Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
ttpwp.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ttpwp.html
Resource
win10v2004-20241007-en
General
-
Target
ttpwp.html
-
Size
5KB
-
MD5
f9386d99b9617a1b80e06f310538ba7d
-
SHA1
d49abfbb3c40f2f61d3904ee3c4c366504b4c1c6
-
SHA256
070b64a0eef890051f94badf2481aaec40fa8bedc85783d260b7ac1bed6f36bd
-
SHA512
eed4eb3b121c08e3330e886b6d483d6375170564d4171b579a3c60a8ab471d60fea57a0de7c85b3fa333f20cc9a49d915ea3036988332f99eed68026c5621a30
-
SSDEEP
96:yIeLat+nvllYCK3t+nvllYCKf0rIpl2WDkVM1+5+zi0zUlQ:bEoxEoNl2hMp4Q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f1e4294b515a7439495830b32a6b12100000000020000000000106600000001000020000000879481083f56ff46bfaea7c2c0f9d2c14a465564ce49a7f725db9fec851c5dee000000000e800000000200002000000010b2194ca3ccb94575b52de8598debe45b74d133fc9592f7530736e4d5ee32dc20000000f74b54655a364b9e7171d1270d561c68d62526d539f5d45c718d02357a2baa5840000000e57d4b49aa62fc790de93abbbb31479f62e7fbba966b83b766cbd8f0bb0a6ea431bcb2b6480f1ccb3ca5f2a76dfa0de6f7fbd76f968c51d243263aeac6cd3298 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434709745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a012100eec1adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{398A80F1-86DF-11EF-80BD-DAEE53C76889} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2092 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2176 2092 iexplore.exe 30 PID 2092 wrote to memory of 2176 2092 iexplore.exe 30 PID 2092 wrote to memory of 2176 2092 iexplore.exe 30 PID 2092 wrote to memory of 2176 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ttpwp.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce58860081c6d7c79e4430d2535363b
SHA142a564cc534faeeb45e07ea5919df7e005be51f6
SHA256a4ed686863bf4aefde539c4343841c345737155fae4f8ebe464c49b6f21b9b3e
SHA512b3f9e01a548670b712088f714025e0805f9e52e6b052cb6c63aa3beca6d65f7b1a7a6dcb2b3627fc8a84817aafd24df82a1644797aed2e5d1a715709f5e5d7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff8eba2f7fcd10da60eebf11299ba9d
SHA142404c9d20edd6c7ac693c77e6345d08f0bf0024
SHA256f96b3ef1e6127f70051ea9700c94960960392a4f0735335023cbd21237ea732e
SHA512d0c57fb75cfb2a86bebfab421220956f3860f3118211e8334c00efb5d7ad9befbde2a7915d6c65d269547cd1369a207a59573d2d3b35f80144e44a2f0c6cd549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de44738b94dab5f3f0063da2c90d6ec3
SHA1858e9587308ba1fd13d4ac21fc7071f0d0960afa
SHA2569a653a820ae9b7df9b1f7d910e956c514d2b5adc6b93fac57a5f27720ff123c5
SHA512e738b247d1ac3dc91f32c4d9a9a57c1d1c7a81b2204eb325e78f7e5b9201f7dffc5602d15fb949b261ec33ec19d8c6f2bd0f68a98753d2a91961a7764c39de7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62e64c6c0e072736fe241e55ab3f1ef
SHA1ea161b7d33d3c29f2ab5f9ebaca8169ece934ad6
SHA2567bd7c203181468fe8afb73da7ff599ae1a90f989c9ae9fc13a7d5fbadb1b1b2b
SHA5129a894a7ce4bcc7f2a7f4344a56abb0233a5b0818e27fe3b6f480dfc1a8a1b90efec0a94be821a9ca7908a77b632f041ec123302b167a4073712dfeb9cb44c373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e925dc4fe1fd5bd78a12542abe045016
SHA1e85af260edd150c7648ba48160fd344f231225a2
SHA2560cb6d2111bd2fd55a1efdce2d2e22d2fb5f9bc654d866291d91e40ab26b007c0
SHA51216846a2dba17c6a87fcd2b11c2fcd610f1da12d9cf4b6bc6215e41a0762d29a08d06aa9e583181d54750e572c231e218a1242fcc5e3757d42767cacd73d767ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d00fcb80e2bb1e439a665ba9980278
SHA191331488fb6551ad3bae7a0c924ab83ab29d0103
SHA256c75cf554a833c19217157b1989d8d8e6310a0d1f7c2a7eb714a0fcb0ef9300f1
SHA512322315993482087ccca8a9d63bdec4036995f42d777b1067e31d44c6f2d4b38feee71aa440ed4b728a4b039b48b1280cdb1249aa792561e36f263723ac99103a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588da8dfb7a0bc1628cf2a8825f51ff5a
SHA1c8caf9439790f3ad1c5b3977e367595cfe4bd67c
SHA256fdf9ee801297f0b9e5a5ebf30517901a700ce41643c18b5ac67df0bbdeb9cdf5
SHA5129d67ebe97fb3b774ccaa8ba2af391cb08f252b9758d8a36dae0054abb43fb15d30bd6173acdc080fd585efe621f38b999d631eb5a57a4a5b78bcc09e5e0de147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c583d9142fe39b2a31302f601aa2d99
SHA153a2c7682a6adc7a7a0cee77dd2a1b3c921e93d2
SHA256d6d633c15f4a5f36a9d630116863e12b8673ba10e290799b4af20504e1438000
SHA5126ff45bfe07dd685d90a47c92ac8fd679ee88a0c82adecf9868ed99429a5e589df82c0e0add0cebea43947289902d1cb6b77a130ee0013f2f39771d2cc2c14ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cfb5dd2a784532811ffb5395dbfc39
SHA18c253aa081ea250396a45c55a2c6352ce2cd136e
SHA25637ec98b561edfc24f52ecf696e6235c67023d558498ac10ec192dc524a3477ab
SHA5126f19c82b00f00a42257de6a19d364dced3441323bc0965f7a5f93aa9b450b4658007c32b489ad96802f418056e8d0847ec82deb60451ff3197e445ff7b5d9254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59198f19c2489a90e8b3e6253159aa5ce
SHA10c3bd04f974caa617571a5f1f03c189d068a593c
SHA2562cc64afaf8cff6e039ef79f4989d694f3e04076b972061940a538da192b63fd3
SHA512fa063fd050ad792968e20d224bc23073bf12b6a873bcb3ec7004a16c28cd9b7bd1feabc401c5b9e51cc40a0934db9e5548734a4a3638507f8d93324d0592de72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fea0e086e2dd5281a31a45e22de8ae9
SHA1738650653b78e56ad16b7070b072fa8644892952
SHA25684dedf81e2e256428d9501fc4127abb05e1e375c09295aee07bc931218cbf059
SHA5127c7ec95175585ba3290f0ae767973853a564f8031bd9913884f7a7f21d7215597cf9a4b087d61dc3f0db486ceaed107b5c69ac14ffe4be691dcce63d6561fd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d38c05fadd164a7c9a004152e6c9d16
SHA194e1a3c8601daa373e64678d4343f591facf5219
SHA2562a28f8409f3d581f0302443b811b2b9744d3b3bedf8b5566f604cac0cae25287
SHA512f44553eef21459165320bbe7b519c96de0646df6bca2f4dfd5ebdd74189e4cb052be508b6ba44fbb0aa5ae222fb1c713421c51c15eb09704f83f4b2162bf1c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8d3e93793cee7c432354daa8f6b45d
SHA19cd969f255a6025be819082c96e27b8b854b2752
SHA2560acac6724f22ab79d349b67da6db413ab9b45ad0813c6140366107ffb2046b57
SHA512243c1e93f3eaec76a9d00d4bd84462e033921e835f8326d6842944544239ab3e4311892a65e27baa8b59cf5fb4f9e5ef89973a483d004341934930874f665036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9edbfab888bca1a9d3e9da6229c3a1
SHA16b3b93c8596403129eea3d3cbcda1857d98acfb6
SHA256ddb4254cc30a322e1c613efc8c031d75fb3398d8cea8b3f29056b0ca00c39fa7
SHA512f82db9433b8e9e8d4de04e3e0e64c6c902cb9bbb548a252523703b57fb53613d676d961ec0cc2167321cee014de7f954675780da2fcee8b503a071be43035560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e19377b879844d79ad02d9ee8962acc
SHA11d0ac8fbf74cc1e23e142d12fbe18e3a1e1753ce
SHA256aee7c93cbc9d541f5f64300569bd246362cc70a3375fce4ce42dfc9b4b7a299d
SHA512e15641e4ad99cbd4ae50408f1de38762d2642871a35a68b9c06aee024555c453783380e85deb996b7a0ae968f82cc824513461d3599c91fde1a32522bd334e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586bcfefcd1b1bb9c9f6e017fe41c5184
SHA1d2f9760e6969892936674163eba37e5755adc9b7
SHA256d8922fc3e1625cda5e0e3a86d30ec78bff7c2c735cd88599f8ccdf6ccd1f2eb3
SHA51235d6356f11c2eae63f5fc50e7abf7faf4965c38e8ec20e6b703657b811ca1d12b88321262f3ebd88baaf20bcf64fcc2e7c3d06b59d25e6674dcd87537386113e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a550ae00bdabe20b71aa7e55b5b4906f
SHA1564d6d501744108eddf5e4561a82cd9336275db1
SHA2566fc28d83cf7aab31fffa342d73620571ed84989b1434b18f4432f29604d85453
SHA5126a3381890ddaeed016925b81e57bbe363bcf2bcf2d69c8439546bc0356fbe5ce09c9e53477a1df6c0f13554c510a13d9310096d607a61743c7ea0f9db60214a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fba8a2615714c8d4d960f774d48c7aff
SHA18fa954670cfc3aa391b613f82b20df639316190f
SHA25638f2f9dfc4bb6f0860cebeb5e38c8050873e6344cd75a8b26f0c7d4f6b679b91
SHA51238b0d12e2e9b0944feb256156968e5ea4140b3cee157fcabc1cce1fd2bca79a22794e787ac860b760d79bee01c639464156c91febcbb81c3c52b0dc06cf0ee04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0304b08a275449d01b98b2f5445d47
SHA13fd6c8ebd3b352dbecef45532970f0696fcc79c9
SHA256609b83b204a9cb20eb6dea087600d43087a10ea0e5d327e73c2426b7dffc1c29
SHA51229b07fa893dea55778eedde5fa15d2e0f6b0f35e1fc93e1c6f783e778213bf9e7744dfa19a406c58d9a2e3fd6ca02b4a5e1a522eca817ecbc38c4676cacc3ff2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b