Analysis
-
max time kernel
1s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:21 UTC
Static task
static1
Behavioral task
behavioral1
Sample
04ecee09dd024adc414bd6f336b30009.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04ecee09dd024adc414bd6f336b30009.html
Resource
win10v2004-20231215-en
General
-
Target
04ecee09dd024adc414bd6f336b30009.html
-
Size
25KB
-
MD5
04ecee09dd024adc414bd6f336b30009
-
SHA1
1a711e47a71ef0eb06aaeff26e7fa6ce7550ef6c
-
SHA256
e398820171f6eb9cc41528303158ccef7a436fa02f3717800ceffcd440eb0fcf
-
SHA512
65b1cee2fed0e6cf2c0b9a13d7814b149ae70854abb46031c27334329a02c8ef7bb07a6934426753e2e839b50341a909460d58e466125c753ac34a4691667acb
-
SSDEEP
192:3ZDqEuCo60OBnod1oQvV+p3PCTjfuKNiVZ2xJq8HOya1yUVV7lvbFSn5KcyxajJJ:pOpnNIwBwUwml/5/5N
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8F443516-A446-11EE-9ECD-C6E29C351F1E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 452 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 452 iexplore.exe 452 iexplore.exe 3328 IEXPLORE.EXE 3328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 452 wrote to memory of 3328 452 iexplore.exe 21 PID 452 wrote to memory of 3328 452 iexplore.exe 21 PID 452 wrote to memory of 3328 452 iexplore.exe 21
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04ecee09dd024adc414bd6f336b30009.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:452 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3328
-
Network
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.177.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.177.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestpigeonwatchforums.co.ukIN AResponsepigeonwatchforums.co.ukIN A199.59.243.225
-
Remote address:199.59.243.225:80RequestGET /espebanner/brokovich.gif HTTP/1.1
Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: pigeonwatchforums.co.uk
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
content-type: text/html; charset=utf-8
content-length: 1069
x-request-id: c250b7aa-bdc8-4475-95b6-7aa8a4e96d6e
cache-control: no-store, max-age=0
accept-ch: sec-ch-prefers-color-scheme
critical-ch: sec-ch-prefers-color-scheme
vary: sec-ch-prefers-color-scheme
x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_OCUFdXKvcgcx+eaipykL85KIiTz2CiKMdUIv96hY6Uif4ROLPmyG3+prpkqCrAhE6HacoGec12cw0mYIOhj6rw==
set-cookie: parking_session=c250b7aa-bdc8-4475-95b6-7aa8a4e96d6e; expires=Tue, 26 Dec 2023 23:44:08 GMT; path=/
-
Remote address:199.59.243.225:80RequestGET /images/bisley.jpg HTTP/1.1
Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: pigeonwatchforums.co.uk
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
content-type: text/html; charset=utf-8
content-length: 1061
x-request-id: 91921dd9-d456-4c1c-a8f1-24999d79f905
cache-control: no-store, max-age=0
accept-ch: sec-ch-prefers-color-scheme
critical-ch: sec-ch-prefers-color-scheme
vary: sec-ch-prefers-color-scheme
x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_EHqYbshJVbx292q51Q7pE1/WgqDRZeN2pT4A13uTDWKHla6q23pxQnSwhekwizO8OoFt8TFMZqBLP/t+FIctnA==
set-cookie: parking_session=91921dd9-d456-4c1c-a8f1-24999d79f905; expires=Tue, 26 Dec 2023 23:44:08 GMT; path=/
-
Remote address:199.59.243.225:80RequestGET /espebanner/fair_game.jpg HTTP/1.1
Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: pigeonwatchforums.co.uk
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
content-type: text/html; charset=utf-8
content-length: 1069
x-request-id: 0f6e5fb3-45f7-44b9-8724-d95c3f5fb6ae
cache-control: no-store, max-age=0
accept-ch: sec-ch-prefers-color-scheme
critical-ch: sec-ch-prefers-color-scheme
vary: sec-ch-prefers-color-scheme
x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_vxyoJfCYKjTYQ/eUXNhuIJ7NvEQxhrtKp1j2xWIVkbICpDVID5Nhdg99oEZtcYTpD1v0k99w6tNe6zk6joJYxw==
set-cookie: parking_session=0f6e5fb3-45f7-44b9-8724-d95c3f5fb6ae; expires=Tue, 26 Dec 2023 23:44:08 GMT; path=/
-
Remote address:8.8.8.8:53Requestweb.icq.comIN AResponseweb.icq.comIN CNAMEwww.icq.comwww.icq.comIN CNAMEwww.ovip.icq.comwww.ovip.icq.comIN A5.61.236.229
-
Remote address:5.61.236.229:80RequestGET /whitepages/online?icq=383781337&img=5 HTTP/1.1
Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: web.icq.com
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Date: Tue, 26 Dec 2023 23:29:09 GMT
Content-Type: text/html
Content-Length: 178
Connection: keep-alive
Location: https://web.icq.com/whitepages/online?icq=383781337&img=5
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Request225.243.59.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.135.221.88.in-addr.arpaIN PTRResponse73.135.221.88.in-addr.arpaIN PTRa88-221-135-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request229.236.61.5.in-addr.arpaIN PTRResponse229.236.61.5.in-addr.arpaIN PTRis-antiddos-front-vip2ismailrunet
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requeststatus.icq.comIN AResponsestatus.icq.comIN CNAMEstatus.ovip.icq.comstatus.ovip.icq.comIN A178.237.20.51
-
Remote address:8.8.8.8:53Request51.20.237.178.in-addr.arpaIN PTRResponse51.20.237.178.in-addr.arpaIN PTRstatusovipicqcom
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request100.5.17.2.in-addr.arpaIN PTRResponse100.5.17.2.in-addr.arpaIN PTRa2-17-5-100deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request178.223.142.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTRResponse0.204.248.87.in-addr.arpaIN PTRhttps-87-248-204-0lhrllnwnet
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTRResponse0.204.248.87.in-addr.arpaIN PTRhttps-87-248-204-0lhrllnwnet
-
Remote address:8.8.8.8:53Request64.134.221.88.in-addr.arpaIN PTRResponse64.134.221.88.in-addr.arpaIN PTRa88-221-134-64deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request64.134.221.88.in-addr.arpaIN PTRResponse64.134.221.88.in-addr.arpaIN PTRa88-221-134-64deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request161.19.199.152.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request161.19.199.152.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Responsectldl.windowsupdate.comIN CNAMEwu-bg-shim.trafficmanager.netwu-bg-shim.trafficmanager.netIN CNAMEdownload.windowsupdate.com.edgesuite.netdownload.windowsupdate.com.edgesuite.netIN CNAMEa767.dspw65.akamai.neta767.dspw65.akamai.netIN A88.221.134.40a767.dspw65.akamai.netIN A88.221.135.218a767.dspw65.akamai.netIN A88.221.134.41a767.dspw65.akamai.netIN A88.221.135.219
-
Remote address:8.8.8.8:53Request40.134.221.88.in-addr.arpaIN PTRResponse40.134.221.88.in-addr.arpaIN PTRa88-221-134-40deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request40.134.221.88.in-addr.arpaIN PTRResponse40.134.221.88.in-addr.arpaIN PTRa88-221-134-40deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request218.135.221.88.in-addr.arpaIN PTRResponse218.135.221.88.in-addr.arpaIN PTRa88-221-135-218deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request218.135.221.88.in-addr.arpaIN PTRResponse218.135.221.88.in-addr.arpaIN PTRa88-221-135-218deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request67.134.221.88.in-addr.arpaIN PTRResponse67.134.221.88.in-addr.arpaIN PTRa88-221-134-67deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request67.134.221.88.in-addr.arpaIN PTRResponse67.134.221.88.in-addr.arpaIN PTRa88-221-134-67deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN A
-
923 B 3.8kB 13 7
HTTP Request
GET http://pigeonwatchforums.co.uk/espebanner/brokovich.gifHTTP Response
200 -
858 B 2.5kB 12 6
HTTP Request
GET http://pigeonwatchforums.co.uk/images/bisley.jpgHTTP Response
200 -
865 B 2.5kB 12 6
HTTP Request
GET http://pigeonwatchforums.co.uk/espebanner/fair_game.jpgHTTP Response
200 -
196 B 84 B 4 2
-
636 B 1.1kB 7 4
HTTP Request
GET http://web.icq.com/whitepages/online?icq=383781337&img=5HTTP Response
301 -
2.7kB 11.7kB 25 18
-
1.3kB 5.4kB 15 12
-
1.5kB 6.9kB 15 10
-
1.1kB 5.3kB 13 9
-
156 B 3
-
156 B 3
-
208 B 4
-
1.5kB 8.2kB 16 11
-
1.5kB 8.3kB 17 12
-
1.8kB 9.1kB 21 14
-
1.5kB 8.3kB 17 12
-
64.7kB 1.8MB 1336 1328
-
73 B 147 B 1 1
DNS Request
158.240.127.40.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
21.177.190.20.in-addr.arpa
DNS Request
21.177.190.20.in-addr.arpa
-
69 B 85 B 1 1
DNS Request
pigeonwatchforums.co.uk
DNS Response
199.59.243.225
-
57 B 114 B 1 1
DNS Request
web.icq.com
DNS Response
5.61.236.229
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
73 B 131 B 1 1
DNS Request
225.243.59.199.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
73.135.221.88.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
71 B 121 B 1 1
DNS Request
229.236.61.5.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
60 B 102 B 1 1
DNS Request
status.icq.com
DNS Response
178.237.20.51
-
72 B 105 B 1 1
DNS Request
51.20.237.178.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
100.5.17.2.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
178.223.142.52.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
119.110.54.20.in-addr.arpa
DNS Request
119.110.54.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
142 B 232 B 2 2
DNS Request
0.204.248.87.in-addr.arpa
DNS Request
0.204.248.87.in-addr.arpa
-
144 B 274 B 2 2
DNS Request
64.134.221.88.in-addr.arpa
DNS Request
64.134.221.88.in-addr.arpa
-
146 B 288 B 2 2
DNS Request
161.19.199.152.in-addr.arpa
DNS Request
161.19.199.152.in-addr.arpa
-
146 B 288 B 2 2
DNS Request
240.221.184.93.in-addr.arpa
DNS Request
240.221.184.93.in-addr.arpa
-
144 B 137 B 2 1
DNS Request
18.134.221.88.in-addr.arpa
DNS Request
18.134.221.88.in-addr.arpa
-
260 B 1
DNS Response
88.221.134.4088.221.135.21888.221.134.4188.221.135.219
-
144 B 274 B 2 2
DNS Request
40.134.221.88.in-addr.arpa
DNS Request
40.134.221.88.in-addr.arpa
-
146 B 278 B 2 2
DNS Request
218.135.221.88.in-addr.arpa
DNS Request
218.135.221.88.in-addr.arpa
-
142 B 232 B 2 2
DNS Request
0.205.248.87.in-addr.arpa
DNS Request
0.205.248.87.in-addr.arpa
-
144 B 274 B 2 2
DNS Request
67.134.221.88.in-addr.arpa
DNS Request
67.134.221.88.in-addr.arpa
-
124 B 173 B 2 1
DNS Request
tse1.mm.bing.net
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d