Analysis

  • max time kernel
    97s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2023 06:55

General

  • Target

    callout_shape_2.xml

  • Size

    4KB

  • MD5

    6dc1e0aa43dd2a582b24b6487605fb76

  • SHA1

    c403b4c464908b8d740d03775742fdc72a6e8327

  • SHA256

    f6ec4c71c9e3ebfc1d23691364cc5736a12c3180ad35e55f4f9dc0fa3ce03669

  • SHA512

    3cced4fb52552f26f35eac6eacf8fc408b6f5e251984f486e203777b0889261db83ea127a97b5e53c246456c819b23b6d6209fec1bb3a6df5f173e66de370ce2

  • SSDEEP

    96:7OKfvMkrs4v9rTicBaUTnpI5kS0nvVfiYPl9Cb7dMM/SAWicJPjiBwlH:SoT44Vp3hrnvVqY99CR/SAWicgwN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_shape_2.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:580
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:580 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8e5bf3e8b3761e2064acce280ee745f

    SHA1

    d4172997510c4138617464341312392f9405beb7

    SHA256

    4f4e5a67d18ec29dd45cb34c797904ff2447e4bfbf2995167e6b9f7d9dd0691b

    SHA512

    101dcbf01e3c31d73d9af18a6ab71e2f89bd85aeeebaa9e5154cc1f7007e25e5b1ce069bb4634e8459196917d5edfdee5dba5a43de5ba9300b80027f10e43fa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b355a5f1d392cf74be5f8b4d2ec1ff48

    SHA1

    7a25edb106d8d4f668fb0de7162b6c2ca488715b

    SHA256

    64fbd4712c4525011812bf468857cf607494104c2868c04a073a70a3e80f02b1

    SHA512

    26ff345fa84f97c112092c416dbea483e95c6854f2551d3002a77db1b505903e6e9c332125082c949a481bcd71abfa6617e3b4be0d7262c0f9b25eed8595bcde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    69f88f5f8d8ba6192bb1a3b7bcca158a

    SHA1

    29c659272e998bfbd9381de17593886b1eefe82b

    SHA256

    72cbcd4bd36282c235914a1e6e66c8e87131641cb1908537c7f9f8b16e56cdca

    SHA512

    f142f7ed473792430958b56ce7da63e15e5f43f673b3141bdfd17691ba0c75df558a31fdbc923dd2f647af7599a34120a5ef9f6b6d421c5bf51c1a672ee9712e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0903f4168b6b91f3a870d8fd926f08aa

    SHA1

    fd5f255e2656672de83397e8e283418b21d1b1e1

    SHA256

    b1ac50ee49edd935e4f410d8240fc8d1f98f16b76201323a59b5be4c287045d3

    SHA512

    716f5380df6c25db30a2bcb4cdf8a096ab6aa08735ac786b39143908be0f8f5bd4c2d9998a30d2008a901aada0d216b6fe8a6470dc8ab1ee41db7f85a671e181

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de3a7b2e5c8d43b953108694c4635dd6

    SHA1

    57faca640ac0010d1a2e8378a953924ad2a012a5

    SHA256

    46e87b081f39620f436ae968ac3273fd7e3c859338980817cdd426a50aea1837

    SHA512

    ad3351cec2428dffede2751416e33a13626a95d1fc54fcf5373fee0073e252feccaaad1045569e864703f9d6677ed50fd8d7cad2230e85db27eb9f1c20a3a2ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e669d28b9a252db199e7e579d2bff8a

    SHA1

    525ceda068df4fd79532b0a2def2718d35389a7e

    SHA256

    fe4000b6a1dd66cd8f342f45d62fbcdbf65ebb35b8e4946428315550861d696c

    SHA512

    f8cdfd9a6cfa6a93184cf5e31f096b3f6b269163dba7faab8600da54e5a28b58b2bf0c151430787b45b860369409cd0acfea464bf6de701d51c1bfb5cdf2a4e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33605ec86f42ba449c185ea5c5db55b0

    SHA1

    3ff10bc0a10492540c4033759fa42cbd38422547

    SHA256

    b3fcccfcb63d45daf386c16e5ba6ebffb6c7524b760560b170d461ca30b7b88c

    SHA512

    8097514b963f6b9d9b2bd778df48d9a3e18226e219c7553785f633cca17a0fe862dbb754c0380587989edfdc0e5f77f6a35afb59faa2aab928173db3990c6ad8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1a478289a7f214662fe69b3d95f8c9af

    SHA1

    6e48ff1c764aefd599db8af43b26ae94915a69c7

    SHA256

    da9490fe1f3f65ac988edd8ffdcc05056e6bc5cbbc92954740ba9d2b902e4a2d

    SHA512

    16240078772ac9b84214cf56bdb57533cfff16c708ebc0f57c30bc75123f8263d621d4ccab30374ce4adabf8b5a197ee053a17ff6d5084bc747c31bb753f1efa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f857dfc851315da2531796dc4aaa205

    SHA1

    7f081a67d8eeae2edbdf740774f284093da53dce

    SHA256

    af00bbbc4a0b0b966cbc919076fdea0ee2858df69ca11f3de276d8aa1b079c46

    SHA512

    6d2ebdd94118e2102e3417d81d8365b024d745ebea6701648d32909855e6f649fa8f55b38bd2e8c1ebf0caa7899e65e4397092ab6bfc7393de40c81f23b061ad

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQLKSAYN\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab5E0B.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar6050.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RB91J0SX.txt

    Filesize

    603B

    MD5

    1d6e6243e15560295865a94f28ff7cd2

    SHA1

    dc4826ec279bd3b69af35d7f9aadc44ed25ee5de

    SHA256

    acc15962e6c97a67a61bec4e433bcc0aaa11d254ffc03d12647f62994b3fb8dc

    SHA512

    2a2c535bec912a6e180fa9415e72ae0f0cb74b059301ebaf5d78a9548c826905c2622f818a37f314e0433f6afb2d4540e30efc7c1a6722a6fed1ff7b9732703b