Analysis
-
max time kernel
143s -
max time network
241s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 18:51
Static task
static1
Behavioral task
behavioral1
Sample
FREE-Discord-spammer.html
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
FREE-Discord-spammer.html
Resource
win10v2004-20230915-en
General
-
Target
FREE-Discord-spammer.html
-
Size
951B
-
MD5
6ebf16b3422db828ab9507ff131aa9c9
-
SHA1
2a96b468a8da889bc603f17f7da5943b8182bc31
-
SHA256
e8a87b999304e8f2c8aafd1b6aa99c85f9aa9014af258f5b35fa1cddc7fb140a
-
SHA512
1f735c391ea52d5e977dad5cc275552da690c6edb3c4f7827decdfe3218b2a9cb111ba0f147e283b2e86ff0b79b7d61a03db2516322227645c03b500fb12d32a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000918258b1c6eaef44bc85c7515db804ef00000000020000000000106600000001000020000000e5199920879be716a9bbc642611dca97f8128d9eaf848fb86239ff81e3bad14e000000000e8000000002000020000000f1c9725e245f58bff76e7317fc677a0fdc23154ac35676d49f37a84810a0d22e200000003096114eaab4fea6b969b2e2df0e736b8533ab703b8751d008ae8b7972799b26400000008f2a1fe13567086838a30b2a71039fd66216179aa2e3fed990a5578fbf9bb0608613036c2d7f6675c8f5cc8f95a5b7ee252ae004262acb88439f436b5c382f98 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B98C3591-6CDD-11EE-97B5-7AF708EF84A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60165ba8ea00da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403702888" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2572 2724 iexplore.exe 30 PID 2724 wrote to memory of 2572 2724 iexplore.exe 30 PID 2724 wrote to memory of 2572 2724 iexplore.exe 30 PID 2724 wrote to memory of 2572 2724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\FREE-Discord-spammer.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e15c9ac8d3d9a0ef835c60dc792d2095
SHA1a848ce5bac8fe8b6d5fbd75ab7d518b2bc6e9d05
SHA256c2400ca2ff9768c2193ec4eb886493c0b1740d777d3771dd6cbc8b9ee0406084
SHA5121870d729cb89c9134695ca54a05da414d68cf06e0dd05cc35fb492be22d8c6d7e6a8f279f7099cdb6763c08c70cc3255c2b1c6ab365300becb855bd911dcfdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7198c47ef5221c55464c1ead383723
SHA1933b596ccc4df09e0022d123a8baf86e4d85a630
SHA256a6a00bf3dcda9881382b26238c1e8bddddbff07fa756021a421a46815cd3523c
SHA512eb2ab5d4021134cc2d215e2ebeab877d266f02d7a85834847af14f7914017a703ab90fa0617813d6f6df4c2183ae4a053a85432fedb6632febe234f27737326c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527dbcf3021b3f99a3fb4f06d7d3b336c
SHA1f2fd427faf56dac4e13d90f020496fe65f30687a
SHA256c7130fad3e12c08aa3510c34adf4216ec7f09a6291cfd6a00bf29c49e6fc9d9c
SHA512825a21116181ff6cc87abeaa083c00a27abcec1ca6472b678f933ee59a7fdcfee00a2ace85193988cb18c8175d48aba69ac8575b452504f09523e9389f3b572f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521cd0a058f823c8791ce6fd03f210281
SHA19f08c58beeaa784bac7858e61c5f4ba41cac2fe8
SHA256ad1eda92a79ecb8890be5208c8efad7e9c1dbb40f62be1dcacd4cec3584d858e
SHA5121c2703452b8f94eff9f77629d32d5cbbf8456769f5bfee66c684b5d993ad7888b4a5c35ddd8fa6eda4485142bdebbf709f23093dd44106c1cb444bd52fa58042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf2646f8021f5dbf1d18eeced17f5ed1
SHA1d013d6cea6bcafa341fc102591c5fcebb53c75f7
SHA256fe159845bdc5cef82eb0312c8876e70f8a4c85e7cdef7d1547e3278be6462337
SHA5126e4171d601bae474b16b13910f87b47814f9d8936a10ed8ba28fbdcf767d8cbf81b81bf21b71a7792ecde03a57b10cbe0295b293cbd073ef7733ceba2207ce30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d0978ccc3f80ab889647d6bcfa34999
SHA1bf9668f239e44d409bc5b0578b0561b4c70b1d77
SHA256e7675acfa72dee9c4a5cb4a8aac7e04277d7918203be827fa6d73d35cfd7bd04
SHA51263a31407dfc5ddb76b1063daacbd7b19d3d1dccdb354618c5b49d809f3b86b6ad327ac31d775900d87eff86ac4f59f44c1faa7c4573faba26b5de26241515127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50fb21c44939b4dad81b91e300803f9
SHA17488f400a1f8aaa4f4c99e00389bbbb1cfe61312
SHA256a5addf9f8893489bec04bf16975a302a4f445bf1f11c7400b7047f93117cb54a
SHA512264b65b732b68c6f5cb6ec9d5620f308555f9563bc2454dcc97953a06a53da575effbfde800e0487fbf1cce353bfdb5b043903b1ad754648d38f6bb3413c6ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c2e598176cb29d771610ce42d65dd84
SHA1cfc7aa853a9e13374f1220e5c937ef5c541ced16
SHA256500d0b6cbe5ca9a571330d060ad46e5f42aa09631c33595f99cb0ee04795ba7f
SHA5121af1d7c1fb510d1e1bf7e45a75d37923b82a198da9e0d6fb08c8d9952ec534a9e702b1be1689fdbafc5a4b10724e5c657cb7f1772f92287511cdfc712c9fa211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507edb866622bc47d0ff9b71856326a19
SHA165c009eda32c811593960a98aebd26fe3b0493fb
SHA256d4dd1dd51559ad696f8ff119a2b83177d213980c7f03aa224085242ae36c8971
SHA512b4cd5ee588856c8ffb81cd496aca80c50a3b62df6730a5f53a0e3c83f8fc8b5e39aaff59d3c8038264591399316d8d7975c1be2feaa890875e04497a29b54429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5e1fe53007624d2d196ac968b041203
SHA1d28acc4fef736f3db647dbc95113c5a0d3a9d398
SHA256ac3dc90b9522f33720be418f9bba35c1ce9af3611bc6124d5031487a41be8b3c
SHA512c80c578e0b6e96a07680e001d54ba0c0d318083285c096285d80aebe59ecaf3c986ad2ecbfc06f0a3795b154d471d0ef3ea6685e23ddbdb2a333b6a9b969d673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f5464d76c28634b3ea474c48e97d2e7
SHA135920dbbcd7a120fd71dc85d22f3fc64e2ee346b
SHA2566d3dc5e689ed3f7ec6a72bd532fa784ceff7022d75c717c292ab97f8fecfef3c
SHA512fc4fecfe3e65d306a9fb7523bfc2db8b49c6cfb75e4e3aa290f6be78f7e0d31f548854a387436de11053649874fd93baa078194519f5b6ef88718cfd4c3dbf5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57093eb3b9fd33088cd3f662680775b66
SHA1ce67a88fdbfd1fe3f6ee7e38c8006c56b9326f19
SHA25658101de4ffd0190e4a6c0f634a4bc1431dec63c69ce5aec13144436e6ba63e35
SHA5126b2f7881f27f9a880b35f30899feb488622b805a5fb997463240c58124c042c08b77474b0367c75372b6aa7768ac12f49c6f50ddfce514b4515175025061a97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5448ac8723d16b556e2f2773c41989207
SHA1d7f4af9073897e4d6124a46459a979e114b23efe
SHA2564ea212fc1ec5d5da2898945220826b3f4ff61a9c8227c269faf723caf22a855e
SHA5123ae3f3b38367c15ce09950b1adfd2af5339c84547c4a060bf4337688161f625a210fc3d3d8c5a7f5136c332b40fae31eefd0aa564ba37aa87f0ae3cc26448a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bb1422d85be783efe344074038314a2
SHA1708d50c610bc5c1ddfde7e928c4fd86c88d8bca2
SHA25607979505055f806c8a3488ca3298488578f2aabbc4b96dd41665e79ff84d514e
SHA512d503aa0b87dccb26e7b36ddb3ec6eb3430441117c9117809e6e673d99388fb10300c93071f121292ef9358ed75976bcb1489856e65936e05dac355147eff463e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f15e918c587b04dba813beeb2da1edec
SHA1f72dbdcf3d98802904bf6a7a3912ff56aab154b8
SHA256039c6ba706616490ea97f2033cc14f66eceb36cd6ef9366bff3f7e54c1d60974
SHA512667489f3c7dca1e8ad05e7b165603c28c98de3253eadfeceed0b1b17ff1cff3eec346812c1b575f9637988ea826c6d0e5f814d0a5be1770559d8cec12b6786f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5913a2a59a048ced671e9452566f0f43c
SHA1b757f21b573b35432ef8a52444854fbb2eb597b5
SHA256c63098d4c0a15dd99cdd6ef4d2c5bfe15c1ebbfc7f61a9176e4586642285cadc
SHA512e557293be7fc49fa95d5bb27ab58a181923887e3ec3099c7f90011e1e0ed283bd563a4b49f49493e956b17d2b6157aa29b37e7b7177926e6e1bf0f4fe4cd4389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52381748156ab5a57d082898124f1afac
SHA1fab5f37cbaf22a628ed8786960afee3cf8f59d07
SHA25642c881d14f54b08cae17e07ec5ecf181fc9de34a7b8be4cd23d39169ef746f96
SHA51282c6dc185277f775508ddbcd66a7e722ace366fa8eecdd39c9f01421db56292e1a7125fbf2a683a8338abc8f7a96c87b001a7705a51c9689eb16828398af682b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537896a4ff94810b6ddca4bd0b0dc06de
SHA134d6a7a12fe691dcb998e42964873350f1fe7996
SHA2565d595eedf0a3205324958ff84c6598343ec69e47a4d02555947543dc65370f4d
SHA51219865243ed018c41292544f6986815490c854351f7851a0503dd2249952390b43c74fa9862040eb64c78302681f0219304971f3ca5a6ab229d5a7fbb5eb65cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557bf52c9b97f9546417a7f22f182923c
SHA1fc98150ba14179184577c867954ba9f9bace196e
SHA256bb12a8b39f40738306bcb5be2ce1d3b25f2799c8df0d78162ae506ac6cca51bd
SHA512a3b8ceeb4c3e02d0ee9ceba99b5a4270c10f93d07010db7acd19b586d1c81096b07713c5b5985fd8cb25b7c5c62c7b6893f0f959f3e05393fad4ffb218af9913
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf