Resubmissions
12-02-2025 14:54
250212-r9zgwswmej 1012-02-2025 14:27
250212-rsdtvsvqet 1012-02-2025 14:17
250212-rl7hlavngy 1012-02-2025 13:47
250212-q3q2hatqes 1012-02-2025 13:43
250212-q1d9xstlap 1011-02-2025 01:03
250211-behmwstpdv 10Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 14:27
Static task
static1
Behavioral task
behavioral1
Sample
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
Resource
win10v2004-20250211-en
General
-
Target
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
-
Size
8.5MB
-
MD5
2d690d32e637c43a18aa8f4f2fd28e48
-
SHA1
f8a5f75a34d2751c0e7195cd4adabddc1ece465e
-
SHA256
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
-
SHA512
2641192c4ebb0a66fdf6a9be16ccfc38a4cd98a32467d5b6e719c73b2893a28888b7c9c77d3db3a0d2e93d14408081bdc92238dc3a5b1479229843f354c7305e
-
SSDEEP
196608:exCyu9hdCjcHsm2gTEE/OBBZVaMKb0QqNnJi6lWzVYK5P6qwpxFlWavvy7:ervy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fb6d8f5a7ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAD05601-E94D-11EF-9AA4-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000820362d76e03804487de69388c30e2e300000000020000000000106600000001000020000000b060cc76ea96d4dedb325ad798a10da948219d1dcf6a7a8050c5b032e84cd348000000000e8000000002000020000000a564e89faf31e5f6f917e600bc0ed0ab0ab8a69d95b81b4042a64a8e0672023820000000de1a9ca229629195ee6ba1073c340ba339a15d03d5e9c3a9b5362c68d31facbf400000007f176dea03ddc3cf79c2767eca27568ff3b3c96e335af9da54840e822614898c463aabe2626ec28470346de8519979d9505d88b14d43d450600bb9369f366a4a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2356 2680 iexplore.exe 34 PID 2680 wrote to memory of 2356 2680 iexplore.exe 34 PID 2680 wrote to memory of 2356 2680 iexplore.exe 34 PID 2680 wrote to memory of 2356 2680 iexplore.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e91⤵PID:2300
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UnpublishUnlock.mhtml1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf4554cf62dc2cdadd327e69771c727
SHA1a72c49f61bef9503ee503311114c0d7f02f47901
SHA2568a0cc60645d7452d3f80296867ee198522e89ed42cc36ee4974c9dcb1a5ddcec
SHA512024720d31fc8f87afcd6e00d9d4ecf3dc1fcf588df2d15fb9f9238425b563c9bdcdc18a4219132c7b7ed52433c567afb60aef3aa8e6aa9fa4a663a0c9aa79414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471bf18c06b6eaf4fbe4c830f1b28f4c
SHA173b4e58bef544ce0a638df421f364cdd4a2436ee
SHA2569df18b6e7b43a428ba23779b9e46f8173c7b8ca90a93e15d00437b4a8ec09f52
SHA5123f59bc0dddcd197fd12a0bee207db27e1a5055fc6cddb4d69f528da18d7cc79b904b2f7dc25b808d536ca228f4b2918a6ed223cd59368425f5a48cd4cf500e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e036ab7e05bd2d29a75e7879178486c
SHA1832dbed05310d39726f6072075c70f8f4fa234a8
SHA256b24e6951668b2cf498a7807f9ee6afd819a16638545c68c038d0705826f82c87
SHA512cadac1c9efe9cac8a7ec68ee7589cf6626a00586cb6359d07c145e3d2525685a86971ca12dd6df37eba5bbe5146887517adaf8d63d9833d91f7c89f0de896cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf963bca94be94f203794626d6e9b69c
SHA1132ecaf9aeb89d101f67dbe0539aaf4dae1e4bd4
SHA256ccffb4005e3880340161e67a4f208ebf33603ed14e83f965033a9d7a494624e4
SHA51254b94727b9d4b497c3177be8e292a6ca9d51185f6bfd727e0fec8703bdf95b9d6de8dac75f616e5ececbbe69b565c14048969aafcaa94e0a5b54fe9d439dc7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58389024889b0675f4d9a212f782411af
SHA1a7bd8b0c61b99a7cab20b3862a537a93f053ce96
SHA256b9d93e681f00828d6418ee5a942ac230cc3bcd1f363a702b141929ee24db01fb
SHA5120ff22831bfb5c25a0b66618f922cb4448cda3b4a7620baf88a3563bf1df9dbaae0cec22b9e40107086e62a631cfa1f12c57082d0131facdafdb7a7a9d1176301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c51e142209213d9df252d433a22f19f
SHA18fdf8854bd91ec0f2fa877f8aa4aa8e5f4397f71
SHA2564e95c6b268be97bc537ffd6f6d186a53844b75539faa92ccab4d977d98291b2d
SHA5121ad4ec36135cf0496fa385dbb6333e3d15cf0fa80110fa4ea06b1268bb71ad68b2488d66b3b7ec605a01f1d4acced237f17ddfc20b3b53121959df228891323b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2870a7d78956179dee84cef18140a1c
SHA1892e2a943734cee888467ce179f1ddd9f78661b1
SHA256d6bfafa3ea054ba29529f66cea943472af8124d96e3e4fa33669ba914bde6d03
SHA5121f75c275fb8a7d24f35b206d47856c06d4b56e4b497096b2da7f960c285a8f219256586df2959ef4b87f3aa2286b805ef98d7337a54833ed5390bf4b732d0e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced6d429644f9f3d3c29c60c0ab13cad
SHA19abcbdfd3d8bace4dfb99c9b66d778d50d9ccd07
SHA25630ab76d6cc04ec90ebd953920be8c2a86f071dd6d5a17bbddb9c470320206b1b
SHA5121886f8d7bd6dc3d2876373168d6d00be85b5504526b54111995549980962704affbe2ec7cfe9369cd7c6d81f0da83c9c8a49f214f3582bb80771b86f75afa26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec01fc2fe6850a144b07c5c59652d732
SHA1e376d3618d29c9a03af6c9b983cbd175671750f1
SHA2564b9332606b014e457012cdfa619ab9bb7bdef0cf9249914df9a5ad00986a0952
SHA51209c5bc5fd40045c427ffbd84d6dfe1ad5439e13755c732d915038fff7d2de87b33d3b3f99b3d156cfe4ca7599b86dd67c086549a2581611eeb3735bf9e650cd8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b