Overview
overview
10Static
static
3AudioCapture.dll
windows7-x64
3AudioCapture.dll
windows10-2004-x64
6HTCTL32.dll
windows7-x64
3HTCTL32.dll
windows10-2004-x64
8KBDTAM99.dll
windows10-2004-x64
8PCICHEK.dll
windows7-x64
3PCICHEK.dll
windows10-2004-x64
6PCICL32.dll
windows7-x64
3PCICL32.dll
windows10-2004-x64
8TsUsbRedir...on.dll
windows10-2004-x64
8WiaExtensi...64.dll
windows10-2004-x64
8client32.exe
windows7-x64
10client32.exe
windows10-2004-x64
10comcat.dll
windows10-2004-x64
8getuname.dll
windows10-2004-x64
8ifsutilx.dll
windows10-2004-x64
8manual/manual.htm
windows7-x64
3manual/manual.htm
windows10-2004-x64
8mprext.dll
windows10-2004-x64
8msidle.dll
windows10-2004-x64
8msidntld.dll
windows10-2004-x64
8msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
8neth.dll
windows10-2004-x64
3netmsg.dll
windows10-2004-x64
8panmap.dll
windows10-2004-x64
8pcicapi.dll
windows7-x64
3pcicapi.dll
windows10-2004-x64
6prflbmsg.dll
windows10-2004-x64
8provdiagnostics.dll
windows10-2004-x64
8remcmdstub.exe
windows7-x64
3remcmdstub.exe
windows10-2004-x64
6Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 15:16
Static task
static1
Behavioral task
behavioral1
Sample
AudioCapture.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AudioCapture.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
HTCTL32.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
HTCTL32.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
KBDTAM99.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral6
Sample
PCICHEK.dll
Resource
win7-20241023-en
Behavioral task
behavioral7
Sample
PCICHEK.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral8
Sample
PCICL32.dll
Resource
win7-20241010-en
Behavioral task
behavioral9
Sample
PCICL32.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral10
Sample
TsUsbRedirectionGroupPolicyExtension.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral11
Sample
WiaExtensionHost64.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral12
Sample
client32.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
client32.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral14
Sample
comcat.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
getuname.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral16
Sample
ifsutilx.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
manual/manual.htm
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
manual/manual.htm
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
mprext.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral20
Sample
msidle.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral21
Sample
msidntld.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral22
Sample
msvcr100.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
msvcr100.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral24
Sample
neth.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral25
Sample
netmsg.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral26
Sample
panmap.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral27
Sample
pcicapi.dll
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
pcicapi.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral29
Sample
prflbmsg.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral30
Sample
provdiagnostics.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral31
Sample
remcmdstub.exe
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
remcmdstub.exe
Resource
win10v2004-20250207-en
General
-
Target
manual/manual.htm
-
Size
80KB
-
MD5
15036497c764bb502abd48efbb1fac46
-
SHA1
8b2bfb63b247078767b101581e4c63a8ab8792da
-
SHA256
0b72ba493a432e307df3a21d59ac255d301f56cc602cbc19b8e05885339bdd77
-
SHA512
3a5ed6e54384e7cea58bfceff7f47a6eaaacab6f95130b96865de2003882a13d33b76923a5eec41a33575814489e0f598683ef8a62dafad305b51f7caa953a05
-
SSDEEP
1536:vIyp2DSWFvOo7txeogjFSlPYJ4nA2RnZavtUcmTUna:oEFSZc4A2RnZavecmT7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "445967268" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27F22DB1-ED42-11EF-AF7A-C23FE47451C3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0041e2fc4e81db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000067f1e0e5d9535b4fb70ced6b99425e0b000000000200000000001066000000010000200000000bc26cdba4286a17beb4f7d7faed0ccf2775ab706ca6222d9514b652e0d730ae000000000e800000000200002000000074f631e8758f4585c842cedf7748f605005b93b6e0246b120fdc638aaf62be50200000009381ce4cb5582cddecf359ea6c7fb101f75a7c4feaf79390b5494f4f5d813aa240000000f6a7547058283582286df38154ce6409fd38631e40b46540e6161f35e48e82b46a578a96b1f473e2a55ee326a65322d9fa182943cf5834ba9fa051fc0397d827 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2976 2280 iexplore.exe 29 PID 2280 wrote to memory of 2976 2280 iexplore.exe 29 PID 2280 wrote to memory of 2976 2280 iexplore.exe 29 PID 2280 wrote to memory of 2976 2280 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\manual\manual.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc458b7c04918f9fc93311e7f0403ba
SHA12bdc39525fa34bb402ab2541f49bb5d93be9d958
SHA256bc8ebf138cd8bc86c674d59b015578d9cef0d8c6f8ec9c97348cff55e6409559
SHA51250f1ce34189263346188c65b3d59ceb7b03681a7408830ad64fb2ec4e0c50433d5a49806a00263e9074771e241840c3706232ce4ec939eb24757ab90170f89e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442da8cfd42f477e87e7cebd33013e75
SHA16e0eed116a43865e75d4cc25b22305b6d33aa845
SHA2565912648589040992888e0c8ef74eb1235e33171f7540fc22158e7dd7a6b4ddcf
SHA512ef8536eb0da772dd50445f38504312cb5696902304059b416be592a9f2276e456859c69cab22fd431075822732dc6cbaa0bdecd522c9d6581b9e56d41e67006d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b563bfa6886020e72a385f84b90386
SHA1ce0f2a2b3792faa6959bae687fbd7c3da0724960
SHA25679ea8447e29389ed714438dbb6a78b1d24e894f5b60b2d4139a9d7170eddceee
SHA51236ae9d804f6ec495fe3662e46f89ddb6b3290e5c6cd9a744e8ef55a86d0fbd65e8c0ca854cd93d771b4478cc1bb22ed813b6bc0ffbe7ef562cc25656906fa10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508feced0121d6940e303e10067d357fb
SHA1ecae191f734e5a7f951e030c71981a4ca4da96a8
SHA25666b0927b1769e0377b12c201de6ae60bea8c57f216488fb64f317d45678ead26
SHA512a0ed634e0c78654b560e4e7f72526bc6baf80b98db491ee69e0c4ed67fd89b88583a53220e753c7e237103b5055ed76065587ebeb9e04a22b8b57dbc549a770c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0cf14c23ba2ac738691bec78955bcc
SHA12443084a42b46091e9094ca2871d862b88db70bf
SHA2565d2a781d3db2cfe90bab6e9849d50f7262e30f722051bf9214a5939c82cf3958
SHA512479ae31369ea3b8f2223e2447c830df972c93d604903ecae7cd9fd4102e8ff26ba93daba84db23d282cbc12753855614419141c2e6bfcabcf293792844d35272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ade071577e0304d002257a853eda25
SHA1de883837ed474fda4e1e2f22ece9b8a71ae26f16
SHA25666ac9792ecab8fb694fa4ee344c99f834664bb6b288f26645e29dd6316f0e8cb
SHA512f13141f6df977b1db8263c24753642044c10ea0e675fb936c1922ee7504ec2b8b28f19b77d47b23ade69230cabcf005bbb8c32e823afa3b62bc4f6e262fbfb92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560493abab363c4530bd1b49d95adccd1
SHA10fa151021164a384ca6d96b6bff99ca7d1661e0c
SHA256aefd1262eacf73849070ed1c82db60fdb3688f7915e825d2a2acbc8e285b7c7d
SHA51207e9b1a0f3959ae128f65f0231df9868ea82055acb727d4df156e608446a12436d7515b1f1fade3089030228e87b6779f6300836fa6e0452af3cb3a32ee72df6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b