a073db6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd9f326791141cfcb5d25bef24886dd
SHA12d5daa689e79ba126bf85234f0bfe56b137b5eaf
SHA256efefd536cf4b4199b5efbcdf4b2a1b846714571d85a91ad70ffb5cbfabb14fe4
SHA51251d1fb419dd26bf3b821eb20480de6ee97dd38d8ddc7eb3a34f4e019b63bf2857a52a56d3875ddad318d5e2e8711e467b02a82f9c53ba5caaf9459722f18827b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d740ae087f6d7badc261a4e888571e5
SHA12ba3b5e4934035a73f74f156b1080576d9e3d86e
SHA256bd79eb9827a68e835b01cc6bc85f6016377a42bd68e36d15f4b4e1ab2d3f24cd
SHA51257665daa6dbb2aea292d07e84f12fa290b362f67da5d26aaa96b98c5bfc7244fd8ee53f8c7beb36fd868161e4d622a112585c64de16e2a645a22251a973c36f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0037d8a9dd98837721c8816cf8e95df
SHA1092c8301f9e7876eb8408a96429017cd7c03ce5b
SHA2562c4f221a17599a7588fc054f983892ca78c490a3b83154b0874a96024c5a78a0
SHA512dcb5b36181d50612c261d82b85ef5504ae6697244b530dd01ecc2b097dc6b7ca1dc556c2cdcaecd74c5d7572f52908cecfa5596dbcf7dae0d02d23424120c11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9605b8f0313191b9cd1d352e1ec85c
SHA1dc006c691ca63840bcbd9469d0ebc970a1aee97e
SHA256dba5ed79fa22aff6880704c2dd89c52b52ef8e96c35f7e6a740987e1c8947e63
SHA5120f728d581003f1aca9c2922a59e4ba106d8d6ba27c40fcb1883b9b66f9ddef785687f9cc10ae0cd1e7d1d3113b2b956565cde9d7f2f17879f0807ce63cb08540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03d55d4a9dba16c48409b8416259be8
SHA1cb1e9f65f197eccded41dd620a0e9e217bd0046a
SHA2563d49266dc7371be9e4e2af42c46396276735ca343f3db50bbd59777a4c2ca19d
SHA512bc2f970a45862dc8e394a65c3e70eb1562b7453bccee4941fcb053f122724a9a71b55cf7f418f316ff03ed9254eebdd23880f40834ad1d8a5cba1ff959efb27d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b