Overview
overview
1Static
static
1FREE-GBK/a...iew.js
windows7-x64
1FREE-GBK/a...iew.js
windows10-2004-x64
1FREE-GBK/a...min.js
windows7-x64
1FREE-GBK/a...min.js
windows10-2004-x64
1FREE-GBK/a...bak.js
windows7-x64
1FREE-GBK/a...bak.js
windows10-2004-x64
1FREE-GBK/a...src.js
windows7-x64
1FREE-GBK/a...src.js
windows10-2004-x64
1FREE-GBK/a...h.html
windows7-x64
1FREE-GBK/a...h.html
windows10-2004-x64
1FREE-GBK/a...c.html
windows7-x64
1FREE-GBK/a...c.html
windows10-2004-x64
1FREE-GBK/f...1.html
windows7-x64
1FREE-GBK/f...1.html
windows10-2004-x64
1FREE-GBK/f...0.html
windows7-x64
1FREE-GBK/f...0.html
windows10-2004-x64
1FREE-GBK/f...1.html
windows7-x64
1FREE-GBK/f...1.html
windows10-2004-x64
1FREE-GBK/f...3.html
windows7-x64
1FREE-GBK/f...3.html
windows10-2004-x64
1FREE-GBK/f...4.html
windows7-x64
1FREE-GBK/f...4.html
windows10-2004-x64
1FREE-GBK/f...6.html
windows7-x64
1FREE-GBK/f...6.html
windows10-2004-x64
1FREE-GBK/f...7.html
windows7-x64
1FREE-GBK/f...7.html
windows10-2004-x64
1FREE-GBK/f...8.html
windows7-x64
1FREE-GBK/f...8.html
windows10-2004-x64
1FREE-GBK/f...9.html
windows7-x64
1FREE-GBK/f...9.html
windows10-2004-x64
1FREE-GBK/f...ex.htm
windows7-x64
1FREE-GBK/f...ex.htm
windows10-2004-x64
1Analysis
-
max time kernel
0s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:21
Static task
static1
Behavioral task
behavioral1
Sample
FREE-GBK/adsview/adsview.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
FREE-GBK/adsview/adsview.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
FREE-GBK/adsview/adsview.min.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
FREE-GBK/adsview/adsview.min.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
FREE-GBK/adsview/adsview.src.bak.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
FREE-GBK/adsview/adsview.src.bak.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
FREE-GBK/adsview/adsview.src.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
FREE-GBK/adsview/adsview.src.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
FREE-GBK/adsview/flash.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
FREE-GBK/adsview/flash.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
FREE-GBK/adsview/flash.src.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
FREE-GBK/adsview/flash.src.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
FREE-GBK/forms/html/1/1.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
FREE-GBK/forms/html/1/1.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
FREE-GBK/forms/html/1/10.html
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
FREE-GBK/forms/html/1/10.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
FREE-GBK/forms/html/1/11.html
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
FREE-GBK/forms/html/1/11.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
FREE-GBK/forms/html/1/13.html
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
FREE-GBK/forms/html/1/13.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
FREE-GBK/forms/html/1/14.html
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
FREE-GBK/forms/html/1/14.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
FREE-GBK/forms/html/6/6.html
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
FREE-GBK/forms/html/6/6.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
FREE-GBK/forms/html/7/7.html
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
FREE-GBK/forms/html/7/7.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
FREE-GBK/forms/html/8/8.html
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
FREE-GBK/forms/html/8/8.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
FREE-GBK/forms/html/9/9.html
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
FREE-GBK/forms/html/9/9.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
FREE-GBK/forms/index.htm
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
FREE-GBK/forms/index.htm
Resource
win10v2004-20231215-en
General
-
Target
FREE-GBK/forms/html/1/13.html
-
Size
2KB
-
MD5
8b968c5ebd12722401651782b7b49922
-
SHA1
7249b7042629dc3f2a8f80a673d69780edbeb031
-
SHA256
ed6658efa8d6059d874b1907f3a8ff447187d3e3442ba28b6eba4907a5ecef53
-
SHA512
38b157fbf72758b99a1bd11c843c05e714d3986868a6d63abfa6c3ce904603c24581ad8f143fca92d9cb39039c39e30c72613d7b80e4599a40b671e16148c607
Malware Config
Signatures
-
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3E0F8C1-A8D2-11EE-930F-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
iexplore.exepid process 2572 iexplore.exe 2572 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2572 wrote to memory of 2804 2572 iexplore.exe IEXPLORE.EXE PID 2572 wrote to memory of 2804 2572 iexplore.exe IEXPLORE.EXE PID 2572 wrote to memory of 2804 2572 iexplore.exe IEXPLORE.EXE PID 2572 wrote to memory of 2804 2572 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\FREE-GBK\forms\html\1\13.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5a23924ca088506991b6b878ec236e
SHA19456881b7508b512f2bdfe287f8b74b3e7d228c9
SHA256d57aca44f6c811d54aabf274e26b6cb42a2035f5795f227bdaa35f10321380a4
SHA512273e12ec0206ee8e01c37b2532f3fdf5aec532f1fed4042dbdc353beb43d30904de1d1fe236dd1125bf28c04a77cf3822eb70968f7e2a03f4e17e1ceb0fbc98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51451d86c04dbe8d5b1d08a07190dbc24
SHA1f986f2c1e2a7768227d04efecbe3ae670f90c381
SHA256b058014db7160bc198313b83aa6769137dfd5eb46c19c54877acfb3d683b6581
SHA512e1246c9c3ffd056ebda144f291a35c3e1e404cea51cb0e34d12ba69749a79a0d67a9dc6c7af276c8c504c3e0ff4e843f50019666b651b8d3e9916e434a50b0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3525b292d7cbe86d476cdde917c82ee
SHA1b21b7c1c34865979f67e8edaeaf01ae646b7f1ca
SHA2568b972371a683ea51f9da6f755abf3dcab9c923515b5381aec4b43d79df129f0d
SHA512955d970e5115ae896da9a113b8ed076b8dd34703bcafc7994f2a8b8d22abfd3a20fbd9c4ed161ffc363aa59e6da4c7db1d5db4b0dd5a05ce7e09902fe0b3a8a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b320c23fac56cc32de26c28cca3ced9
SHA15b505738261684581e7972929a1767553c7286d5
SHA2568c6cbb4894c88f5aa00af15be01ae63d0563f610907f16eec2a0f1c6a3acbc0e
SHA51282559e1bfe455e6a580afef8557dd258957797676bf3643efa2afa814212bd426dc21ebf0fa193e6fb2a68cefb6765379b317cf09353e4f73055a792fda021a5
-
Filesize
6KB
MD5fd44659069ba32984b25f09b2b1d44dc
SHA1850c859e120389491ce58336b2135fe6eb5bd145
SHA2560c7e4b240e2827ac9124e862e1b89e5e6224149eed28afbf8c73902e90d9f574
SHA512cb9d7a974ac99aa24476dc274de09fbcd729969ba198747566661cf3e0d689b0ee3c95685b26bd9d3d38ddeb18cbe6c0f54da09ebecd49021b2a6ae9c4a162ea