Payment Notification.html
This report is generated from a file or URL submitted to this webservice on September 23rd 2019 06:37:50 (UTC) and action script Default browser analysis
Guest System: Windows 7 32 bit, Professional, 6.1 (build 7601), Service Pack 1
Report generated by
Falcon Sandbox v8.30 © Hybrid Analysis
Incident Response
Risk Assessment
- Network Behavior
- Contacts 1 domain. View all details
MITRE ATT&CK™ Techniques Detection
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 2
-
External Systems
-
Sample was identified as malicious by a trusted Antivirus engine
- details
- No specific details available
- source
- External System
- relevance
- 5/10
-
Sample was identified as malicious by at least one Antivirus engine
- details
- 3/57 Antivirus vendors marked sample as malicious (5% detection rate)
- source
- External System
- relevance
- 8/10
-
Sample was identified as malicious by a trusted Antivirus engine
-
Informative 13
-
Anti-Reverse Engineering
-
Creates guarded memory regions (anti-debugging trick to avoid memory dumping)
- details
- "iexplore.exe" is protecting 8192 bytes with PAGE_GUARD access rights
- source
- API Call
- relevance
- 10/10
-
Creates guarded memory regions (anti-debugging trick to avoid memory dumping)
-
General
-
Contacts domains
- details
- "ocsp.pki.goog"
- source
- Network Traffic
- relevance
- 1/10
-
Creates mutants
- details
-
"\Sessions\1\BaseNamedObjects\UpdatingNewTabPageData"
"\Sessions\1\BaseNamedObjects\IsoScope_94c_IESQMMUTEX_0_519"
"IsoScope_94c_IESQMMUTEX_0_519"
"{5312EE61-79E3-4A24-BFE1-132B85B23C3A}"
"IsoScope_94c_IE_EarlyTabStart_0x9ac_Mutex"
"UpdatingNewTabPageData"
"IsoScope_94c_IESQMMUTEX_0_303"
"IsoScope_94c_ConnHashTable<2380>_HashTable_Mutex"
"Local\ZonesLockedCacheCounterMutex"
"Local\URLBLOCK_HASHFILESWITCH_MUTEX"
"Local\!BrowserEmulation!SharedMemory!Mutex"
"Local\URLBLOCK_DOWNLOAD_MUTEX"
"IsoScope_94c_IESQMMUTEX_0_331"
"Local\VERMGMTBlockListFileMutex"
"{66D0969A-1E86-44CF-B4EC-3806DDDA3B5D}"
"Local\ZonesCacheCounterMutex"
"Local\URLBLOCK_FILEMAPSWITCH_MUTEX_2380"
"\Sessions\1\BaseNamedObjects\Local\!BrowserEmulation!SharedMemory!Mutex"
"\Sessions\1\BaseNamedObjects\Local\VERMGMTBlockListFileMutex"
"\Sessions\1\BaseNamedObjects\Local\URLBLOCK_FILEMAPSWITCH_MUTEX_2380" - source
- Created Mutant
- relevance
- 3/10
-
Drops files marked as clean
- details
- Antivirus vendors marked dropped file "urlblockindex_1_.bin" as clean (type is "data")
- source
- Binary File
- relevance
- 10/10
-
Opened the service control manager
- details
-
"iexplore.exe" called "OpenSCManager" requesting access rights "SC_MANAGER_CONNECT" (0x1)
"iexplore.exe" called "OpenSCManager" requesting access rights "0XE0000000L" - source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1035 (Show technique in the MITRE ATT&CK™ matrix)
-
Scanning for window names
- details
-
"iexplore.exe" searching for class "ImmersiveWorkerWindowClass"
"iexplore.exe" searching for class "Shell_TrayWnd"
"iexplore.exe" searching for class "MS_AutodialMonitor"
"iexplore.exe" searching for class "MS_WebCheckMonitor" - source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1010 (Show technique in the MITRE ATT&CK™ matrix)
-
Spawns new processes
- details
- Spawned process "iexplore.exe" with commandline "SCODEF:2380 CREDAT:275457 /prefetch:2" (Show Process)
- source
- Monitored Target
- relevance
- 3/10
-
Spawns new processes that are not known child processes
- details
- Spawned process "iexplore.exe" with commandline "SCODEF:2380 CREDAT:275457 /prefetch:2" (Show Process)
- source
- Monitored Target
- relevance
- 3/10
-
Contacts domains
-
Installation/Persistance
-
Creates new processes
- details
- "iexplore.exe" is creating a new process (Name: "%PROGRAMFILES%\Internet Explorer\iexplore.exe", Handle: 140)
- source
- API Call
- relevance
- 8/10
-
Dropped files
- details
-
"urlblockindex_1_.bin" has type "data"
"6BADA8974A10C4BD62CC921D13E43B18_BEB37ABADF39714871232B4792417E04" has type "data"
"suggestions_1_.en-US" has type "data"
"~DF7A5A01E1ED28FEF9.TMP" has type "data"
"verD103.tmp" has type "XML 1.0 document UTF-8 Unicode (with BOM) text with CRLF line terminators"
"BE8B021F9E811DFC8C8A28572A17C05A_C043DB162961BEE10817887794506B41" has type "data"
"ErrorPageTemplate_1_" has type "UTF-8 Unicode (with BOM) text with CRLF line terminators"
"58Q5QOLH.txt" has type "ASCII text"
"0MXRD3N0.txt" has type "ASCII text"
"favicon_4_.ico" has type "PNG image data 16 x 16 4-bit colormap non-interlaced"
"TL884FMB.txt" has type "ASCII text"
"search__0633EE93-D776-472f-A0FF-E1416B8B2E3A_.ico" has type "PNG image data 16 x 16 4-bit colormap non-interlaced"
"GN1U29FL.txt" has type "ASCII text"
"httpErrorPagesScripts_1_" has type "UTF-8 Unicode (with BOM) text with CRLF line terminators"
"_F05F42B7-DDCC-11E9-9A66-0A00274454EA_.dat" has type "Composite Document File V2 Document Cannot read section info"
"XV236CYN.htm" has type "HTML document ASCII text with CRLF LF line terminators"
"57C8EDB95DF3F0AD4EE2DC2B8CFD4157" has type "Microsoft Cabinet archive data 6894 bytes 1 file"
"VJWYXGX3.txt" has type "ASCII text"
"RecoveryStore._F05F42B5-DDCC-11E9-9A66-0A00274454EA_.dat" has type "Composite Document File V2 Document Cannot read section info"
"YV6DLAG1.htm" has type "HTML document ASCII text with very long lines" - source
- Binary File
- relevance
- 3/10
-
Found a string that may be used as part of an injection method
- details
- "Shell_TrayWnd" (Taskbar window class may be used to inject into explorer with the SetWindowLong method)
- source
- File/Memory
- relevance
- 4/10
- ATT&CK ID
- T1055 (Show technique in the MITRE ATT&CK™ matrix)
-
Creates new processes
-
Unusual Characteristics
-
Drops cabinet archive files
- details
- "57C8EDB95DF3F0AD4EE2DC2B8CFD4157" has type "Microsoft Cabinet archive data 6894 bytes 1 file"
- source
- Binary File
- relevance
- 10/10
-
Installs hooks/patches the running process
- details
-
"iexplore.exe" wrote bytes "b033e56e" to virtual address "0x6B22F6A0" (part of module "IEFRAME.DLL")
"iexplore.exe" wrote bytes "b033e56e" to virtual address "0x767F11B8" (part of module "SHLWAPI.DLL")
"iexplore.exe" wrote bytes "60d2e86e" to virtual address "0x767F13B8" (part of module "SHLWAPI.DLL")
"iexplore.exe" wrote bytes "b033e56e" to virtual address "0x768617CC" (part of module "ADVAPI32.DLL")
"iexplore.exe" wrote bytes "b033e56e" to virtual address "0x754B1100" (part of module "MSCTF.DLL")
"iexplore.exe" wrote bytes "b033e56e" to virtual address "0x75281164" (part of module "USP10.DLL")
"iexplore.exe" wrote bytes "b033e56e" to virtual address "0x7673917C" (part of module "IERTUTIL.DLL")
"iexplore.exe" wrote bytes "a035e56e" to virtual address "0x754B1298" (part of module "MSCTF.DLL")
"iexplore.exe" wrote bytes "a035e56e" to virtual address "0x753D1064" (part of module "IMM32.DLL")
"iexplore.exe" wrote bytes "60cde86e" to virtual address "0x758E1E14" (part of module "SHELL32.DLL")
"iexplore.exe" wrote bytes "a035e56e" to virtual address "0x76DA1144" (part of module "LPK.DLL")
"iexplore.exe" wrote bytes "a035e56e" to virtual address "0x758E202C" (part of module "SHELL32.DLL")
"iexplore.exe" wrote bytes "c03ae56e" to virtual address "0x6B22FE80" (part of module "IEFRAME.DLL")
"iexplore.exe" wrote bytes "60cde86e" to virtual address "0x6B22FEC0" (part of module "IEFRAME.DLL")
"iexplore.exe" wrote bytes "a035e56e" to virtual address "0x767F131C" (part of module "SHLWAPI.DLL")
"iexplore.exe" wrote bytes "c0bfe66e" to virtual address "0x758E1F68" (part of module "SHELL32.DLL")
"iexplore.exe" wrote bytes "60d2e86e" to virtual address "0x6B22FEC4" (part of module "IEFRAME.DLL")
"iexplore.exe" wrote bytes "b033e56e" to virtual address "0x76CD14E0" (part of module "USER32.DLL")
"iexplore.exe" wrote bytes "b033e56e" to virtual address "0x753D1210" (part of module "IMM32.DLL")
"iexplore.exe" wrote bytes "70cce86e" to virtual address "0x767F1310" (part of module "SHLWAPI.DLL") - source
- Hook Detection
- relevance
- 10/10
- ATT&CK ID
- T1179 (Show technique in the MITRE ATT&CK™ matrix)
-
Drops cabinet archive files
File Details
Payment Notification.html
- Filename
- Payment Notification.html
- Size
- 235KiB (240691 bytes)
- Type
- html
- Description
- HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
- Architecture
- WINDOWS
- SHA256
- 47aa34f1704a3195c13a545a9fa76b8e361d7124a013cb96a3f4fbb6cd2927be
- MD5
- 762b9392cf1656a9f92ebe53072a24f2
- SHA1
- 57e126a91ca6f0677127e2eb7f44b8341fc56b96
- ssdeep
- 6144:NwO1sBRElwa6/8y/DLQKHWnVyd7wSXaYlbE6q:p1WClwl8znVydMFL
Classification (TrID)
- 100.0% (.TXT) Text - UTF-8 encoded
Screenshots
Loading content, please wait...
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 2 processes in total.
-
iexplore.exe
C:\47aa34f1704a3195c13a545a9fa76b8e361d7124a013cb96a3f4fbb6cd2927be.html
(PID: 2380)
- iexplore.exe SCODEF:2380 CREDAT:275457 /prefetch:2 (PID: 3048)
Network Analysis
DNS Requests
Domain | Address | Registrar | Country |
---|---|---|---|
ocsp.pki.goog |
172.217.0.227
TTL: 106 |
- | United States |
Contacted Hosts
No relevant hosts were contacted.
HTTP Traffic
Endpoint | Request | URL | |
---|---|---|---|
172.217.0.227:80 (ocsp.pki.goog) | GET | ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D | GET /gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.pki.goog More Details |
172.217.0.227:80 (ocsp.pki.goog) | GET | ocsp.pki.goog/gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEAGnin9eu7e6AgAAAABC%2F%2... | GET /gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEAGnin9eu7e6AgAAAABC%2F%2B0%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.pki.goog More Details |
Extracted Strings
Extracted Files
Displaying 21 extracted file(s). The remaining 26 file(s) are available in the full version and XML/JSON reports.
-
Clean 1
-
-
urlblockindex_1_.bin
- Size
- 16B (16 bytes)
- Type
- data
- AV Scan Result
- 0/66
- MD5
- fa518e3dfae8ca3a0e495460fd60c791
- SHA1
- e4f30e49120657d37267c0162fd4a08934800c69
- SHA256
- 775853600060162c4b4e5f883f9fd5a278e61c471b3ee1826396b6d129499aa7
-
-
Informative Selection 1
-
-
en-US.2
- Size
- 18KiB (18176 bytes)
- Type
- data
- Runtime Process
- iexplore.exe (PID: 2380)
- MD5
- 5a34cb996293fde2cb7a4ac89587393a
- SHA1
- 3c96c993500690d1a77873cd62bc639b3a10653f
- SHA256
- c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
-
-
Informative 19
-
-
0MXRD3N0.txt
- Size
- 331B (331 bytes)
- Type
- text
- Description
- ASCII text
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- bef4173bfacc0e266cf602b2d61edf2a
- SHA1
- e1bed1bc25ffd97f3cf5c16c18026e39fe680b31
- SHA256
- a472236676e46572874f253ca619cabd3e6095dcc0c2d1517c73808f557a3efc
-
3RQ7ZBFA.txt
- Size
- 158B (158 bytes)
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- 01357e946dfb56e0f3e7a640fcf20897
- SHA1
- e5c8294fad16119cf53f9c9fa7ee047acb0329dc
- SHA256
- c92cf76f5327dc4b67fd4d4057bb82a5736b7a9f8d1abf159f3b0909ba95665a
-
58Q5QOLH.txt
- Size
- 77B (77 bytes)
- Type
- text
- Description
- ASCII text
- Runtime Process
- iexplore.exe (PID: 2380)
- MD5
- c24abbae1ea854fd300f8bafc4263561
- SHA1
- cff23c4e2496967597022a25ee4c49fdc2d1c989
- SHA256
- fa4a0ffa72c6178bb6e64e4bdf23e05093dcb0799931beb99a9d17fab6e3dffa
-
6J34Z0LJ.txt
- Size
- 97B (97 bytes)
- Runtime Process
- iexplore.exe (PID: 2380)
- MD5
- 264a26829f20cca78b289c5ee5678f53
- SHA1
- 56c888b65b6235b33f585856011dd0d9f6236e40
- SHA256
- eb35ca442e9ffa3cb27afbf8e1241293ef1505bb5774a30c794f41a158bf0a45
-
8MTJWM4N.txt
- Size
- 65B (65 bytes)
- Runtime Process
- iexplore.exe (PID: 2380)
- MD5
- f56992e992072f3a3ad564fa7af1c327
- SHA1
- 237f9ff261ec974c5a942bcd1a2d4418474423f5
- SHA256
- 9a7cc99e1bf14c5c200e652d5db1927ab9582b04138e8e9df483d6e8e7149821
-
AOM0C1HE.txt
- Size
- 86B (86 bytes)
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- ab9955177998d2c3ef86db05bbe15ed0
- SHA1
- 1f4fb55ec82b661a8d907a03e794eb208e221688
- SHA256
- 705db9b4deb0bb8faaf909348efe391b096ee3ca4da3e5343b3ac73a629232f3
-
F5G7WI1L.txt
- Size
- 437B (437 bytes)
- Runtime Process
- iexplore.exe (PID: 2380)
- MD5
- 480d9e58e0277b802a2d6c2bc446ba09
- SHA1
- c48003da20aba3b125896a85b27ef23e31f48a55
- SHA256
- 29fc1551bdd233c1c8b4c6641ef3b38fa67a59c2d7dd12da12af7870d1eca5a9
-
GN1U29FL.txt
- Size
- 331B (331 bytes)
- Type
- text
- Description
- ASCII text
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- eb91796d4dd053b2dac8e0d062a07978
- SHA1
- 2bbae938652ca8477983b59d177a6eaebf90d080
- SHA256
- 0dba90fbb7cbe9a8c6f13233a2edfd1027c4e2e9899cb631a58d11af9cc83b5e
-
TL884FMB.txt
- Size
- 197B (197 bytes)
- Type
- text
- Description
- ASCII text
- Runtime Process
- iexplore.exe (PID: 2380)
- MD5
- f584047c6208fcb1db6088d2910ae51b
- SHA1
- 5bb1354418c0c637a5c5e1c9c5f03dfb7d84d065
- SHA256
- 7b5298e2137bd39dd9cc19503d225ac09bd0eccc9f47382fe6e53635ca8f8dfa
-
VJWYXGX3.txt
- Size
- 331B (331 bytes)
- Type
- text
- Description
- ASCII text
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- bb3965fa1e5476314ed389fec762597a
- SHA1
- baa4e184c7afc330ffdad960dfaca0d20f093953
- SHA256
- 0f594d2094e65bbb7c55fbb5143bdf96f44b568f48b674fa51938c47092aafd0
-
YRO77FCQ.txt
- Size
- 279B (279 bytes)
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- 6f3614c7d4972313241b96f71bdeb6bc
- SHA1
- d31b50fb5da61883a9987ecb74deb8bb535e5e06
- SHA256
- da4b8fe115d53aacfa56caed3e71087c61ac68f7a36a16607b82515e27f9e16b
-
verD103.tmp
- Size
- 15KiB (15845 bytes)
- Type
- text
- Description
- XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- 095c72688de7d90e6526dc0d8878f3f6
- SHA1
- a1cae182fb7e86c74fb5467c0014b2a27472be37
- SHA256
- 8684403da59628039e9b4b0d245c5b7e1fac1242a087ded44eaf3b792e4a231e
-
YV6DLAG1.htm
- Size
- 33KiB (34259 bytes)
- Type
- html
- Description
- HTML document, ASCII text, with very long lines
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- 14db5e73a7821862877d369537e96397
- SHA1
- 69c40b614ddaf6567446b7ea6a4565c7c6a53bf9
- SHA256
- d9bdb2adcec65dd64ebbedaed592e5050e75b2735e384d6171ab8156e2dc338e
-
XV236CYN.htm
- Size
- 219B (219 bytes)
- Type
- html
- Description
- HTML document, ASCII text, with CRLF, LF line terminators
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- d4b691cd9d99117b2ea34586d3e7eeb8
- SHA1
- c79f5572f672361bc097676cb5da9d4aa956c8b9
- SHA256
- 2178eedd5723a6ac22e94ec59bdcd99229c87f3623753f5e199678242f0e90de
-
57C8EDB95DF3F0AD4EE2DC2B8CFD4157
- Size
- 342B (342 bytes)
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- 55950957a1c8ed660eb6d0b59c8ab86d
- SHA1
- d9a82728d903505b36ea2938f8b12e264a31589c
- SHA256
- 8afdd6e898c9bf1c6f49aa82dcb016383e756b254471a1868b02f249392930d5
-
6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
- Size
- 1.5KiB (1507 bytes)
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- 47dad7ba66bd5deb2e0199dfedfa8aa9
- SHA1
- ecda92f784632b46419c403ea8b021a5ee5fee3f
- SHA256
- 4408cfa36b81c8c63d059b0abbffcdf970859806e0d0b9a6e17be835a9cc197b
-
6BADA8974A10C4BD62CC921D13E43B18_BEB37ABADF39714871232B4792417E04
- Size
- 434B (434 bytes)
- Runtime Process
- iexplore.exe (PID: 2380)
- MD5
- 1870c212cafa788bed4b2a3f1ab70b98
- SHA1
- a33fd0256b8d03fd6d6c7281ccd80f4fff132182
- SHA256
- 921fc54ab1c4b46e61440da97a12569eb007e5de84afbd7b54c929c49f809b42
-
BE8B021F9E811DFC8C8A28572A17C05A_C043DB162961BEE10817887794506B41
- Size
- 418B (418 bytes)
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- 04ba9605ffe3b82bee1be811f9588ce4
- SHA1
- 70b4534507fdb966bb309c88fd5a57bf94e07a44
- SHA256
- 926486c73af22ea5e459a85343c4b3cc34f00fad46dfc1fe4bf9a95d6fb59924
-
CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
- Size
- 394B (394 bytes)
- Runtime Process
- iexplore.exe (PID: 3048)
- MD5
- 24a49509a61b5d09321c8fb5fe39ae31
- SHA1
- 39e1e70c960645b6a9032368de9a4543e1de315a
- SHA256
- b4e0e873e45794594b7349d7aa8ad7e24440b8fb3da0ece9aaa89a6286338040
-
Notifications
-
Runtime
- Network whitenoise filtering was applied
- Not all sources for indicator ID "binary-0" are available in the report
- Not all sources for indicator ID "hooks-8" are available in the report
- Not all sources for indicator ID "mutant-0" are available in the report
- Some low-level data is hidden, as this is only a slim report
Anonymous commented 4 years ago updated