Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 11:34
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240903-en
General
-
Target
.html
-
Size
43KB
-
MD5
1338caec1542e6c1b0fa016f314000f0
-
SHA1
73054fa59e6161761080189b9475a4bc81736967
-
SHA256
2c8df0f7d5a84fcd1a07f4954a91933f8479e7d3ac664c908ac75830d54a6116
-
SHA512
ebfb3e489c9d13231e29e8dfd8347ceb056a39dfa8e3940208d5e8456a32a9d3acfcfdb4a98154901e443bdba7ffd4128f5021f2621d0ea7cb27d630f42d7628
-
SSDEEP
768:2dBpqhYGMpevT3x8gAts0+L7G9TFXWt7aXfsW9l+X9hJYFnzOMD5QBdxaXfsW9lA:aB8hYGMpevT3x8gAts0+L7G9RC7aXfsp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000500ec1bad367ae4b9a7b7ef006acb24f000000000200000000001066000000010000200000006426e22ffdbb7fa5148c0f47083facb10e6988a31c9bddfc4b5b4027109dc3c7000000000e80000000020000200000005f03c596f5685cdbdeb1ca83752aa1c1bcd1a1bfeb1faa000b2538ab63a5f4b120000000d67f8c8ffb71f94854b1772b618eb34640fc1f441c741f97fe3b831a36e795f340000000d8415e29f0e3bdde650f1122e0252bbed958616a14cfed04574ab4593d26d182bc825d67c129e77c6a1758b6be34f44e5dcfb6ce4e205e18112bd24d3153f1a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17603371-D97E-11EF-B20A-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a61aee8a6ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443793972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2208 1936 iexplore.exe 30 PID 1936 wrote to memory of 2208 1936 iexplore.exe 30 PID 1936 wrote to memory of 2208 1936 iexplore.exe 30 PID 1936 wrote to memory of 2208 1936 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a27582508a40b3e4f4fbf6302a04e2
SHA1968d33983511769dfca7115c6808df6d44778703
SHA256de0554d9ed900d4c8153590e2fd24076f83e8e6ddeaca2b341be68eb62020f9b
SHA5122429718acc9c6c5add349a384854fb93d32fbd9c3af363dce5be850298ffe6ac14e0450c8a637ca75d0ddcf942524b5de159abba756e00240bb18986164f80c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06d9e62e59c375e0d0c9625df31042a
SHA195b11ab5e795ab78550ffb4330f5179a617b45d4
SHA256d99c386abe0853636d0e771f20d3b3546caaf159153ae314b1300a2fa368f9c3
SHA51250beab9b0de787ecde8c5dc44fcdb4b1192b981fb3519ef641f25b575f2522daa11d719d01f3bb8937033b8ec8d6e66c20d0ab1aec69e82ab84ae70a56d73db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501788d3fab95e2fb4e38a94c483f9e7
SHA1beab16ed62f0c5b95605a800879ff9e700c07b16
SHA256a01429e00c281b2d3ea256afb2efafe96eb5531c5bcd3481875aae5c4ef784fa
SHA512bd3c58d06be8cc0f1801a3bbf50eeecab57edf4f30e734742ff4e229b2d8de77f5d8be69a63a9700112f30db78b12b8e0678992dcd1e3ca1dc6f186561df2871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afea398873032c034081aed2706a295a
SHA12a94a159625f7d16724ea0ef017e7aa2ad527ff2
SHA2569161f9334075b8aeebca3e863d2aead73f69020804fb01394131a129b91977d3
SHA512b099f47c4fbda61ad6085fa1e80e71129db813a151f4bc8e77e1f77d1c6b6812603bed1de9eed487660df7117c111919553480ae92ea6ac883f0ec1ea7ec7a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2141b25b83888a373019c4e26450ad
SHA1095a2312ffdb55417d7ed800e9d7ae067b9498f9
SHA256b303ddad9668c8c60f926e6806bc923c5abd1a543baf38934cbd3db37082a37b
SHA51254e07f0604db9eaaf1a8720f38545f274786e8625a48b5f3adb5e0c65473499e216a5c66ab093988732e3a6554b5b58b75fc27f4696fb276d3eb463e7b7c6438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5392fe50944de54230c3246ef284bf0a1
SHA11d619d726d294dcd96bcc41ba50aca3df67aca46
SHA25606101220ba99c29f6412fdc67ba80de8522eb0c4ef1c7d36cc174c1e52878ad8
SHA51297c65ef47ccbfc246e977b627f7787eef87232940820ed975febcbf4fb54ced2b64c6910cf650bdc9d36a90f44388d0b3cf74558d06dfd905079aef2eb2c5b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5717fb319e68b3bddf44aa63d59781328
SHA1dee9812a43c664194da33202b5e9c0ece0754db2
SHA2560fe324eaf26b904f9ebcf628c3ae9cbb5c866ecae9e3ebc760faf58ebf4d65d8
SHA51226fc718cc653f55a2db6970cf2e6fcaa11339350919a7eee519cfd84c36312c83f6ae787f5717b4e81f11accb873824f7890fd065b124c474acc47f1b265755a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923508d83ec097795632b9689a411e68
SHA13b7457de8d960bbbf1475ed2d1e2bca3304a398c
SHA2562fdcb08f7315168020ddb408fbc84535953b1da7242ef10b1168a93dbb45def8
SHA5129ac2fea4ea19f2a493f35730f18e184e75c32667bf5984c079abe6a54d62811d5406b0c8349a9b2ed1fbcaba3710291118a291e426d140428507e7080be0e1b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d8fd7de45ece9b9dfceabdf71a9aa1
SHA11fbdaaa92234164d819cbe873a388e5a9a96fb89
SHA2567706d7fc761a779f049ad696244ce540eb95b703cc6a6569c9e31edca6c2ab15
SHA512815e9e0b1fca4ec06e7fad95277305ba50a0e6baae7ab0f9238d1a0728f4e73dbdb0bc1042079ba7cc2b20ea8f7973111add0a2d3eeb5e1a019707a04de340be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b02428a78073b676036115c5311419
SHA142111836ced03aea64469530edbd0bf1a0a411b2
SHA256e2d719c9bbff9c9a9e8d6e8a3962f8df103307d3b0d82103c3196cbb1aba033c
SHA512106100713286bb277c2e56717e1b29309cde4fd236b4b8524c49e5a6028682f3f589ee6d223556935fffe549e7d9fec2247c6a8c7af35301091cc88c41d853cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ce0a4223fd77546fb47f2a53578266
SHA141e397908ed1244f648fd2c56c7ee4fd613b38b7
SHA256e1077e29209965fd3447d4f87ecb4dac5ad426f63f22d1122583d53652890fc7
SHA5123cada9fe1aec41e1acf06ee07963db4e846c1038a6f0ec4083876bbd884f440ad66c150137448f72c059b05d10fbc7f4a08fcac643faae8bd11a74a68609995b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154e42e5a42a0f372ecd7a1690f13456
SHA176d6864b0b943eaf678e4526a83bcf84679ea1e2
SHA256103c4b2c9811f9bbda6327124cc80f28df593c7e40434cb141fb03ed033d94a3
SHA512eb7b946b09b46e029fa27c751db74405703cbbeec0cdf520e8edb38d93d367954bba20058f50f304ea5f2de6990414ab90b10acb50a1d0a94acb6535d7d6e458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788149d37ddda10d5faed04944efab4f
SHA1b9882690d8f0b13b1ad2b5254e6f826860bdbd7e
SHA2566f0a247fc164f0983a5f4409af044c5c1cbcba46bea887ea01f8d6617d6c0327
SHA51265a88908def26645ff89257168a13d3d6eb95fad6f2768d6f2d1761e8eb69f0be7c62c11457a08b7bbb483c4c343d71bdc0aff1304a72571b5c1db9a35f02d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5582ea4b377bd2485bed4c025619f3fca
SHA140abfbd563b6477dbfc618260da02f6b7e983498
SHA2561e600a98ca5a93a379ef63ad5c4363bd592688cc709e58c1313e4a3bdaa65d48
SHA512e3e050372242a5f71176310647960ffaf3c6bf83cd85d033fe87e82bf5c5479eabd308eb5ef05b2fc1102f7985c614eb9df333babc5c0d373985e99bba43899a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee1c62283f97783fb9cbda9073db94e
SHA19755578e3f01ab83a06220c7f7593242d945edc9
SHA2569867eec37595bf67296e255431816e04c6ae4cabee975128b9cf08406128cde2
SHA512ff5900a119b3edc937adc7d2947955d762e6d63a395598cffe51dd36fd60e6b5533cb79c8f8eb4495289b7468afb495300a6711e830e93d122931895762527cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a67ac672591ec43ddc5f7d67cac5fa3
SHA1129f5be90ebaf00769bca57b91521093ad21ad0c
SHA256f25e6a1ec89dd9c3087c02363f0ac117d647e3b994e875e3bff6a0e35a9b1a79
SHA5128db0ea4b22c67d1353d4816c00645a6a28ef2b42d5700127b504d075bcbd933ff33abe932a63a68d5c055595723b407cba5b36cfbea4b08bd0b58ea6f8155ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce793aa5a6285e24fd561ef28b0b1ed
SHA1d9ac18c7c214255188ed6e2f406ba236f1f7e118
SHA2563c9170b8090d8c0ccc54cdcb5d5d1b241bd0c9aadf90c3234901722e7eb8bd6e
SHA512586f666a75e765f784b62d6a145b2b464d62df132213689f45f2a0fad4f5a65e3599ac7bc07db34922ad44bb3dbdf93fe2964deb0fc081c7f0a0b95384c22dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586083c91fd1c306a27712f28d2c0fd1b
SHA14aac782280e8fc771093ad2a3c0c0b348ee573fe
SHA256b1fec5c2a653ee16b3d06ab7551c8be09934174420452b7472c54184f7bb1e4c
SHA5124a027b82292de4e37f5660a788b54c4459c72212ed6ee80335ca9f60dcb4f874d937b175f6d918349afef8911001b38d7d7eea197b6cf4e55f25d16abab01dfd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b