Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 11:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/7IJpIQ
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
https://u.to/7IJpIQ
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
https://u.to/7IJpIQ
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
https://u.to/7IJpIQ
Resource
win11-20241023-en
General
-
Target
https://u.to/7IJpIQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37E61661-D97D-11EF-B81F-6A951C293183} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443793597" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc216ca110835149aaffab2df7f0646d00000000020000000000106600000001000020000000195c9e73123dfd8909e896bd871900c85fcb62f6829c07cfd75e5f8bdb5f55a1000000000e8000000002000020000000c565a5b23fb70c69609786f6aeaf37f878c5bc1cfc28785221fdf939fb77b74f200000007b4047c0ca61a54e3afce25eb3618316fccb33cb5ab75d5cae94158baa119d99400000001930ddc74c6a65c15dcaa09df8954c39cebd27d20527a6c46cef94f8394ff7807d99873502f24fd045df8178725b818e144bc754371abf64d3bfa24f00bad51a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906b1c278a6ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2680 2076 iexplore.exe 30 PID 2076 wrote to memory of 2680 2076 iexplore.exe 30 PID 2076 wrote to memory of 2680 2076 iexplore.exe 30 PID 2076 wrote to memory of 2680 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://u.to/7IJpIQ1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac69ad23347f541026131bcc75532fb4
SHA13d1cea386cc19532c0910dff691d6eac52dab1a1
SHA2563e6c5112fe455d4ef9869494f1f923f0a0984ef59b3d1feaf1dacaeb9b6e8997
SHA5128dcfbcd8a86a477917bf5fdb801462c01666f61e4749b03022d8638b32097f1fcb048dd57f0dcd5ab6499eb5861a352915e82add586790f580a3a2e085d129ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5189e1b8294bfe83c203c0584b8c80
SHA1fc4650192e7181c3d54e9741ba74174b91b5cacd
SHA25667cdd86121b3f214711847dd094b2689c1bba019280d83a845864c7e9789f066
SHA5120709e505e46c67a2bd491edc25faf40c4f19001a47de5cc75e1aa09adf241d56ec444747c3cb1f7ca86f0637d7c079631c5170d7c7c45b4e4895c915189f0e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c0d0066624bea1064e7a9046358ed0
SHA1a951ccad3e960142e04a1f21d9278d2839d6bb8f
SHA25620cb04af69fcef113405f855ea2c42050d54fc0263a567cf669b3bc8ee1e92e5
SHA5125c6c4f3410d2d910d15b0c2a861824b737a23afa9f26d3cd0b8d7cd44518f8ae920c55ce749da83230faecb822b79153c099193c5f81c888ca97e324d8fb66e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f811848db0d702af8e29f0164c235e
SHA10984ee53cbb667c83520e262ac5b57b8f149f825
SHA2565342184b9931ba2c7daeb6444063802f1182c525a7ca14286d645f1f826f5a16
SHA512d3aa8937a5048ecf8816c70dd2c83de42e957a3681244ca8a0f534d3909473093ee67fb5bc3f25370e92c6f325a787e5e9b5458c79cfca32b547687c659099fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36158168b292cb27179006e25384973
SHA1441cd965bfd57cb8dc581f6a6eef588ece137138
SHA256485c15cfcd0b34ae4f985892d4de9e55f13dc2b8a738e1778dce563ab8f7c78b
SHA51211e03f6e732470432abd067d755e1ff1cb693c6fb1a92c37709e0f0afb6c4566b0efc5dbff31181aaf1e6d569dd0382408b2d7408fd7152dd070f4900e3ae457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa48e4eb371da8ae2245e8ce2450447a
SHA15020b438a92b99ad9e21a041137617bbbc09295c
SHA2563d541bbddd7e4cc9c5fe73bb88fd11fe64ad141f623251ce48fd9d231beb4407
SHA512f8a418f3f612649c3a6bb20f0ae7a72b07db9e456ec4ed37ce21e1a8b9cbf12b4ddd45673b3d9ff13fb2252b40a138aef2d51b4b6f31357ea3806ba2291195c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b1ff5a9fb04ff3cc7d3c541b3caa106
SHA114fb696ae579aab9bf384dded6b62bb02588d37a
SHA2564e50ab3623551acf72516f0d70b6cdcc378a3c7f1fc336b844c3d5f956951f3b
SHA512e4d07bae1c366d925d7aaa76912dc0f95905d5f8c54132fe056bd9aa7933a0cf4de4d354c9cf9ff573c2fa485ffe041d9b6885c5a26106f54af2462bf250c2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56622debd9b035ca847e1f137a2cb81dc
SHA14cc87056c39cb07e24c7e2e084d67ab14a6373e6
SHA2560b51ebfa023071992774de125d52b3291af0d8e6a0d6cce8c779c46da7d19615
SHA51260fdae5a517a22780c24be652d9b5f4b721b94a1c7d24c9c8da20884a829dad3b5d919988190151e96c9bac169a6a929fbf38bcefc0a9d51d113b435e568a74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2e0442918872303e2f27814a78bd37
SHA1171856e80ba5cc1f091b94095021e4dafde5d829
SHA256bdc6a02d288217290339c1005fdfb4e03bfa756b5d70d322b62bd2c5157e6e83
SHA512c837f5ccdd8a6a6d7826f941978d4b998147e41c1a99e6655edaa474ddf5cf205b1d2522afb138d68aa052b557a4d5a53cf2770ae29cecc0230f12f53bdcfad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551db0b071605ae522fca0754d8b5ffe7
SHA1fd4d1f1d5015607bdd5e768708c4fae7fdad75cc
SHA256e75c28af9421896153aecce865754b0d1c00dd60632fe69284b362549ef6b782
SHA512335632b596cec7988e65f93420e7c3a906dbea8b4d897af451cd92c1508b2fe8ffae8f31d4bac333ab0247a83c3c3a6faf8172be11dab95eb16103e5aeb4ce7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e365244496204f0cab604087ba3892
SHA140160c2685cc01711e8c799db8fc8f8209855045
SHA2563800585d5c964381105625c40b296e33a2302f129d4a246f896612d4bc5865bf
SHA51238b7953d7024a8231d72e6c816fdf66060c9997d6e618003e5a48aff917952c0c87f725ea58e35b0d7fc9482d4646630cf9c25e90d75393d0e021ffa5a605c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5ccdebd618a0a104d8f2398b9590bc
SHA1131f92b216158b5f9825fa2d9fb3b6076ca0027b
SHA256c01481ba54febf351c022229bb52b65ba51dda733c7b39865d4928e641244c9e
SHA512b407a35fa5fc95d667a2ccd0357c07ab575a4576ef7fc941971cf310cfce086976fb027b3fafa12dc821d19b4bebf87b481c747169eaa69c93d66ac900fdf56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ac9af199bfddd136ce05c575afccf4
SHA1a9be03a6111933efb94f4289c4f3474bb5d6f9b6
SHA256e588aaca62dd80b826a7685fe3d9e34e04436f274884dc861d0c69d09a0bb844
SHA51244e313b1950c7af429d54ff4636920910de02577f83941cbecfc81177448c9a1232d4ccb76b3ca6f029158c804b924e54989573bb89115834ff5312777108080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476bb8acaa903ff0ce923a742b9e9b39
SHA1e86b2c185c31fb43c0d06aa41a0317b765e49865
SHA256e2159f7337861973382f2e672ce47b65a910570927b626df71f5c700793a3432
SHA5123c5003de7e6bd45685262ffb47dc6ce0320924286e2402624087d5a41f8268497ed3e55ff8446eb60e3cbdbc351a4feb51df0645c55fc8f0586dbd5aba1259ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2c000da15c42bd57bb98daca8435d5
SHA19a6ccfffb27d6d870a073f80f9999d8d50187633
SHA2569d9b2c7f3146ae261ab6fd567ae7f1ce05c6f4398f7cd457bcbf32b73a647dd7
SHA512f6c98ec6ca1072632ca6ecd859f5a897371665f40bc4f535cd195de610cf7effd419496f879583d05ef26aea6fd206f3f8eb14236780b873808b18f6dbb97b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd084bb9e4f1bbf7a0a85517c6706ee
SHA147bc9b17fdf865732a76db73f675bc73616a6717
SHA25669c423963bd772369148691ef51f1efade4449af294bc31e4cf783f80f669360
SHA512a9ab0b8af8a030404b5a138ce3c0fed7fc52b36a0b84f702aa1b2d9881c23f79932bafe24aaf955c999a53155e230cac06eda1e856a92da2ea674870cae6bf00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c056d271acacbfcd9b49afe0600468ba
SHA122b12c94f4ba4190817bb7f5fac4ac65701b83f9
SHA25614476260980d7dcd1c432aeb46f93dce165109ed7b6ad8e2bd4f1466b8d620d7
SHA512b15c1b9e5974a32df871d16f2c5dc672d1890c5d4369278a453b172386c196d6a81836c11314f92283a78bdd361b0205f297c9a2ec75cef8d1326a0753391d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f65981c0a6682d2876abc338095520d
SHA1fd633a9b22f25540821b881911f326efc9f1709f
SHA256e2a8b7b4a14962cce3e58a22628110559eff68160c46872d5cd2e857911b660b
SHA51287b439942ac196be7fb61ebc7ebc1f107af1dad5a6d5ff0b026d46b904aa144f5885f9a126e0f02193d87e21dfb774be21e25da3da87d994352ce179924d5a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce5c4f69709099586455265a8796f62
SHA1faeb7543b0dad26281251adffa71fd28ec63c34b
SHA256dd19e6d0bdcf6f0b2b8aade703b09b2723d23d9bf9ede1ca7cc7df6b66279ee6
SHA512f2de128214a4edec06dbabddbdda8ca63cf8dc817b5ea9c639ed0f565d56b02de0a351ee3dde097a724347973116e85c055cbc19871e83775aecccd8ce9fbdd0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b