Overview
overview
3Static
static
3v4free/Ads/_2.html
windows7-x64
3v4free/Ads/_2.html
windows10-2004-x64
3v4free/Ads/a_1.html
windows7-x64
3v4free/Ads/a_1.html
windows10-2004-x64
3v4free/Ads/a_2.html
windows7-x64
3v4free/Ads/a_2.html
windows10-2004-x64
1v4free/Ads/a_3.html
windows7-x64
3v4free/Ads/a_3.html
windows10-2004-x64
3v4free/Ads/a_4.html
windows7-x64
3v4free/Ads/a_4.html
windows10-2004-x64
3v4free/Ads/b_1.html
windows7-x64
3v4free/Ads/b_1.html
windows10-2004-x64
3v4free/Ads/b_2.html
windows7-x64
3v4free/Ads/b_2.html
windows10-2004-x64
3v4free/Ads/c_1.html
windows7-x64
3v4free/Ads/c_1.html
windows10-2004-x64
3v4free/Ads/c_2.html
windows7-x64
3v4free/Ads/c_2.html
windows10-2004-x64
3v4free/Ads/c_3.html
windows7-x64
3v4free/Ads/c_3.html
windows10-2004-x64
3v4free/Ads/d_1.html
windows7-x64
3v4free/Ads/d_1.html
windows10-2004-x64
3v4free/Ads/d_2.html
windows7-x64
3v4free/Ads/d_2.html
windows10-2004-x64
3v4free/Ads/d_3.html
windows7-x64
3v4free/Ads/d_3.html
windows10-2004-x64
3v4free/Ads/ivr.asp
windows7-x64
3v4free/Ads/ivr.asp
windows10-2004-x64
3v4free/Ads/l_1.html
windows7-x64
3v4free/Ads/l_1.html
windows10-2004-x64
3v4free/Ads/p_1.html
windows7-x64
3v4free/Ads/p_1.html
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
v4free/Ads/_2.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
v4free/Ads/_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
v4free/Ads/a_1.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
v4free/Ads/a_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
v4free/Ads/a_2.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
v4free/Ads/a_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
v4free/Ads/a_3.html
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
v4free/Ads/a_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
v4free/Ads/a_4.html
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
v4free/Ads/a_4.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
v4free/Ads/b_1.html
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
v4free/Ads/b_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
v4free/Ads/b_2.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
v4free/Ads/b_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
v4free/Ads/c_1.html
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
v4free/Ads/c_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
v4free/Ads/c_2.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
v4free/Ads/c_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
v4free/Ads/c_3.html
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
v4free/Ads/c_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
v4free/Ads/d_1.html
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
v4free/Ads/d_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
v4free/Ads/d_2.html
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
v4free/Ads/d_2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
v4free/Ads/d_3.html
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
v4free/Ads/d_3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
v4free/Ads/ivr.asp
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
v4free/Ads/ivr.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
v4free/Ads/l_1.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
v4free/Ads/l_1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
v4free/Ads/p_1.html
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
v4free/Ads/p_1.html
Resource
win10v2004-20240802-en
General
-
Target
v4free/Ads/a_2.html
-
Size
34B
-
MD5
86fb2488e6d05941bf2d94a24433a327
-
SHA1
ca5e866c393764a5cb897b731a0840879e28966d
-
SHA256
887fdce8580b9ed15bf00df9b88ab3d877660605393c05cd423a400dec7d7063
-
SHA512
89e1921926071ade7b44260351beaabe7640758fe86cb046822ea4a65053dd20fabb932d0dffb8cbc66d9823d6636669d2eaa8fbba1f1a4f845ebc1d6a2ff5e2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E47765E1-5995-11EF-BB68-FA57F1690589} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429730471" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000007a547d934afeb16b4346c852a7930cefa7a8bf06570f09e3a47354222330dfdb000000000e800000000200002000000087ac63af809ead9acb05da076f72b8865c5fc44d4742241c9018877135d1512420000000dc34e1c42c5daa3ed56ba1baf32441f9b479710ccb938272d0a4d5ffc7b0717140000000a4ead6f7ffcebf58d58cac7cbdf16cf26e16297d603ce027f1f3d1c2b339cee78d6b9386a597f8c9a3a707d7127a497f1eb26dfa3f8f5f7b229bde8a00456630 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300351b9a2edda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 688 iexplore.exe 688 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 688 wrote to memory of 848 688 iexplore.exe 29 PID 688 wrote to memory of 848 688 iexplore.exe 29 PID 688 wrote to memory of 848 688 iexplore.exe 29 PID 688 wrote to memory of 848 688 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\v4free\Ads\a_2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b90c6bf4765a1c65c6f88429831b5a0
SHA15e994becb52fcb42db064e4a3d786b544bdea531
SHA256f08956223b1b4bffb9007e2887af7b59c1acb453e1b040d21721e6734a68b783
SHA51254683535013930c41ee94da29b195159caa5b60d4e442cc6e0bfcb6b2ae17ca1a0b53cc46af03e64543eccb3733ca25ba814bd72fe9e3e571eb97b53977c4b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53adae6cf215d5166dca9b02becd80a00
SHA1d6f554b6028ae91d6e3fd27f2812175257b2d303
SHA2564afb250215e3d2d5ba0a9615e737f14194d4317b46e60ffe18f2ad3a3f306dbc
SHA512a091a9562d19e670bb71ebbf2a9b7d1e219c4539594b026f620042a45f379a43fbcc84a17b0f1ff0d032cd0df840b8a64ab2ec08d99fcf25ce254a51b777b0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7ede50d685620c821a8a4cdccd86b4
SHA1b02a4becd946c5d0b81e62c1d2744152f58154fc
SHA2561263d6313736234fe4d2b419e20b4957d035c83bdf92c8e2062d22008ab7e52f
SHA5120a64e54a807702a8ac15ee1f9fb8100763c3b3f92142865638d18d2ea975c221bb8af1559c8ab97de25faac71fe5969ec6c016c6cabf97b29f63a39421dff2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8bee437412b32c98a765779218271b9
SHA1158ebb1dd0a405a7e33805a6f47638123bd75037
SHA256daae09dc0292a416e9d892a6b75e5538364e4ba8deca1f250715039c8e2f4c17
SHA5127be4dc73bd642a6c40ae20648899ee4c6d4c75b2c83783746d747c17d921328ef5f9d1b80dc028161629aeba1ce6d39d9dc614eab22ad62c48c7b28cab97f5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5256d76c21da837a04a0271769e3e93dc
SHA1285f1cef73c588d8f7cb7c8583dbb4d81caee857
SHA2563622afc328c11dd201837189594e8a582eb6d9e3dc531059a7f106bd61490af3
SHA512c4ed1097f80b4d7880f76f2d1f8914350906d66890cc7cab8b36c46810c1f464a13c98e909ba8016fdfb71c868d094c94a2b92d0ff6ed43500c7caff9b7d38ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b33aae7f30342c8ee3f9e916a8dd60
SHA1d95de7226b5c7054742a86da93d88f3e5680cec9
SHA256dda725ca7319b779f99fee8196e10113d4cfed225602f629ebddef7e7a1091d6
SHA5125dd0943285cd3a54d0f9f72d20687ba1a4729d9e97ed5b3a3e89bad900029f4e8008ce76cc5a5133d0d3a2a17c20d9de01bc6f6d4ab4a223db0171d4d5dd5663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b46c75669eca24b25aea8e458a61d8
SHA123e0ef65e0038b025a5f3f48e7fd18ae6f360ea1
SHA2562d8da674a9cb3e82aa6611001ba2c0ed244808c122f2c8eedb5ae811be5743b5
SHA512e369dd7478f2feafdb9639199f5d7df6dc0d70639e2fc459f918a9c4c9780b5dfd30e14895b543ffe53c6a0562858d0e40c9a4618b417acce4b3c1bcba46c960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f77ad1b724d279f63fb72b31f483e05d
SHA1cd3a32baa8ee006d495e4b34d9e4f48c0d07b0ac
SHA256416e1564f575d86ab823733ad6d92f738e55c08b0ec3efd6e08f23e1d7e132ab
SHA5125e55d06b569ab027ae1350bbe67123d6c9343f23ad8f78ef8d508ba264391c6bd4ff3360e91c7f5dc61622840b39960bb1b863b98216ef87bccf879261cb0b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476972a1eaa582399a9d165803504bb6
SHA15ad1b4135f293b2a4b5bc2400d98fca3a5f465d2
SHA256f1d44f2f6fc9108cfb5651880782fcb13d798607175930b615fca23140a5e5f3
SHA512796b6c0a109dbc10a40345d269bea401d5988edfc94300a47096ea3d6fba2366073be8a9c87cdecc877395b71277ae25e6bd57d41460d09bcd9ec685ea69f013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5520b7d0cb1dba6a303660bf3cbbb67
SHA1bf271fceefa089568c7d707d9c3c50d69486b34a
SHA25674c7120c611a9add658136a72eae2e81d0e1c90b329c70b11b79aa2890663526
SHA512e28de1d117e293198b408a12c6a51e29e3be4c560c9942074bd98e7c7a8cf1ac216a88023980f80e31406b13dc1a8c3c7916a787b5a8e4b7b3b357ae4d53ab7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f828518dfd49a41a56eeddc5d027b26
SHA14a13073233387a24712f5e67d6b04fddb52db8cc
SHA256da60e42c67e4fc1834d1085e2c76cb93c7238427bb725134a7054d4cbd7de26b
SHA5126d8c0ef9768f98cb5a235bfe6c0faf1a1af9db06b9962bdba3001f809cbcbb407be745b910ba413a73dedee01f206d6b67fa0dec99c5747ca8807210a700c77d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b