Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 20:58
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20241007-en
General
-
Target
.html
-
Size
43KB
-
MD5
3cbeccea39d014ec1da7df7c3f0d7dc3
-
SHA1
b91d5a5522982dc9bd41f8bbf0019f27fa7e2677
-
SHA256
e22e66417aa12ce77ad8d12858018e72dea3138e65a3ef5a5e00345347629c49
-
SHA512
e4171b5911c4e4228e2dbbbffa383751b3911fe439412bdf3b20fea61302ae8d97d211edd2a9809bafc7e866380465af22984500022a02aaf4f86d8e42f172d5
-
SSDEEP
768:2dBpqhYGMpevT3x8gAts0+L7G9TFXWt7aXfsW9l+X9hJYFnzOMD5QBdxaXfsW9lf:aB8hYGMpevT3x8gAts0+L7G9RC7aXfs6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eb073c15b7b65b4dbcf0cebc96e69d9a00000000020000000000106600000001000020000000891854023b64b7aa25c9aa6f0cf8fb10af42b7ca977955f7a72621520ab2bf02000000000e8000000002000020000000ee82dc63bb72041763abbd2c9390854498233912a17aee963a95b9963eb7ba4f20000000022bb41fe9c2bd36b41108148ed8be3aba16d1cdd177f182d5b57c12008e0032400000002b80ecf394362af13e430d52163dab37e07033b4a8b914edc55e3aa2f2da9de144fed5943e32e6b3e0e719662b5fbbaa0e4d631ea57d11c5ecbea7262d3ec929 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71949271-DCF1-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4072734cfe70db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444173369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1228 iexplore.exe 1228 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2740 1228 iexplore.exe 30 PID 1228 wrote to memory of 2740 1228 iexplore.exe 30 PID 1228 wrote to memory of 2740 1228 iexplore.exe 30 PID 1228 wrote to memory of 2740 1228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52242bf7c65d15b948a5cd2603fe19f32
SHA1341d782490dbc981e0cc56e7e31171653ea710f1
SHA256ed546f8be849f35aa5dbf4cf3fdb8f5b5d23777542439ce39ecc295cb1cc5c3c
SHA512d2b4d7dbb91fde515f3fb4bd01519019981cf204bfe47667e64d405ba7e2e62d28cf73029c43517a4f3ecf4adccf6db8a2304522823e830ccb4840d04339b284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcdf8eca2735206b18dfd6b6e1d9d8c
SHA146f747b2c59f38c2c9b2b2b3e246a487fe894046
SHA256991955a24a42ca6f82062237b4665ae8cc9f26ba3cd3539f87a7aa280e73110d
SHA512a4ef66d85d0cf49c97a7f34131727a70c6b1618d8cd15e9e96b4b9eee3740395d179c374e27f9a1b09dc4fa85bfee35b644a463915c137ab2be649ecc3363a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f132c1dad1c6ea27cf63be72d9a5d80
SHA1fffc8eb36bb51df0ba02d0a1b72335f55bd2eb65
SHA256832720e575e533625aa91273163048d76d69647de8f4c9109b984f2d4b6df1ab
SHA5126f5fbb15e076ab4aa14a1bc27f31ae2ea4eff02eef9d42d16b770b1831bb1d3394ae07c2a815cd4f503f84c90c563bde1432323b11febeadadd9596f6a4196a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2989a7d0bc453270769962f72f8379
SHA1024d3510fd6a3a37d8c3c228fa5bb7e6c3f7b375
SHA256bf0ab3a94be56e95dbb6537441e0878107a044687553544ca36ddeffbd5952d6
SHA512a0269db3c061a4682307103eb89975947dc7ce28fed5b77cc1b829c500f4ef27c8c15b8a030355a6585c96b15a43006dec8a9334ca81c5eff598726b660d383d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b7e482e83fb97f1a317ec8fed049f4
SHA140b7c00105a4d56b1493aa332c9167c1e0628de0
SHA256079625b7f1e199a02972d632dbff7f07ceb116b5ab6ea2e33cfc575f2e6ed842
SHA512eb8af3578a4340288acdd06dac99591e6505db7a2ea19e1b8d4fec10b13bd2efe0c84d6a9ab058c51185833f1cf5787dac1f54f488e2dfd2eaebc02d476134be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5716e19af4e4ce27d94dc9a0c24ceec62
SHA1be8ba8a54a7ca4731050c33eec6f4c26835eaf53
SHA2568384b5ea124d1f818b0b51141ea622ffd596a49c2070ac0cb86e198cbbcc88b0
SHA5125900b276800891c76040a852c2079813c7c520e8b9910a4d64a77a5445fb2469ec466a14d4d88f6688b15fa55b87e6f35b6e3cec48fe41506e0314438260d597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c25351eb8b30cb2b61c7dbd4b571840
SHA11d87bec7be630c0543fc5000b0cbc7ad4ab10e9d
SHA256d2c4d3f79693fdbb89623633d2987647f3cd1cfe624ecfe5e7885a8d6c56ec44
SHA512caaa129bbe3c8b109f632d65b7aa93efe692194f1de88e95483a5a1a864ded08cff2e5c8f4fe38943eda6f5f524cfef8651ccb8e2f5ad952731a334c9f3c8b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e89f326c498db7a28c82616449ea3ef
SHA1a22851d087c9cbe5029b88f07eebf620a271176e
SHA2560e3579ed50ad1d07d82351900d51a1fa9ab2c1498c211e247385cb29c19c451b
SHA512bf474cd069a35394b0b255c7e83216b2560bb6e262db6d5f70d98139dc10876e2fe5a43d31a380e50ec3ccbb352966d5607855e73ad8fd1a1d42eda693e1dbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0cf3c23dbcdd3ac9bc8b405857e119
SHA1d3e1e0b7e0b8e0c809eccab32c5a87ff87797114
SHA256c3b3998e1ed7fe8e66dc58fd9e3b96c9e6f12c8f466d151110bae37e5c46a0a4
SHA5122a95e5d4aaaa90faf3354b927fda7d93e093c7bcb47b2702ecc37cab5f7625039dc18680c57ac3fecde529505259679c6de05e2777e5403da3574cf484706b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698caec6fb4088f57443c846b8b1ee51
SHA1103f8077969908fbf706a9c68213e04dfa495abf
SHA256791640699d6aa40144e7fb847fba0e8f7c362c0f98d247b895ad61f5fd3a9d32
SHA512e9aad1104e4fcfc831f51879dbc0c9f494e89e5e748e29855f55dc153ceddd8fc123f8d1490621cce75f775fdd2f845942bf808f22fd0a4944d4c86936bdc3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fffadf0e02f285aca481e51a8421193a
SHA11f5480c2676768f5e60af1b2e63a8ca49b67bb0a
SHA2562fb53c6af5f9e16e1236ad2b75acd98b17c46ba9db971a6635946a776ec67efc
SHA512d2932ef10a4aebd3ea6370b0343dffdc5166898c2ab6782e40de407d53b20e0b5c877c095e9146d3b335ad806931266527240a853d6a9ad1d361914fb628591d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00a030c0d05324e77b7641cf90fd5b4
SHA11c6036df15df350c0c5fbe9e95fc50ca79bc7b4a
SHA256d039d718b8ca0ede42377dc98a12ad75bc219a0b707bcc277264e2e626eacbdc
SHA512761646d97af9c0ab97ad83d3288956adfff9d6b339e9b121dc2314714056ed29cd191adf76ae89c3a193e723a62e02cd851d3a29887fa01b1076b6a8aae07158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541696551b853fbbfe540352ba83b60a8
SHA1562255c7111a38276362895f6c0871d4c5c2af03
SHA25627f737ce4ac458680c593fe6863bba3afc2a3c68a3e121ba31bc652c6e5ef194
SHA5129aa7800411002e996534183fae96761637f8805bf47974e09cd0881c4b9c2b85770f8b84a09ae432ac7f17985f66af4fa4b805da25c709a35d0f6a20b38d1b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530356d13f79ce3e80a49d5d29d422d50
SHA126e5e3749fb91498313635b659a163408843fd4a
SHA2567730e0b96f72d4fa07b267b714072e10c0536db55674bdb37bed9b31937bf294
SHA51211736ba7faade2a6ff521a16e035aefd468f0509f8d6bbcc3d28704d75305d4137135a4fcde592bc838e632d83bb76f420a2583298c040663b8a7ef12e0a543d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1d24d5f26d91efb5f864557cfca3fb
SHA161c1d3865cca2c0c1fbdb726d3f0c1030ab65359
SHA2564e6ce2cd3a92f42231d50db52c02e8de6bfb2b2b95c0707214ebeaa4cabad943
SHA5120fe70d3e2699ac6d90394d5628f21ffb26e8651a62d0a7d7f881a78e955a2e188147964d5092ae67c3d4d5b9795b0f62b07df2c9d0397b351dadfe97a1c00272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8096211da5e1eaef42fc6f045e08694
SHA1ad9965768c7c6e42e9f293c3cd3fa083991741fc
SHA2565ae84c178244adc957ff155e7ca74f24aba7943ce1ea589c65becbdb3ac22272
SHA512197cbcd024d487ee65c3faef6919fcf837319e20ba7ecf75e810c99cae211bcaa5302b4ac2ebe92f6e015c42ccafeb39510a1dda24656ec3d7967c08b45306ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee292a0d17d8d1e432527235e9308c28
SHA1e7acf2bc87b61a6443efbdba001988437425a406
SHA256314875628afbc31247feb52ead41d19284a834b0fa82914c25c33990b18979e3
SHA512a181192e36733ea64172b37f5c8645ddd21b5e023d60c21f971164e3111cd6308c499254737379d26df0a90322c1f44d5efb8db11f6879a2bf33474111eb0076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab9453f4d24c6fa96e6e098416e680e
SHA1dc05c7ee02d572e063d9013587d4ec263a0fd904
SHA256e273b15b87c9b615d261fa245415176674d16d5979d20d5db255065feffea03c
SHA51241a8e433c8bc413fc40edd2a204da6e9748297465dbf5620fb03386089c0330152241c947a94f6b4c8f2ea8fd2a5c5b42a6ddc0c71948402c54a2286fbf3c740
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b