Overview
overview
10Static
static
10quarantine...K.html
windows7-x64
3quarantine...K.html
windows10-2004-x64
3quarantine...C.html
windows7-x64
3quarantine...C.html
windows10-2004-x64
3quarantine...24.exe
windows7-x64
4quarantine...24.exe
windows10-2004-x64
5setup.exe
windows7-x64
1setup.exe
windows10-2004-x64
7quarantine/ht.exe
windows7-x64
10quarantine/ht.exe
windows10-2004-x64
10quarantine...Yj.exe
windows7-x64
10quarantine...Yj.exe
windows10-2004-x64
10quarantine/pic5.exe
windows7-x64
6quarantine/pic5.exe
windows10-2004-x64
6quarantine...m.html
windows7-x64
3quarantine...m.html
windows10-2004-x64
3quarantine/random.exe
windows7-x64
quarantine/random.exe
windows10-2004-x64
quarantine..._2.exe
windows7-x64
3quarantine..._2.exe
windows10-2004-x64
3quarantine..._3.exe
windows7-x64
10quarantine..._3.exe
windows10-2004-x64
10quarantine....0.exe
windows7-x64
10quarantine....0.exe
windows10-2004-x64
10quarantine...r.html
windows7-x64
3quarantine...r.html
windows10-2004-x64
3quarantine...g.html
windows7-x64
3quarantine...g.html
windows10-2004-x64
3quarantine...t.html
windows7-x64
3quarantine...t.html
windows10-2004-x64
3Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 19:31
Behavioral task
behavioral1
Sample
quarantine/BSFiC9K.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
quarantine/BSFiC9K.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/ORaMflC.html
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
quarantine/ORaMflC.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/Setup_2024.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
quarantine/Setup_2024.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
setup.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/ht.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
quarantine/ht.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/m5UP2Yj.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
quarantine/m5UP2Yj.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/pic5.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
quarantine/pic5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/random.html
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
quarantine/random.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/random.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
quarantine/random.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/random_2.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
quarantine/random_2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/random_3.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
quarantine/random_3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
quarantine/rh_0.8.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
quarantine/rh_0.8.0.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/sgu7U1r.html
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
quarantine/sgu7U1r.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/xB2HL9g.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
quarantine/xB2HL9g.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
quarantine/xclient.html
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
quarantine/xclient.html
Resource
win10v2004-20250217-en
General
-
Target
quarantine/BSFiC9K.html
-
Size
162B
-
MD5
1b7c22a214949975556626d7217e9a39
-
SHA1
d01c97e2944166ed23e47e4a62ff471ab8fa031f
-
SHA256
340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
-
SHA512
ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48097151-EE30-11EF-BA44-CA806D3F5BF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2480 2128 iexplore.exe 30 PID 2128 wrote to memory of 2480 2128 iexplore.exe 30 PID 2128 wrote to memory of 2480 2128 iexplore.exe 30 PID 2128 wrote to memory of 2480 2128 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\quarantine\BSFiC9K.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e291c79269702de4b96a88a081d9f2
SHA1d22f5f1f0f3e23bef9296472c57a4edc44bccb97
SHA256c19427c61ea1d7c00befa0f00775fbce3c4c3e56d9d0aebed1ba5f64591f41aa
SHA5124b39d5cceb4a0ab0692b8ca55a3e14396861f54ab989679a457c74c5c02c782ed15ec3e5ae304f5cc827554f991a8c233280e4cef74d7ca448d02d89b53adf75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bed5430c71db1a29d3f4b8996fd936
SHA109b56ae0460322dcbe725e051271e6f2b9b8f68c
SHA256223a8aed7e31ce53be1c76d0163eaa72889107ab96ac4c8e6015e6db16d7355f
SHA5123e48d21cd5515ef35b951035a373b1a4f06a2705bc735f815074df6f668369b728a4f145d47fcc51384f50f079b5602adfdc61a98cdc9c27e347be6ea412d811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075db4a096273b511d6808cbf311aa67
SHA1c0ed1b107c7177f35f68de5cb6e5eef5008220ef
SHA256fe2efd6889c85fc1d7440de0ce2fd75f3d54543844d2c5abebb133fbbad04b6d
SHA5127faa7c137114c00923dd4ef719a1a3d6e5690a41206d3c3968d1bf2e65e9c5dcad31446003111e44a4dc8c3e63d063167784627a9dcaf2c19d2c64ff2392877f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b4cbb0eebdc95345bcef220c7eed35
SHA11b680088d58cfedd53f1db2fbd02d8a6cba013a1
SHA256053a5402656bd3adf18d3461e504650d3180e2d9ecf1299741a91564ed21a757
SHA512ec4677ef84003a1901b92cbf3b719ff9a73a67c8b5ac878afe6b55496ca94effd1896ffdc23cfb682b0c2456b76f9c7cd9cc6cf79d45adf8d1fe5fa5619a7b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c1e3e4b07b90aa58a979eff43fb71a
SHA1f4261450fef2b30fbfadeaada75c494be9bb1fc2
SHA25653f4c0ce6c53b1a7e2d7f044ced033b8eedc60b91883efa2b0e3f050de5442ec
SHA5124584cd0bffc6ac1ab4b4657f00435c9ca41ead627505afd9e08a8797c1a484141b4ab3b273b27389c0362d51b8fb9b48513316af7095e044caef7fbb5b0ab74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b85f387c834f8ab98b686fbb860fdc
SHA1f010b3b81c76e6043538b4361cf313156e55809d
SHA256872f204a0409da2575cc21f992659716cf00f8bd9a807481dfa52e2040a6fc79
SHA5121526eeba6afdec2a9457f4fcc9f77dfe38becb29f68c5aea044eb8c9dc54ec494f317e60288d7aa5787db3b780cb95328db44de36d7a94d727466fbc0a60851a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cb7b3a21e87b826ff2f25b0202b323
SHA10e3e473a557687d02115d194cdc72ea3063b29d3
SHA2568b301b336d242515d3a9626cf1273de74cb9f65653bd0df7c55f634f8f6e4b59
SHA5128869c7bc8976aeea7fe6d0a4b50fb6e5b6b66457dd1814afd2c84eae0573b3c3893e429162a70640a0ce4dd4e28f0a67534d1fd6eaca5133fa972905684c7757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593fd6027f7bc11e4b1b8d0e6c6ff9eae
SHA1b076b3ce1207097eda9a443e2917ac5dfaa3a252
SHA25692095a0be953d727d08e6bbc5ffc56fa7ef316d4de655a57b6017cce6d821ff4
SHA5125a325e1a150ee360960d4b1b61de1690ba3ca87b8913b823919952faf3f750a0cd90d5b267323db8903bac798a77b7a41bfe8b00a2ca6875e972487460a1b669
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b