Overview
overview
3Static
static
3v4free/Ads/_2.html
windows7-x64
3v4free/Ads/_2.html
windows10-2004-x64
3v4free/Ads/a_1.html
windows7-x64
3v4free/Ads/a_1.html
windows10-2004-x64
3v4free/Ads/a_2.html
windows7-x64
3v4free/Ads/a_2.html
windows10-2004-x64
1v4free/Ads/a_3.html
windows7-x64
3v4free/Ads/a_3.html
windows10-2004-x64
3v4free/Ads/a_4.html
windows7-x64
3v4free/Ads/a_4.html
windows10-2004-x64
3v4free/Ads/b_1.html
windows7-x64
3v4free/Ads/b_1.html
windows10-2004-x64
3v4free/Ads/b_2.html
windows7-x64
3v4free/Ads/b_2.html
windows10-2004-x64
3v4free/Ads/c_1.html
windows7-x64
3v4free/Ads/c_1.html
windows10-2004-x64
3v4free/Ads/c_2.html
windows7-x64
3v4free/Ads/c_2.html
windows10-2004-x64
3v4free/Ads/c_3.html
windows7-x64
3v4free/Ads/c_3.html
windows10-2004-x64
3v4free/Ads/d_1.html
windows7-x64
3v4free/Ads/d_1.html
windows10-2004-x64
3v4free/Ads/d_2.html
windows7-x64
3v4free/Ads/d_2.html
windows10-2004-x64
3v4free/Ads/d_3.html
windows7-x64
3v4free/Ads/d_3.html
windows10-2004-x64
3v4free/Ads/ivr.asp
windows7-x64
3v4free/Ads/ivr.asp
windows10-2004-x64
3v4free/Ads/l_1.html
windows7-x64
3v4free/Ads/l_1.html
windows10-2004-x64
3v4free/Ads/p_1.html
windows7-x64
3v4free/Ads/p_1.html
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
v4free/Ads/_2.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
v4free/Ads/_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
v4free/Ads/a_1.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
v4free/Ads/a_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
v4free/Ads/a_2.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
v4free/Ads/a_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
v4free/Ads/a_3.html
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
v4free/Ads/a_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
v4free/Ads/a_4.html
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
v4free/Ads/a_4.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
v4free/Ads/b_1.html
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
v4free/Ads/b_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
v4free/Ads/b_2.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
v4free/Ads/b_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
v4free/Ads/c_1.html
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
v4free/Ads/c_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
v4free/Ads/c_2.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
v4free/Ads/c_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
v4free/Ads/c_3.html
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
v4free/Ads/c_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
v4free/Ads/d_1.html
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
v4free/Ads/d_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
v4free/Ads/d_2.html
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
v4free/Ads/d_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
v4free/Ads/d_3.html
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
v4free/Ads/d_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
v4free/Ads/ivr.asp
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
v4free/Ads/ivr.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
v4free/Ads/l_1.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
v4free/Ads/l_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
v4free/Ads/p_1.html
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
v4free/Ads/p_1.html
Resource
win10v2004-20240802-en
General
-
Target
v4free/Ads/d_3.html
-
Size
31B
-
MD5
61d50d9ea3a9b0f697db0cca98674821
-
SHA1
c0a0206447e88c3613afc70ecca60be1a9376d9c
-
SHA256
a1e40f9df6732878d74fbe30b1fa1fade12b1b98dc81cd294b23e388079de639
-
SHA512
c6940051b2595878006b39c4432862cd687423773e9d411945041c515518e9d8d7f1cf8f4f07e6540a6153d23b5e495801268958cbdfa85e14cee2f39c865c7d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0D2F6C1-5995-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a061b5a2edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000983a4c7cbe8579fa66c0ca99fa54e66b9261ab21ca6a1e5e43a251958d234a02000000000e8000000002000020000000ea669f06600a509bc01b73165f9317549a56e37d7d6325e5355a4d23b5c1f1cb20000000db26e5f54811acf93ee510fc5cb23d1b6b8516b87f8be0a9e8d36146c03c2d0c400000008547331d6c6686bf2f0f0198d5091affc7c64d2ad76f1e5b0f8515980e141a845cf0881513211e7b465390257ef65a734e1a9632273cad3e25c36f925f7d6eaf iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429730445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\v4free\Ads\d_3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c14957e84b148212c401074df431475c
SHA1d2b52b91403238ca68a563220fcebf14547077d8
SHA2568986883f7d39d3ccc41939422d7682844b95bc83e79f319b567c4ead0acb8ec9
SHA5129619fa9297910f0c322a7f2b4c428d6f7b0ae23baadb936c837961da5defbd9a20feb817aca48228b14ad8797caa45a01377398cde5b7f1c359155dafea514fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206f4ab946487affea71f613aed9335f
SHA15e5d5452c34442e1c6f5ecd8d35c8f4e9a1d2777
SHA25612a6173963ef2ae93beddd40ff87c100a680148ba61d78a1b5087706c1309eb5
SHA512ecf2c3f501d40e69161b8d486f0b0d8d1928051e1721b509430eedd813bbe1570cbb636072a685136f96d8c7b11c08416ccd38eba3482ac45252fe6dc4e22681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58661fc31216fdc996611f86fe677e794
SHA18fe9c9713557d5dc65d420b62e2c33359f0a483d
SHA256a44f0958a06282ab2e978c989a17740bbd33d4488a5d61c7a4d99bd15660855c
SHA512399d9073e0c477baa7eb9e359ace84ab0cee7e151a53418fc1493601797646243f883b2fd02298e23714b66de897ba7bd666946ffc918b00a3f81220aa65d17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcee6c4a0d4d42c603285dc837d31360
SHA11647ed33d8c9179ac4972c89f3e3dfac8962d7b0
SHA2561a077e105398959fba2fa994742516037cbc95e4a749be7e5a743efe044da729
SHA512b8da426e702d0ce8a2165a89b9da3afb842054e7eabf4789a5441055152c625923219fc0f4fd33adbb0a18749578072be123cbb97be94df3fdb4ff11cb3c49cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec569ee0b8e1de78bbae6fed9b6a952
SHA197dd74a14f349b51f7521aa0a289752e29b99c38
SHA25648f755c11430db6024c51074cd5364aa0cfb982f7ecd92e6ff608db31057546d
SHA5127966f8a0a084010e27bfcbbd1eb7a7a4088c54893b11236f775b1e21f7c820a5bd49c3334d54517f0eb90659399e4ae834e80b5d8f7e566f66c4bd93cf514857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14c63c1e82afbb54d6d122f1b1f7a88
SHA13cb429cb47bcfefbe60f417403c057c6f5337f66
SHA256e5214d263b298347d2b9a23c34b214e6dd9f3c6cbaeccbdcdbfaa90acaf2b9fc
SHA5122128f39d27bde6d95bc4c8190ae27d61eb0051b78dc1ce09798eee3ab4944ea56a771e0e855426f12fb9317842d4f3de57de7d44cb4d4e2a4dd68f210a6e57b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57541fb2371a9f0041d2f7445b5dd1888
SHA13dad41d1bd030334eac198b4eaa3d632c0d06523
SHA2569301bccf00498d61ed334025a86cb3ca61667399da13b82867d4cb2269b84638
SHA512fb1a117a41cc5e92b7f0c2f8efe0e6227de5d63133fb2bcc5b2241fd98aac61b4475c82599978657df11bef1c2e8d467c70895acb25519301b94ad502c8665d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51557ef3dac45a784c9b74a61f7cbb59b
SHA16e56bfd132aceed7750cd018b9c50392048a2fdf
SHA2568ad8f75bb3ec713d5425a38d839fa50b86446fdede4931b3ba92fc3815d67fbc
SHA51279e4b3bccc9b30dd705374e1080484f40d094a6378de7b66fde26e2ebb3b5681aba62c77fce97ba4168ff64f9f525bf4b79d9fb56883d0065859f8492b845c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f8d5cec2853873a0927299c0cc7feed
SHA1c903125219680462d20dbc9207e3b82befc71e3f
SHA256f9a0022815be39012a3879761ed5cdeaff7f25158f729e171c7b1368454f21fd
SHA512b2f9239a190f5c8ff521cfe5e549b1b0e77c3235e598139fe6370c3219d065092dcc09c32390657ac50e3faf37fd4944cd4b227417b0fbb9b2aa5ff415ccc182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b9e67d592997ed366c0d9652cde1c1
SHA1c6eba2af390754b90832e5c07ed8dbd24bbcd06a
SHA25625e5275fb2f2d48bccdcf046184485a9c6d94cfbf522e400fd7b43a20cc6e5f9
SHA51218cb76ea6fcaade4d4eea9e06b67f1d6c629172e3c8b50c9d6d523925073683e035add5df8b3e677cac7bf19ccb40aff970ad65a0dc1dc25418fedfed97329c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b