Analysis

  • max time kernel
    96s
  • max time network
    111s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2023 06:55

General

  • Target

    callout_7_overlay.xml

  • Size

    1KB

  • MD5

    13da4f83c32b6af839f40448ad4093dd

  • SHA1

    2dd817cbb6c2198c9b622bf8a4a4bd0f58c5980d

  • SHA256

    22a5b339c8e15d0b1393e540966b414ca577f1e6c2c4682bef22e98f74e5a5d3

  • SHA512

    3c5e37b7638099495ca3773edd1b4c780ceced0db68749c7c7437ad460ae765f1e3f952e146f7851a778f9dd32a5c7cce57ee616c0f015231b0071c9a39013cb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_7_overlay.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0856009672b68b94db85b1136eb02bd

    SHA1

    7f08b53e3bbd056d5b772f8353e40a106a54ae86

    SHA256

    525885dae9482366865434fdfd90b0efe9bbf9c4ce6a6955529d879eac12b383

    SHA512

    bb96e5bee0bd79a346699272db6ea15f364902f836139cd3c72f2d84dd88697a1feccfec37ac0fb96cbcb8a89d09224bc4b55699e7a44e3a5f50813d96a95fad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0bce8c54b0fcae349dbdd2b2358e0660

    SHA1

    9922d3434d17961823a7ca3408087b249ed8f6bf

    SHA256

    9a4ba25623eb9b1adc3fa0d1cba5281e7c6a31fc3ed87a3c7fa711122a48b504

    SHA512

    81eaea33db9b70c669f4cedd91292dfc48cb9b770c01e534c7123277beda0e37e39fd0c4da4e6b727052bf9e93f8694250db398987729780d2f554ec7825b053

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf83b0365a9b56cb06d59a0f0cc058da

    SHA1

    50479ff5451510116c55e566d789eea9d60bd562

    SHA256

    e47edd7b8eb276d91d7232cb7c34b03b48dae9ba4438842ed5dfa5b0492dcaa1

    SHA512

    0e63775d498d6782cf886e98d2603f1e6b6a0c7acc799b91a544457eaecf32b36381c1a4dff200d5a1294d3dd8a20ef853bd3c4991e11cfb4493c3cb28447a82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ca9a3a1490523d25f3c421f3ab34cff

    SHA1

    e136cc69d8c8bf9199c84e051365bc969d8fffdf

    SHA256

    354ef4e28b359dcbeb7f7e7926a1b8add7e268f6213bb3ccf23bb03ac915660f

    SHA512

    bedef4856d055b0981c16a8629d778c86662fc5ad222088ee9add65f47d7f957252d4a9618e1e6d6d645e6ae923f792d35636727adce8fef55b43e2f2e882798

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9bb421f05141944060ab859fc6b39506

    SHA1

    5487629f730d2903fafa2489e6d8df330217d241

    SHA256

    913d5def880d18ff1ec26977219b88fee244665c249b06a661160b0f98b31322

    SHA512

    d35fd8c12728beee17fe5a4aa5526414dd2a8e20bf0c1d2b77ad8bd56690dba41105cc70058c4051d4c5c7cfd270c754c05ee183e7ac074e32b04395b5455694

  • C:\Users\Admin\AppData\Local\Temp\CabB482.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarB542.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27