Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2023 06:55

General

  • Target

    callout_dest_bubble.xml

  • Size

    1KB

  • MD5

    5a1b792bf859e656807fb87228b66416

  • SHA1

    21612430725df233bd8bd7e10ae17a33a7923429

  • SHA256

    07c9841559f933977b9448e4ed5e18e3000666faa8768526136bccebefe8b104

  • SHA512

    e908a8dd836b51193f62b60eda3a5371cb9f2548e0b792e90fe624e012c7d64c20c987ead14f591a1e59b7786eec31221f56148447ba8deb53082c7594462b25

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_dest_bubble.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae082a643e36fcc973567d20e54a64c7

    SHA1

    9e264603df8a73d459f28fd84a2a405ebe64830c

    SHA256

    c66d2c6ef3d40d087ec5fcf0c404227648033148bd57bbe47dccfc81a862a061

    SHA512

    3c715af233aff247fe8c96699a65c9f6a74238434506606a71eb5e81537e3d725b2826781ff05ecbbdc4d49c8c2e760824139a6f05c74d2a7e35015d5f7983c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11240b2090ab3a4bb59b849b39398cfa

    SHA1

    a2400553307501c65c713aa79e87bdb083ede4ba

    SHA256

    026ee730bb4d9cf25d26595cdd2e0b7ecd1312cba5b21c991253dd94a48ecad9

    SHA512

    d7c0c3cafad07d91e99519ae282335952a3cf56400f87cd0ddac340f28b5fb5efae0a7d3cf43cefcb47370a5ce9ea315591d8e9509476fa37745de9fdc3c5dd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6cf28f19454340a46156e19c0933498d

    SHA1

    02601b3059d8d05b7f513a6e5f541b936de0bea5

    SHA256

    1215aec6a47ca46fd0fcf5d0688518192b8578c0e613cf9326396af3d73a5b6a

    SHA512

    8c78ffda61d4b56037cac74cd8237bf21a8de07316ebd7a0b7a83150f3d3a3c6d4d5b05f20fff8812c81915f94f10321d236f4f79c2533c6396cb055f85a4265

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0341b607e8c78d226ba918726a427d34

    SHA1

    44bb12400dd18857d0efd402b41a8b0f7b92901b

    SHA256

    4fa282b07b613f77f97dd2e8c220743bf71b8f1834dddd765987668a811ed14d

    SHA512

    991e9b85223d5ba42e2ec7fdf6b75e0011a8013533bfd964ab9cce9e0326e0310d1ca0a31a2695ad444bf3e98501063482fd98310970dbdf7e593b9d83a0d63e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f3781b6c6ded500fb522f6912bc828c

    SHA1

    a94657bc505269347cc04eb18f768171ec44095b

    SHA256

    c52c47b0fd3cfd2b247cff37a62d645973564b23003b04a2be0a27d8f2fb6ce5

    SHA512

    5ae1d9d5321232f5faf64c9bff223bc65efc81735b66b6d4419c4de12a5023723477a48b228ad22cf57abe44bcbb1cb95644511d7ef5535a189f720ab1bb5076

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c7444cbff43eacf03a130afc4bf37d2

    SHA1

    81f7560e73485a1e4f0fbcc5778eefe5d191c4e4

    SHA256

    7c4dbe44d705e7885c81ca0ddb3507faf9aca5c7259bb670adbf625cac95b0cd

    SHA512

    a548d4b15950f013945c64b86e83ba173f00c061e5f3758f9b415537c159c0a134393fa418103f1d4767047e04801dd440e744c5c5b563dee6bd995d232b2c76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7bc3dbefc5f9ec66d2310271ec9016a

    SHA1

    b10db2c5f4157cb9a671c8b41978ce04c645f8a5

    SHA256

    e6ec478cf53468ec1c701f58fbb6bd425717ba70546d5e4f74e6bfe80b373d60

    SHA512

    c33d6447fd353d27f496254e2a77e942990362e528588019410b119698669d266e20d734fa10440fc3f8b31a0f3ac15a2c47b087fc84953b8f8e20e7fcc8dee2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7DZDVCQ4\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab3C0A.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar3D55.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N2T4Q3RI.txt

    Filesize

    608B

    MD5

    fb7bf94f4ec52885ca042eac7ab389c0

    SHA1

    4bdc08b3ee5c7ec565d9ad8ec8ab61de8fd2d29a

    SHA256

    2ddc3e41357fab5dccfbfe3a8e8257746edbd187c3bdd698114f830904c24c77

    SHA512

    a880d3101ebf672511cff78162f591e9fbcd945249f652dfd8c48b1c8b3dd7b8b8c6034f17657ea157ba28b893e94fd8a20e97619510efc549a7e3486e980bba