Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/03/2025, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
System.Runtime.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
System.Runtime.exe
Resource
win10v2004-20250217-en
General
-
Target
System.Runtime.exe
-
Size
134KB
-
MD5
e7621d95185c721aa9e1002703b82fb1
-
SHA1
187d8a5a6d5244b981e523cce95081055e59150e
-
SHA256
edc876045d945c73f2746b87e8aa73415026f6771c114320fefdc5e73828faea
-
SHA512
f2438061ee21db1fd3d82ffbd4064ca1b6c8574d637441f728c5133918b44948647953b91c25795ad0056f74e6f6e15d6349244b122940c6c977a6946fbf0137
-
SSDEEP
1536:9gAlZHY+5D5YEtSMxuJyxq7J7BmfRNULyvUrTd0E8pXOAIT/Rk0MEMxNGJVuFjvy:9hXYRI3KBms7dwpXOAoRLEfGnDwcPlgY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.Runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3078107c4594db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5BCE511-0038-11F0-B788-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000073f73add6782f7418e16e198adc4066500000000020000000000106600000001000020000000df82143fc4cdd47d7593341ad723aba0984903950940789eac23ea240ede8191000000000e8000000002000020000000879c8e87c6fbafc8a8f3e5430ca46a13efbce357824e5137681393e76ae8562420000000ab90404b0b37635ed05523ea183b308bc81b68a73a2288012814a4784dc7998b4000000065e0001e397a10b541bbf09073733420c3a098681e04d4abc82293bda2ffb6360057feed5a82a24a3b46d464c4706f915d10cde3b3ef4cbb51b22014ce9e763b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "448052242" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 532 iexplore.exe 532 iexplore.exe 564 IEXPLORE.EXE 564 IEXPLORE.EXE 564 IEXPLORE.EXE 564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1840 wrote to memory of 532 1840 System.Runtime.exe 32 PID 1840 wrote to memory of 532 1840 System.Runtime.exe 32 PID 1840 wrote to memory of 532 1840 System.Runtime.exe 32 PID 1840 wrote to memory of 532 1840 System.Runtime.exe 32 PID 532 wrote to memory of 564 532 iexplore.exe 33 PID 532 wrote to memory of 564 532 iexplore.exe 33 PID 532 wrote to memory of 564 532 iexplore.exe 33 PID 532 wrote to memory of 564 532 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\System.Runtime.exe"C:\Users\Admin\AppData\Local\Temp\System.Runtime.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.rustemsoft.com/SkaterTOTAL.asp2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:532 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beac38dc51cef38b2d2151c597aa1fac
SHA1626f5da289acb09c103448f80027dd62642931b1
SHA256a24de3384494711826181d403e586c5d5df24a3e0f60724287360035e301f64e
SHA512bfa1769c9a5060585dea40a8dc9ec6b4e423b7d4ac3235d0844c777ed36dcb9c3999d006c401180481efd29ebeeeeb0fb242650083c2cf16890a87dc202643be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aa1c16549a931dc6618adcee027e5f7
SHA147d4bec0bc9565777b1b55ba63bcad363b514bae
SHA256be9f2ab669d0073414b2a84b31b9ecec39f9841b07711891062917ee7f4e6f56
SHA5125e8e97b41908976de23a2987b03fa2c283a764f556ae0388a60ee098be9a402e7a62dc5f807b3947ab428eb777eaebfa25eb6c9efa909ae069f07b9499b6ff23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528be8043b74e94f24a8cb8d1a0473cfc
SHA11aecceeba6d2be81f64b7c8b95aa7d04fbf4e439
SHA25648ef9268d2466c5418b4b97bb0915347ebf35d97782ffc5a34cf2abd433abb25
SHA5121bf0e39b9bee01f760ee6113f203ddad23fc33009fe65bfbcb1e77209847dfcfabdb36b221d84a3d13bc39db9612cfd2db94032143482898c8f93231e51fae32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bcc7a99c6965e8fa748022054b7ad64
SHA1b1abf5f1845f157f8f52504bb035cd5494911db3
SHA25613b124ffe3f167b3fa87a37a411054e12947399aad7501de9dcf0eee6d3ff158
SHA5125bd215024747988e620a3ddc824fb694cf8f2498e03670c9b357ca819c97099bf8187edcd519ec9e81cfb0d7432bf59cb728e0fe5897afe8f1d8bc9e530188bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c1852c435cf1995d5b7c1bcea496782
SHA1e485ab71cf766b04f6cd5929acc474e8ba012c47
SHA2564c500439c460784c9412670df4d08d57ec6c9d4e5b36bbf3eb2a9ff232cb335a
SHA512b281f370ba7f2f95e9638fab97aa29f1957dd257cc9a43a6ac2b6032158aea43bd26254d70ef934a7f8307b81d24fba8becad112d7548ff7809887263a6589e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5677a7b0d4652c0f8ae9c5c09ad548645
SHA1ec9e7c908fd508a0128550a62e06b68d3b19d0b5
SHA2567aee417ddebee9f2387c7b49bf62592fe37bd587cc08f1cd63b42f5b90dc9fc2
SHA51247e3a44b36d65da4b9a79154845b16a51c1fc2ca84dbed21ad93c5e737e4c939cd1f5abac582804d204c5bedd6d276bda391bb61ed46858404c018fc35d81b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec643f24a45aa4c72eefdfc63a3b8019
SHA1e3c30547bcb5655d8a65138212e7d92b659e95cf
SHA256a45679450b994cbc4ebee5521abdd915062962e266b14ae360a5f8e411dc4268
SHA512151d0a20637e7024117975f39e44335d2d01bef7c5d5ff1c1979d94ca63271a06d5ead494ffa5400af960b2d513b812405e2284843e1ffa4bc84da69d418fafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c571044dd7e2da156cdc2f6f9f319a6
SHA19bb40595bff1ddea36d0531607b683a02c50bf9d
SHA256ece52534f159b83fca039e9cd076b66dcd2e1aa15046cc89c16fc77b454ab6c4
SHA512601fa087da6fafaacc685e540871c780d4c716ccc158c41d94c5ef2306659bee1629c2694284d47d50d2675e5623a9ea251f7dcab01c4b425b0c5ec99e10e2b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c765852b7cd958854d01e9dcce28fc29
SHA10142012291b4e86511a3e02a6a9cbb80798fd170
SHA256bbd918455bbed0e576324c82e5815f773cbd441eecc06a938200675b7b8109cf
SHA512e93a36735b8b8d59a3e35ddbc92403cf3b6bba4719ffb24de77ec9e3429ecc370e308a0d8ce0a6f29572baa041f1e5f316ec5eb0ab965373ce5ef417f60c6ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d009349260d02c0f3bb67c2bd39a0b
SHA1c85c8096b6a7bc7d1dd6fe4e5629528b6d271f51
SHA256645e32a9558246f5c1b1b6ae7a37773758f9e08c21cb4c8f080776d4624853b1
SHA5122d225f59637ce94da564a35332e0f89d126ebe067c43a195c3e120fba735bddb02759e3fe9f467071314139e1714ed3a542672b403c342782bff5e8f75d84ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51202bc329a52f0cdf195dbc7ce7dc624
SHA132229cd4a0ad121011824e96d6c6834d0f7143b7
SHA2565342ef6e623db51be8e4e078fad238e351a52c56a19af5f65d26a3af747ad9f4
SHA5123c46e8a1e00838fe204da983e8ad1551dd8fa3c351e69e6503727a56befd172e66a75737a6b1f17aa7998374d196b8f8668fe80618e8b73cb34756bd3266b6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f776dc5bc8ec92f1edc102676426b937
SHA122f58072b6ba87c3a01b211bdb13b95a744a417e
SHA25643ef80a8d5a1ead5a94d970d16460d67b6c5eb1511c43fa2249a5632188096bd
SHA5122396d165d25bca2e8fb70e2f378f2c8ce1e3ed6aeba4be23aa96adcb4498d08c5259ef7d5646dea6ba8a8d72a18a5270a79c6eea8ba80912971ee29c300a7670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e5d3d1825ee30ff7bf7fb3d4492e9d9
SHA135131baea84288534a2d7a780d6ea91d4892d62d
SHA2569c0944fbad1627a4f346cf1d6bd51293510536955035fedadd69de674a05fd1e
SHA51249c9f9a6dab508bca88a6dfd5ce7d0d9c820a9e1b571c26a9d4785314b211fe2c730e01d8760efa3c186a52ea8746f687c6d3c98b7b963c5af10f089199fdb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56290aaa5ef418b8597ac721037b4d305
SHA17fdae4c72ee3cfbff298fe3191a464bf4cbd362d
SHA2567ac8e7aee41bc13c85e489d18f47ad162434375717c03b3ff8e77f1db0b5c42b
SHA51256cb827a8e58ef1cc27e5c20d9b4931833ab37d0b28c74bf19b3cd3398e1f5f026e07befeb1621aa0983644efb3c67ab329b4ca4c33210d1fc952468581b7490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5822bf776efa4ba6877862689b17d5790
SHA11ec1548913ddce2a1df0289e0b08e1d615610bbf
SHA2562af73c9467d47b631b96d833a0cd56243491f811778eb2f60782171453f32d19
SHA5123504f471e22f6f4519dddbdb82742ad4e53d1b4964d63f8cd54215c6dc5d75b5f05ce0c05967cde279dbc7205acbfb7c728b85994f026e676399d9f567438d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c8210606072c87cb8983e1f2f00d0a9
SHA1acf2f3681d0a32d0f161778647943568293d68e7
SHA2569c8fb5d0c8a9f6bd83c6b6d191c02ede405eeb7f1ba18b0f02178e34189eeb60
SHA51241790768bc1cfedff905f10a350d718b45185e1450640918d4cb56a196f0fca868a1847e10af794771e578ab50d0623484c2c7a4de7c09c052c6a9736522db16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a34895364b64f4672bc7fef0f3545c90
SHA1a74abfdd689cf6f187594b8533ab58523985ec45
SHA256d83badac74fe6b013efb4748160c7c38c2ddd3d86204365b4839fd85a98dfe69
SHA5126e03307d2c07403e3769e3d8c069ff649018d8b1d4bf0c2037313f217748568b5d788800a86e8c417d39667563227a2ff07ed10b73a41f178763e1e96f0d9a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b25ef2b7e94c97f31cb221fd61d246dc
SHA19407766b8d7f6279f3951ec6c9d2547201189cb9
SHA256bc0b44549ac360c9198470c443a9d88383f284b8feab82d9ee75ab1a578a8bcc
SHA512ed001e5a5d5f54dd6899c761febeb60eda419b003ec6565cc11d2e45816a8a586166d68dc9d9b1c9f4322bb80d02f3fae1b892b11b4d6967728c0a4f473228ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc