Analysis

  • max time kernel
    101s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2023 23:17

General

  • Target

    callout_7_overlay.xml

  • Size

    1KB

  • MD5

    13da4f83c32b6af839f40448ad4093dd

  • SHA1

    2dd817cbb6c2198c9b622bf8a4a4bd0f58c5980d

  • SHA256

    22a5b339c8e15d0b1393e540966b414ca577f1e6c2c4682bef22e98f74e5a5d3

  • SHA512

    3c5e37b7638099495ca3773edd1b4c780ceced0db68749c7c7437ad460ae765f1e3f952e146f7851a778f9dd32a5c7cce57ee616c0f015231b0071c9a39013cb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_7_overlay.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1876
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c4791f09f73bce11ccd990867b2101a9

    SHA1

    075f1aaecea879bbc77d77332bd24799c4a7fcec

    SHA256

    bd3673a1739152b3223236b05705c2b81dc54073b0ac4b16344139fc34381aa8

    SHA512

    f31050d0567da4fc73770850620529e536b181167e980e167f3cc2d7199ab78404d18f92a0e8e207d135912d370cd84aa672ec1e007086f2dad59080e7bbb3d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    55b37ec2bea9c1b5a7084c90d5c5bdf1

    SHA1

    f5214477fcb7938dc0c10e381111e7626f5f1bd7

    SHA256

    e5b57ce038ce21ca863efdced69f58551c1130601c48fb10a746c62247b9c704

    SHA512

    dd1e8fcb48df0c8834ec4b857cf5cb17f59efa8f255b80bce0e16b4427ecb837945c15c1486112d41cf90d9069896da4a444d8ee1294faa326dc5274b70a4aa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f5c51adeeed6d9494d81d55788b88b6

    SHA1

    4eccea190dd743fef2d0dc2410abbe7d22e08a26

    SHA256

    8861306436b4da3b92c5903d04f03996bbfdf6c0af9b4952329e2d95b48bf7c4

    SHA512

    1d6c3513a497b8399c73744c3ad12bb31c50c620ba5fe3c03f0e0eab2acd58f335bf47f0a6f9fb1a057ed383283e8b4c7835d035676986485beab5f647cc4da6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63db74e1f00e7a2cad6e1d48143a6c9f

    SHA1

    6ab08e682735253de9158ac91a61c2b6b65bb98a

    SHA256

    98e93a81552a21925bd71317d652bf2ea191ced4334c5334414ad6a9997e4005

    SHA512

    c857a5f86367eda6be703981ada11bed37fa5eb31fcf081cf870acde86b7c9f236819b7a6666565c6fc751a2fdd3ad8195be5c74ad829e734105816cd575a7e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21b0ed3363b8f2814d50f11a70206fc1

    SHA1

    9936300815d62c80374ae2ef8da92021ddedb700

    SHA256

    792dd65c57162342ff7c360c56022ede43db0eff83b11897c4a69c59e037dd39

    SHA512

    5fc2962619f3afe77f21387782f0a5893e96f651b8e0dacee5e5379a0b3efb77831285b87ae1ec843c8ea5ad6097a3660796b893795aff812c22a3ccea356c91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df6e30851624a4de5337309979a37540

    SHA1

    b99429fae95f47748949c62def472f4ece51f1e3

    SHA256

    acc5d2a9113db65ec8a6a9ab3628ce189bbfff7df790beb11c6dbf1748e1e2d8

    SHA512

    10dcb4bebdc02da807e56602c15c4f87fc9207a123589ae883084493268e638b1cdb271a0c605a612daadc3e3215b6e9b843fe5f7c61b6513fc9f95ed208cd7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    adce4cedbe1c6543cb6e0537b9102669

    SHA1

    8ea59cd4a50fa5713d4afb5c1b6f3ed415bc8e8a

    SHA256

    3a09c92b7f7585d167ba080b96f91fef0d5e680a7963bf5d5a56615e552043ef

    SHA512

    04251f4faf0c5be905ca9fd3976b98b2078e432f4ac075b39012fce5cbf6f259be2c6ef51b6ed32c4965ebad745832974cd4a04f5db3636e4c16049dd7eab6f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db552ff0f2deda7d4ddaa91fb14a7aa2

    SHA1

    dea562b9364e27369f8ec0fd898c88075310f870

    SHA256

    a75a3605debd81c0f196146edee3c88ca12ef7407c4a0de84218522ceffc7133

    SHA512

    23021cc1a149e59e5d39dc61704f0cabdd7a5075486b76e3d0e53f68fa6d8ce0c4ebd7eb00b2ab0b7824c2f1dd0b6744bc1dc9bda741e54fb78b8ec8955adef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b21782a04fcd9d7cffe282ab78e5704d

    SHA1

    95f0928e0975ec339528c0e6d532605df0b7883e

    SHA256

    798dfe7e8d282f2bba77eff3f27b67e7acafe3048cd9586fe5bd4aab3a4884d4

    SHA512

    fe360639e7fa7e8cd4a4875782845556069055be24e712495dcf30fc2595bf63a96fd0fca5c47d83387faf20d0faeb0d77034870dfb77566a0c3f6b223456d4b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORT469H\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab3298.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar3367.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\R9X9MWUX.txt

    Filesize

    606B

    MD5

    faa7cb4a297c38af5306627f8d3e35d9

    SHA1

    fe3e687f7105db753e756b1d23fa636b53917c6d

    SHA256

    86abfe9bf4c5fcdea0c34ba04c8e24471bb470a453912a11fa861ccf113649a8

    SHA512

    24d533762b7f7b5806225e4cea1ec061b3974782bd7309b3962f65c8cb9961a17573ef82195ec9ffaa15be8834f8970f04890930ccce44657e351491d352c2f7