Overview
overview
3Static
static
3v4free/Ads/_2.html
windows7-x64
3v4free/Ads/_2.html
windows10-2004-x64
3v4free/Ads/a_1.html
windows7-x64
3v4free/Ads/a_1.html
windows10-2004-x64
3v4free/Ads/a_2.html
windows7-x64
3v4free/Ads/a_2.html
windows10-2004-x64
1v4free/Ads/a_3.html
windows7-x64
3v4free/Ads/a_3.html
windows10-2004-x64
3v4free/Ads/a_4.html
windows7-x64
3v4free/Ads/a_4.html
windows10-2004-x64
3v4free/Ads/b_1.html
windows7-x64
3v4free/Ads/b_1.html
windows10-2004-x64
3v4free/Ads/b_2.html
windows7-x64
3v4free/Ads/b_2.html
windows10-2004-x64
3v4free/Ads/c_1.html
windows7-x64
3v4free/Ads/c_1.html
windows10-2004-x64
3v4free/Ads/c_2.html
windows7-x64
3v4free/Ads/c_2.html
windows10-2004-x64
3v4free/Ads/c_3.html
windows7-x64
3v4free/Ads/c_3.html
windows10-2004-x64
3v4free/Ads/d_1.html
windows7-x64
3v4free/Ads/d_1.html
windows10-2004-x64
3v4free/Ads/d_2.html
windows7-x64
3v4free/Ads/d_2.html
windows10-2004-x64
3v4free/Ads/d_3.html
windows7-x64
3v4free/Ads/d_3.html
windows10-2004-x64
3v4free/Ads/ivr.asp
windows7-x64
3v4free/Ads/ivr.asp
windows10-2004-x64
3v4free/Ads/l_1.html
windows7-x64
3v4free/Ads/l_1.html
windows10-2004-x64
3v4free/Ads/p_1.html
windows7-x64
3v4free/Ads/p_1.html
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
v4free/Ads/_2.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
v4free/Ads/_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
v4free/Ads/a_1.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
v4free/Ads/a_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
v4free/Ads/a_2.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
v4free/Ads/a_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
v4free/Ads/a_3.html
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
v4free/Ads/a_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
v4free/Ads/a_4.html
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
v4free/Ads/a_4.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
v4free/Ads/b_1.html
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
v4free/Ads/b_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
v4free/Ads/b_2.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
v4free/Ads/b_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
v4free/Ads/c_1.html
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
v4free/Ads/c_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
v4free/Ads/c_2.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
v4free/Ads/c_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
v4free/Ads/c_3.html
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
v4free/Ads/c_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
v4free/Ads/d_1.html
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
v4free/Ads/d_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
v4free/Ads/d_2.html
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
v4free/Ads/d_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
v4free/Ads/d_3.html
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
v4free/Ads/d_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
v4free/Ads/ivr.asp
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
v4free/Ads/ivr.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
v4free/Ads/l_1.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
v4free/Ads/l_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
v4free/Ads/p_1.html
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
v4free/Ads/p_1.html
Resource
win10v2004-20240802-en
General
-
Target
v4free/Ads/l_1.html
-
Size
31B
-
MD5
61d50d9ea3a9b0f697db0cca98674821
-
SHA1
c0a0206447e88c3613afc70ecca60be1a9376d9c
-
SHA256
a1e40f9df6732878d74fbe30b1fa1fade12b1b98dc81cd294b23e388079de639
-
SHA512
c6940051b2595878006b39c4432862cd687423773e9d411945041c515518e9d8d7f1cf8f4f07e6540a6153d23b5e495801268958cbdfa85e14cee2f39c865c7d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1F65881-5995-11EF-913A-D61F2295B977} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429730457" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d72c13cd38f90d10055d3dd5b3d18da4f5b4c38bcb94435de345e893072d7ba8000000000e8000000002000020000000f0f84cb886ac472c741d139615e51eeb1db1317b36ac9bce041fff367c6c602720000000313db17cf2a31206f3adb6ac070d97b6d594493b71b5313753e91c46ce559e0a40000000956d0e58523927d2a128131bc3a90ccf90b7e2b01a83efd5e8beece0ea7d37230a6cd29abfe712035e50db85b4c4edf22a3116f9cb811e035b4dc72b2bc4f349 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000479b6a2edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2704 2824 iexplore.exe 30 PID 2824 wrote to memory of 2704 2824 iexplore.exe 30 PID 2824 wrote to memory of 2704 2824 iexplore.exe 30 PID 2824 wrote to memory of 2704 2824 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\v4free\Ads\l_1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b56629393c8ea1e06a4314806e9be7b
SHA14c319729aa0f1118ff983ad1e813fe9b2ad8db1c
SHA2569ee01b1405aeb0b7423114ef898d47b827a85e8c2e4025d30586626a262e1dd2
SHA512cfe01148bc4d49eae49c6d0c9100d43695f0189783451dcab7afa0ecba6d6519f507e54872944cfeaf5dcd8c16f793e339cf56353d9b4138a952afb7daa96733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502042cc9fcabde9c4b0e1df45aca04b8
SHA1bfc71effe7018f0060b1fa98619c34a280814af5
SHA25629b71ae30ade63083129a852f6d53b99e68591fbc807bbae60e9c22cbaa9738f
SHA51242dd5aa025e16a38ae5613e413583d49444f9bd063afeb97fea92f7091cce1370c3fdfbd0eb319ec63d7d3ad3d4d3c16337e053533d265ac814193fc97cdfecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ffb7692c3d66e7300e5a6664c8e783
SHA123f70385444d1ceaf36f7df2bde237560401d770
SHA256f37e46a861f89e7d4132337fe4c616eabec311c7525e9d8ebd2b544565f537eb
SHA5122cb01681089773cdf544b8fde1773de4ee20933062f2fa21918fe21b6504c23c3239e9139d86f891b2e2259171378646074f1f9de275be97d9a963c486e00cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe8c501c1abd2de124ba38fea2302a9
SHA16af46ecc6e005c56cec11c161c3012c9ce91a139
SHA256f955f8968ecb0f7463371898b41fba3c2efec135e76a7378457228f46e8709de
SHA512aba46af432fc44cc9f564f048e0c3d52e1c083dc9ee815527e2782819ea693d6085beaaef46e873102c55bc2c14afa21b8adfbbd83817c15e8bca70b89963e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c74c1169a14c079d6ffcdbd9314d4cf
SHA110dedf5d9e95af8f050765c7dec5eddd8d466bc6
SHA2560cfcdb824316e1b95b1c683816af4ac635c054d0e51712f9de69ec0dfb45830a
SHA512efbff161d15dd9adb634f7a455e98907ed6193d24dfc11a567af788d82760fe79525faec7bc5132dbd47c0c7fec488738a7531a648aa3d753c3dc46cfc17210f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4d24b214d0ce9c252708fb5e74b050
SHA1269177aa512b07323da798cf631ea76ee0e8a5ce
SHA256390a677802e03a661cd3c283343f1a6b4138539bd4fc5ef810190a922f64a719
SHA512327591300ae64a32a826af9a2c0825d915b68e187f4b236ad26dab46745c1ee8a4b96356cef1b1a0b89e67639404c0cbdb4ed3a64ee139fb66d0cb1212fdc12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50282811c3b555af94ec7bf4baf4ceb33
SHA1a79f840fff413f70c91957259098f6741bb3ccec
SHA2563cc132cdcedee407b671483a56dec9e0abbf17eb9a08f689749fca0c0d62e0c4
SHA5120fe2377d468b63597aebe2aee7f20580a89b6f3b9164fd358d75bdc5a15960e95f7b471fccfcbb2025d43e2d21168c6d08148158c48429e20a466a9f1503118a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660a72900253a3ebfe6685a7be862fa3
SHA1edbea00535be996823cc073a3f53369831f2651a
SHA2563e27c3895e900a17867adbb126e68775a9931d81f8918e45a092526cca505315
SHA5120d4a8f796b109605fe31e77f4195f7d842bccb75d06977e36d42553aea6e07851d7300a4953ae1a17301d60c8f569eeb71cbd6bf0822b80dbc884e4c5ce48146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561b80de4235f7fa4a1a33b5f9b6de0e
SHA12722da4a345b107328dfdb3e45a36afeaf3f6eb2
SHA256ea4595fa9413b1162f7c07608fdf771ee255eed2465a5195528dc9e3c18e8702
SHA512f3d4d63a1e2b0cd2d79271395fa6925c80cb7b8b06afae02faaf5c7df028be725e0e987df9f1834977427b547cd2699546131462d92f7082aa84e4e1730c38c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a1c19010cc6308b3157e11bdf54320
SHA11e8157d02df4200101825734fe0227ee82681995
SHA2566e03393bcb2163094d8aa5787944837818b335f0c03f8246f665fcee954b5059
SHA512f84f7e90b9644b17e4de1fda001755831c7ea13d0e559bcd186e89b17d03959833fca919fa6e7e00bddcd14e33895c519320100b9d2c628645f85ccadc5c44b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1235d69c66603f7132f65050b3d389f
SHA1549c347d0c5b1d0c1ed9f6c7285a1daf6c72cdb4
SHA256b5b4fe806549abeb3fefc55db939ced3289650d1d999ba07538970de2a941c01
SHA5122c57e2975599ab972f0037cca5029d01c2d83335ca004086ca6cdfb37befd0496a46d8c293c4dce91f6ae8b575545ba251cda93d2903c05ab8b82b8cafb79bcb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b