Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 16:17
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
General
-
Target
sample.html
-
Size
40KB
-
MD5
e1032b9ef243c26ac1ff49f3f060f8ef
-
SHA1
b612b462d42fdf00a59d4dc1c3d9cadc5e146fe2
-
SHA256
644a0d92bf5fe0d0ee01b56b89fd2ffff347558f0e3d7a1690587f0b3209c2f4
-
SHA512
11f84305c3f4dba60bf44446fd9685c982446a9a8f72b8326cf2dea76f5d00c213a69e881c9a341a0c65cf1a5d5323fe424297bde7ea35dc2315a1ff838b3f7b
-
SSDEEP
768:jAXHyc4Pp8pRNVyOzaRChZEK9DMtrEdc2Vm5ENW:jAXmBUDMtMrV/U
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06fd32ee96cdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3abbd249d01e441a43ce6f8c27015fe00000000020000000000106600000001000020000000be0e0f1b4bbd8ca6991e82f73f6c1f58723459c69104f87f512b690b31ab62ce000000000e80000000020000200000002147228d57f288e61a1d037c9e4b095562f8db37e9c56d9e88cb45dde5652bd920000000284965da560fb0bd6d686db2e26c03ba311ca1a24e52bb069ce8371ab2fba9bf40000000c7aa76b8f19688e4335e87c7ec7076feece47a865b80861b134864d71283de952193b679b84c5e61b7d73eb2cc85202e2110ee4b567cbbd475285d0fed14dade iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A6C0C91-D8DC-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443724507" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2464 1804 iexplore.exe 30 PID 1804 wrote to memory of 2464 1804 iexplore.exe 30 PID 1804 wrote to memory of 2464 1804 iexplore.exe 30 PID 1804 wrote to memory of 2464 1804 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53516fbf8abc15159fc400d7713d8fdac
SHA16ca812ed90bb29b2404abf717cddf4934a9b518c
SHA25680ade75f40c98389a803a8a187f87745f0301365f52a28a1e3b33981e6b8ab59
SHA512dbb17f56c20c8f704b7c6a67053ca669f858e028020eae5ecf1cefd542b4d531e26058811e5557dcd4ca793d644e3bbf44d17c9ecef736b36806d7b8d050e5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524378fd332a10d82a789bac4793905c8
SHA1e0b756c1e28b6d8ccb3dddbf4088b5fa8440a6b5
SHA256049a5dfbdb9de9f341bf2ad3a87a13154a41d915c2fec44b7f4d226eae9e638f
SHA512c775346b9cc680821cb32a01529dab05a3f4e8867e20a1e9794b58111090823b86ce874d32a53f110fed054d6fe942dfc67cea0fcfbf59a04324f372261744d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2556154c802ae32bd1164cd2b20e1fb
SHA10195a16a403f21ad5a387073162803dda9aa593a
SHA256b0b2d9f75198c7acc2697a52c5ae3cf678a1190ca80cf218e287b1c62ca1002e
SHA512415b66119273ebf209d16a8783ce62ba39a74848f70536067bad4b8fc4c6d3ea829e375e7fceb2eee00614354aa72e5f67707d347330c3aaa1a073f9b90bb106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac74bec72c41f32624592ef342886b70
SHA1f14f105e5f43affc48c61daa5d9f8222a1b7eb48
SHA256613a3e41f91faa07293769f5676f532277a7dc2f39042d00b45b1a850a7b9cd0
SHA512bc908e29085ea8bf53bb12c985eeaa1e6a6a3914ae921dfb8962a1442e979ca7b610a93405bbd6cd0d0d43f5542651db46fcc28f664a5d040485c06ce6850989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888cd135eb09cb83d9a22522c2bc6019
SHA1704df1c5fd92786e76160210694b50dd9ebc647f
SHA256471f1a9dd1174abff8b905d9c4b2811240b4a47438a7c6c45575a63b5e8520e0
SHA5120da7da975b89c450d87b244e3ae4cc2b5fac96a07efd15fc8a3cdc3f01a299f94e75692c35cb5097a99a7f69f888b8529cd127c92ae1bfe3fa30c83ef8f0eb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4336ce81ca66dbd1bdc07a6f16fc3d
SHA1f6eca4c520cf86b7ea46c895277d2e672c4249d9
SHA256a24a3875d0ec3d8364b878b623f3b0a8451d1177abc841d1a8c1fac5730b06b1
SHA512cb14d0b19646a5297976dbc8a9987dab40d3beb9b841d466505afcf916fac13cdfa720d042c828a563e9feb584cd4c332c6206d79094901f1a28ee5a0f4a412d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b22b48b2f88f832ceb8135022961123
SHA1c81c71cd31fe9ab318fb05929477169a81c9fadf
SHA256a2204c701dfef5995930681b1d822a00c3639578c2fb21de7df5e7dba7c1aa7d
SHA512bb64a69c4877b85c5f0cf344247f6bebb5bcd2a776764d64b1cf3307e620860535af2b7f70ee4a35b2d67527de99515bcb7c22f582d8c762926781c685e1d6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa696bea2a64d6cbb85f3b75058c03b
SHA17a2eb960f3b39ba136352529bcbb734a8e0fc297
SHA256e3be26700ca2772b343d28c6c11c65b4cbaab9cf84755cdea5e156b6248f732e
SHA512848632cb6b02ec48cea3b82c2ab37ba62f7f5bd4ebfdb0db0653a743f3eb6256bb8f25aa52375de4f0571f68015d9887a0c031f9adf0cf40ccdb02d2bc68c6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c1055dd27011a793f3336e8b30b929
SHA1c83c6d744b8b45518bde3aea29a1899bb83bc046
SHA2562a73e926cda826ad91424ec900b744c544879eddff257f4d9961992189101afa
SHA512ab772b971667dd1fa004329b5309c85ddf58a62d735b53f2661068ea7d6458923549b300b6f3fb8171c350b73761bb3d0711ba84e3d0ee5c9391186823b96601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b979c871190491ecd00a84765ef4be83
SHA1684735ced9f5bbcda59137d8af326b551e865f8c
SHA25607f9ef8b55a73adb31b1dfa30d9da8c760c67e7a57ce6c358e93a8c922611ed4
SHA512b936766ca0d64223d6e226f695f637d6b5cb6db496f5836e344e924fe09a32cb03dc76f5ee88492381d73534d142b6379e958860f310baafebf82db7c0c74154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab74621cd292fa5f5af77dcd29de9be2
SHA16e5beeeba503a9e3090bf4259f7fe31a73ae0ec7
SHA256206cf35985276d13611c1a135fdf3ce650516352eb147af3f8260991ba3f2b8d
SHA512f61f5854c906cd0034a56be49f32e082186987c01b4951631767ac8eb812f995f0f4c231736ce5081058526c7bac9783f242e8e7f87f68aab89f324af9e7e055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f02a685c3b4602ca44d55426fd735e7
SHA1c650f69ce9ccfcdf458797e362a84dcbdeae6374
SHA25613e4b36041c372ca974fc8da555d5b90b163eb1c0b62f6458369bc06564992bf
SHA512ab40f34e5db1cff793426e04b138ee586cbac58acbe9bf28682c1955226019a67a9d67441472464a2b682e128b84d01bf87835a25d7440d7eac8285814eff7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b702444457994789772233431d5baa3e
SHA1f6e869873e15ac8b803f0374e1f6fea9041d4d63
SHA256f55bc89eff44a1b56a4bf64021ebe0c483887508f7a2266515ba3fad9597559e
SHA512ba087c06980e76d5b49fbf8fae9b579e9612ab34a1e1a7e98369399d0a644f8031b1e161aa60b68abed16dfdad601a85299f6f096e0db4dd75076a930b6e2bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a076dceb9d6ab85bc254f5c05b75a949
SHA1721ef7acbacf6387932cdcfe721df5b3d95f81c7
SHA2568f50cdd3bfa28cb840a14d0ded523591431089817ada7ec20ff6f62b5393f21a
SHA51225944192b569a14d862eb9bb926c20f76326c21de7a85b711a1f400028aefdb1daa07c78caf63e68d295bc44484f814bbe6a6575fce6cfa1ca15e1804dbbc955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098b113140c454d399a153369ed3b852
SHA1f22ec816071eab6c8e65a65d8707b3ddb1bb26f9
SHA25638c391c0ac43a21f4591bf5327f5a04db8c2d3936f5ce2324c85982e9b5deb2d
SHA51289ea88adc4e0c74ea04c0c8d5442d0dbe171f452e2a24d6417a5ff98d603c4d4f0f06b068ff937cf2b394e4616ef6123029acd14527d004ea5cf11859f9c79be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95af558449f6b010e9ee3971b4bb73e
SHA1097ba56e0602b464b117b1b6f944d446026a5345
SHA2561a6839f6a366e637b74e4310f139e6c6e8c4992b1612684dd7805bdee360b729
SHA512413d5402a0c52fd28d911c54395d0fe4dc1f147827545a3e3cf0c4cc9f80318664f5e40663d53e9e697ff1dd2754bbcd976d5c6b49e8c9b72c029450d31483b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692d7a717d29238aacdbb3726dc51a05
SHA1a36f6db70450357e7b40dad63d3c48789ab3ddc2
SHA25634a9c369a55fb1001f03426f3f66a404d8d99b1a8865ff87111e99d1a5204ca5
SHA512d6c47bf90bbcd554d80ed2c01a7666dd9b5b1134f0b97f6990820fe5c3804adafe5ef4875f07aaec314001c752c3cb5313db49756c03c7de910b927284f5cc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f528401f77e8bcda4dd1011dbdab0186
SHA12e65be4fbfbbfcfdfabccc3206250f9f3d6d5c42
SHA25620e3ccd51abe3d6387763093ac36373099592ff816bcb0da44ed78ecb0170d09
SHA5121ae08f8ba84a50cacdb401be2eabce5360081474e39c2b743f6e1d4e4a6f7352bd094cd7508d27db2c6e821720940b8e2256627c950629b18c972a9e4a42f5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a616b79505255ef30d43ae85d3d02d
SHA14be103f6a12980158129cd6164bb9dc432236fdc
SHA256b75441d3fcf0ca201f63252ebb8486fa9febcc366b8a46c5a2964fc3d1bf5dd0
SHA51266b2b44f02540c0a38aa7c2cf2c2a2cfa3c8b1a195ed5086353397bde58e148bae8e723934291b3aeeae63280af507710a22e8af92be4fe4336c94b42a6eb458
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b