Analysis
-
max time kernel
35s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 13:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://uidreg.titan.in/otp-verification.php
Resource
win7-20240708-en
General
-
Target
https://uidreg.titan.in/otp-verification.php
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1030ac9f15fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000996a2d1ec90f9c3b5f5e1c92b29d5ef4933ef1d3fc08397dd90fd462d7975d62000000000e8000000002000020000000b896364d3e87bae1ab0c20b6de2df72c516e1f04d26e30860d4cac3321cdcec8200000005449863a77b4dfe02445a5854c5961702ac228f633f9ba5d0c965943f82ea28c4000000018288caa3a5c7513dee9167fae6ca3f9b46b3d7b716a8c4d2aa751ff66d3c2d0f78b33d4d9d66410c1407f87014830be21fbafe2be49d9d281d544f83f1c5a7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3E85931-6608-11EF-8995-CA26F3F7E98A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 264 IEXPLORE.EXE 264 IEXPLORE.EXE 264 IEXPLORE.EXE 264 IEXPLORE.EXE 2012 iexplore.exe 2012 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 264 2012 iexplore.exe 30 PID 2012 wrote to memory of 264 2012 iexplore.exe 30 PID 2012 wrote to memory of 264 2012 iexplore.exe 30 PID 2012 wrote to memory of 264 2012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://uidreg.titan.in/otp-verification.php1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e99df19ef07b025474797cba8ad4567
SHA15060ceb7c6caca111d07c0a62aa9b958b65c6425
SHA256e3acdde5f0c17afbd9e8c95de2b66fd0b9aba99dbb7af9fb9d34507b77900272
SHA512a9e9c841a12bd246b7baa59732c9b55fed730f079832f6253199bd1a987100af3d5663ca2713c09fa1639b00f23dbb0b52cfa97bc21568d0367360a1d0258fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ac2db39204e140c3945706b1cf8886
SHA179e935e4d0fec4f1f560c0465c82f7d98fbed197
SHA2561b351a0cacf28fb30d43ecbccdd01178c0405fb1bea7d0290e3906e702179485
SHA5124aa02e567b3ced56b2e47d3e298e2e379aef0d92b361830977d05248b962d847c09eabd0c5005f57aa2bdfcf526e3bfbd87b5fd2aa097d820a5e99443bd43025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c378157ed02a6bb6ff9051df6394f63
SHA1afd10235c7fa6565efabd5001f02037e009d360d
SHA25668988954fbb796ef43a7b6feec4a45545ad69d2f7eba0830328a4ae81ee9cddb
SHA512fa5815a5c85b20569183ed895df0d60eab5d7013b175f4077239d7deae91699aec3d0fb4773ca506f0e36c6f2e743b1bf2754c79d4335f008589f84289dc691d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501044d19a1ba23b841afe31f65bacd6b
SHA1d2b08cbc48f964dda6e59b079d05d0544d82ac4c
SHA256e3033ff8843a4dddc78ab772a55ac72d626a14c40803249a5f749c86277b0c60
SHA512b7c2cf5b4588484a584203404e8cdf7cd53c71747cae20e568911a72195676e83fa451430d7054f948b72767485387ca78f373a3f4f581c2e66113d449f576af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942bf87cefd87ed048a2483055dc608d
SHA1cad559271c45051935e2365a387560e1763f6ef3
SHA2564c1acfc295edc64a964c1bbae405dd06102df57b8faa516353ae7c0d00ba2a0e
SHA51272743e54dadeab1c224d1036cc46fa6af54856dde0f0feb3f79d1f1489adad17ca758c1c47dfaba80a55b25844ec0c936d45f32bc30398ef1f0ed7bd6b1e58fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca502ff4d535d0b754505468dbc85f0
SHA1c18add561bf37250b7b9b22cbcfc954d914bfa45
SHA256bf0a020dd368ac0b10f8305a78651f8c7d5cb3d77d7ea68a0aaa2be84bdac718
SHA512d2ae2d5c7d8cc0cba43a7316987b768b5e71dfccd519f294794656e745e3f81df6943502b958fb0332548e3998bdb6d814dbd6377cd710b83b0b52001edaa4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ce8a689586ae8d824497ff3bac3d56
SHA140986c0b4eb28bde8d30cf2d76f29974a8d05af5
SHA2567b9c439369b63229c20c042af71fc889c16f38c7fb63de75ab89a5c7a15060b2
SHA5128d31d54a3147862e4ed21ffe0c5cd9119496a3f0ba8c503209e6c89558cb72a790f5158cad5eccf91c5bfcc164cfbcdfbed75955dff2d9940f0b1244ab3b7694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262c720f5258fc93a3e1cdbc50c864fc
SHA1691841179e208712e14d3a46edb7e4cfbe256ae3
SHA25614db18210339805894bc44889513cd6ecb880a8b76e5b53377d9632eba9f2cc0
SHA512ef9fe126f35fabdb56cc757907a792ef827f0e5594663ef2e8d7f19b41dae20be9f039a010d57a9516edb5bb1b3195564199788056019ac0542a9affaf11374e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade92d0c680206fbb501268bf12d2254
SHA1493a6499c634d4b1bcef4952f4671ba96d990025
SHA256bb857aa0478db86f80f734b88efcdefc0c32d0cca06217a0bcb7ee60b1ae39d8
SHA512cd1c73c767d2102aa07335732715c95504464fcc585e9d556dfc2a1eba69ad5aeb34252e5ef2170b20b6002929225e27d497c8ad350d828dff687a895c4cd41b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50a4066e2c0844acd7a66059f850237
SHA1e72c8e117566426df5cf174530f81a8346eef210
SHA2566e61b1de139ba984db2bcffb82595f6603a58f7365c1b7e1be09aac8b38d0a74
SHA51239b42299dc4159b54597370dc120b98ab71d2f4997da5380f1aee45b52c71f931e3e18170015fa7b1e8012846d6d69800c3fb66330a1d5c90e7a549910f91028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cdbf95d30f19b1f204dfbb94ab6934c
SHA12dd61a514dbb26516d380bab6d7e799e62e6d506
SHA2562195091d7e16257e8494b5c9d9830139116a626cbabedc6404acb7e2b4868a03
SHA5123a70dcd4b1b22ed0bba3de343c387c0abe4c2eb56dc7f0ff1d343e0673881db4ed1b41c342b3ec7e0e732e952226124051c161e739a62e2d16d98e05467b55b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6258dadb68cfc17dea6cca7b7b2b21
SHA1633219962bb752f62870ae61751178c937ea097c
SHA256c0d6053d8af99cfd79d9f0297cf0cb9d8b6a5524e8546d07b3c72f8fb87f39a0
SHA51233d2ae61c98d2dc81898991183c5bca1e3e28fb38f5ec65bd17ce9fa481b96f0a56042a972950e6e34cc0a22d3e6ac43fea7925e44dd2270bef0c240e8eec053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aeab2a29643bac2e501e3a84acdb18c
SHA1fecd8db6cd530f166410b456c4a864579ec03685
SHA256d8f733330f48b38843743c90c0c7e5b0202e929c0cd0d099372f0baaa0e0acb2
SHA5123d467414e77505f024d5013cc30e92aa9cd5aef0c7078e1a1e4e4d0a34bcd321f33a3e700b3782eed2d0ec4d2c7b7be3f2d62e641d7ec119d1060b5c844521a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf46c334eb5f03d672a781035a945ea
SHA1cbd6e185537b5bbb4ec1f615211119a16484fdb4
SHA256dd9a777b87a6fc309962bbba9efa7ce19eaae6d1506b3c879f28b1708082fb84
SHA512a5dc4c2ad6743f316cf95d17e20baf2df0e41a31391da636c7d7ede237366947b700f061f1691c924e05f7c7980cc7db166c054325455a9f237995a947d15ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea87e847b55b090621a0271c8da7928c
SHA198e81ea2ba96da3265c6bd62aab6c2e503bd7838
SHA2563df0d4aaa2c00d607f91d953a16df47e6cdb9590bb9aff232893e0c082ca46f6
SHA5120b186d71e2fc37afae80d53b63a39d3caf720cf3007e4741f5f268ae9cae1e973cf53bba9e89fecab8094120e2cd7b8e51fa3d5601d10149c3347536b8cdda3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5fb7569f96ac8f5d64c9f28f674bf2f
SHA1da910565915fa707e7d4d9754dd1550db4efcb12
SHA256d36bc7484f56fa866bffeafbe4b78f0ce086c9d268369b645a01089dda99d4c6
SHA5129a15f4f767c69d5ea030aaa72682fe26a943ed50eb53dc6a73bf2b6cc0a703ff8fc50958075a6862d33c515afbf4207550304ea2bad1058b9f8b420564731183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d1836894d7a1ce696b1768691a6388
SHA1cb3fd2116f07a93fa4361d6c0fcb3cfeca80e032
SHA25683f3187e9e32822fb331390318884c3087cd8c4e286fb511097a4b7ff23c496c
SHA5120b66a5914b2b7cc2b3c9104907e901b96a7eb39ac173be4ba05f0e88d9316ecd3c8124e4e79cd01c2b5828d80a5302b1f4ad4f64d3d7f4b065310081118411db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c03990230af20fa9928b60849fb7e04c
SHA1aa7bc53601a062510d1eddacb246786ccb3bd8fb
SHA25678fec3d5df557addfe3380df0da2d57a42cd3c670a19456167fb84f934c02cef
SHA512a75157eb6b4e45d7dccae75e92979042bde06cbf997f29b39fc6664ede8296cebd660323b3accd500f6f8fc34f96527da3ca78f2bb7a66dbbb5280eee2927860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbd8b86369c0e1d4ec4f6a531cc75a1
SHA1eb3ffbee43498b0f03d65e98f6c37fceaee8c70a
SHA256ac02ae6f1585339adada1ec5c5a149e12857e0fc722b869655425d242bff0402
SHA5126fe586aa219db674e2188d863a355e8834e1971e77c6fa7ef65d339d643bf75851cbdfee5b0323947bf239de19185c1974f87d5beac46cab368bfea63727956a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e5d7715b35baa8ef7693090864e9be
SHA1ec4d6bebfca23c454eea3a7d0a771715b71d10bd
SHA25612ee25aacccca883bcf88b0286e379cc0f871b4070e943189db6d415c9f67a6d
SHA512554645417045f1695c6454ef44a3a4e3d221faac9d4a6493a3493bf1b0ccbdcfdb277e614b99a34041cf5d5c1ca8b5e6cbd0ce6d2b147a8e4eea950338b9df66
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b