Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:30

General

  • Target

    callout_dest_bubble.xml

  • Size

    1KB

  • MD5

    5a1b792bf859e656807fb87228b66416

  • SHA1

    21612430725df233bd8bd7e10ae17a33a7923429

  • SHA256

    07c9841559f933977b9448e4ed5e18e3000666faa8768526136bccebefe8b104

  • SHA512

    e908a8dd836b51193f62b60eda3a5371cb9f2548e0b792e90fe624e012c7d64c20c987ead14f591a1e59b7786eec31221f56148447ba8deb53082c7594462b25

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_dest_bubble.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae5181622012680be04d36b9c4787a2d

    SHA1

    16331add1ef39abc2a8a33461c0a1388708b2ed2

    SHA256

    fd14b083b66373d3ebf25e566da154a660810f1f049618b274f85df5483fa6f6

    SHA512

    e4dacf0120a88746f8daabc6dadf3fc996b597c7cad2df76e1a14e8516e077def318fb2a350893e7f116f2b418c3a392ad2f2f8d2c228844c84f4344ddc4b2c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1d31498fa83ed18eaab6ec240e67ff7

    SHA1

    d83ab8a941f3798fc487d171e141581e955ddf38

    SHA256

    15579d9874eac4287203e2a2562ceae5f2476ed6ecd2ef2a1df3f8a4f1ab6cdc

    SHA512

    83cc7718b695065f6c2317d707aab9efcde363d459bedbe9f488886197fa62d55a8d2f74bfcb5fd737c4054b877e560a34b52574024c46ff8994dabaa92c1fef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25057378e815016288ee887a7cdfae8d

    SHA1

    2cc36a80b7cf00b2ea20e5df3ebb716e64c89587

    SHA256

    87a879e55036a78bd06b35a7010a08d059f795e2f37d5c686571bf0fe65e74fb

    SHA512

    136558cee54a55790dcc5fe92c7d3e43f7a4f5e34511736e9da19c81bb219d2874c48d048152ece81031649d579a2d29cfea6b2235b89966590814a86cdb7073

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbd5aba4daa169d17d5074d63f756afb

    SHA1

    37a2310301186981fe0c00b0f10595cab1e77339

    SHA256

    507d74b00a7c84cabf778de6c5457c446f8c5a34a7394c57431a8b7f48b5c59d

    SHA512

    619a691314bd2f3032056d44182fea3809707605b3f59c3cd9364b919dbf94c3805850fd2ef7e0f3c20526e0638656e0000133e3e29af3567057dc6288d4d824

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b2c0cfa546b3379524fd4d0571bc99ca

    SHA1

    5380429e6afc95c61c0918c75e122ef78cafeb8c

    SHA256

    54b80d77aa279179158ab9621ba30e8b95b72e736c47b04674ac47f1618c1e8a

    SHA512

    eebe1e4d68dba4a1dae82a78202a61886285cee8dc720dbeb32a7213343965cc27ca6ad06329dd186ef043f46053cf16467714194b6fd746ba2aad12cbccab1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    face87d5f207b2d0c53a381cd16b578a

    SHA1

    c5fd04d0c2c6c1c781491d7b1ede82f0fada624d

    SHA256

    7523da4c12f7927d06b9364eec425c8d73ecce268d7b7a8068c30db9c0232e37

    SHA512

    343bbdaa4ddd97443bf629f92dca2ed8291134b67f80381a56c0e2df433c77f1c7802ebcc5d5f2d3bb2a85e42a6959847d7cc5932100e4ad2c09df6a92924961

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c14fbc4ce80ebbc45bf2e48d2fb6a2ac

    SHA1

    e0094e4ba10d65ceff3c2c97470d538e42dc58f1

    SHA256

    4780342da7082efa6e8bd40f593b96e3096f95e36e93ca8e097048bd91efd236

    SHA512

    4b0a2b56a1ad8d1b2f6a373d4cb84795372a27c1fb3d09f3da836481e3bd59f44c85ee0c9b0ab7fa727fc6efa290cba0cfa40c892c857e5c8579c62f79cbe717

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df8f2bc5996a1be567fb1d4306ff4f84

    SHA1

    bef8f42a25082e7bec7b704e193eb24eba57dcc5

    SHA256

    c238773f9fdfab8a60aace8799e53381eaa15b39529e492a6f28606c7d48cf8b

    SHA512

    182456577cfc0a3b30f44d57977386828a63abaf01981cdb3f28d0cb9d880794f58c2c249e2d75fca5e4d5ed2850675d550c0f0be580555179c32b2bceca0292

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    afc6718e129a1e6304f4f96e53414698

    SHA1

    c74cc184cec2301fc0efb93ab2316e365e785c89

    SHA256

    af5b1d2e67727705410d7e7c4d4c6b2e575530e764bdb667463857d0ad6aa229

    SHA512

    ba510d55b4249e891bf9527ec67bb1a2d6ebb9cc03ff2950281847b3e34a62fb66253b08026ff9ad6f71cc11255f12f67f24417d3d5c714ba8bcac65ac7ab8c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3bff292c35bd3a9db8b41cfb8b3abe3c

    SHA1

    fe40e54aa7fd471477da34ed7809069363c2803c

    SHA256

    8f7be80c6de523d2e5c8f14fae11f4f4e43cf87d2db3b6cebb2d64a6976625fe

    SHA512

    ea0eed4b20e6874b5e621311a280c9723ee38effa50694a013196dce7d268f73ea81e1b7666c18091f1ab23131bae5f40d1d0148b49a4e2c7e57261abcdc7750

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    360efe96f5e2eea60aeb0fdb5e5b312d

    SHA1

    924384cee05a380b9073ed7a4bdeadeb80d3418e

    SHA256

    f1f3467cc601898706535e625f785fa4e389c8ad913faabb0acc076a2fefe0e4

    SHA512

    b0db0d06aa423f70c6fdff6dca6a0f4984f68b51bf3ceeea4ef10ede06c3b25b79dc682b73177d47f0446c7074bf5f3aa6480ac26ede230aa7f0f08e473ca712

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2d8d299b4a5009602cdf3b7c9a1db72

    SHA1

    9db8501a575b2d83592552ba93301d03d41ef506

    SHA256

    77f8e014b5813eb5d86725a910cf36be9bcc3d0cdb25b23c3a32cffd9195deed

    SHA512

    94166e299ad37a77adb109e054bfe92a5de832794a9328946b8dc08b4d0271d8985fa6e60d2f0ed328919e4c58d0554dc341caba1a7338ec56268713bbe13067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08be1987098212c74f87a09abbde3eba

    SHA1

    b09fe3f9cc3f7c92c2a156040530e6620c8c9958

    SHA256

    415639046872d72346b4aa35f8d63765a114197681f53093394ee614e64bb71b

    SHA512

    47b8e140cc81f4aa66febb3d6be240d15a20476411ef8211b06a30fd20e06df7a65eeb9ca39d5b99f7dacfef45de9b740bab0c94b9c40e4a6fa015625a4b63e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    193eb761bd2015934e8bf12c403a9ba4

    SHA1

    775c760aae9d5586245662e145b3dec9c0a90c98

    SHA256

    8c2b914e62040c216a1df14c46f3ae3dd926712c16b1b55036270201251a06de

    SHA512

    fba3c718a94f02f35cd4b68b3c6f7ea80774d9010913161c52adafe944769de57c9e0084571c627d1a0188ab2778bdf9cb173bfcd6c95b948223626e31db7ade

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e567bf1d835822de37d97fc20351d48

    SHA1

    1867f79623ede1d416f1a542d21da344bbf21059

    SHA256

    c0dff8c4e2e32775eddaf04ab4252a0359b18eb041f1c445ce5dafcd24c32d4f

    SHA512

    85eecb7fb882371811029c29b8fb7feac21cbae1ed126bdec5586772159006330a77dc57e1517592abc1c26bdb3bae8c9a8ae8ab0239d0a6edea2009baea0e37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2df8f2a474963352fe716465f90c469f

    SHA1

    82498644eb536bb2ca736955338e361ca2ffe266

    SHA256

    4b8b1185b8710db269cfa36cfe29c2cbc7dff0c13e975cf9c0a56b55e61682de

    SHA512

    bdfe9f7ce6ead5b5c0846e8a3425ce4b1da3c90151407d823fd5d81c6922257c74637b4febbf75131f195e53160eb22b49f3df3ac8e559bd4132d894165298fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ba8695e81d35df354c1739b5e2dabd8

    SHA1

    188ca6dd59302f7ea69acab127d4412f88ba8537

    SHA256

    eb136c29e7e955a62d0a9227ef54faf8f44ff141105cc97320236d39475cff6f

    SHA512

    84faa0154e10015db7c7e2df686dcaff180361c402a2190c78bf4a961f69ae89c2fb37595f8da6ab27af6aae0e7eebaf4499ed220015653e795c78aef4929986

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2403487697109e031347d553ef6b026

    SHA1

    77e0d3ac04555c8c5fd476a993887f6b4647504d

    SHA256

    b3b20dbfa224aaecc1b917dfd22a4bb00b2c5fe17909f2e3c75c0b3813128220

    SHA512

    6629544863b1e77e0b42ea1eaf4fe65f436b1f15d35d0a42b8786fcf85496f5c90ac7565040773d0fcb12591f05ebf0d4454e478dcbec024311d6a90860ebe77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6922bf700e9825e86420f4d775ba12e8

    SHA1

    9569e50e451751c192c7175c8d325c7d7f7717e6

    SHA256

    4fc912449bf44747515721087f9b63eb078feb2e88887aa74a3c120e4c26efe1

    SHA512

    3dc5b0eafbf8fecdcb479ca3938588bffb9b80fa527e2e88fc2b370a80f4f85a15842cfefb9f4122303193e37be0034361f088ddc2d61e702ac6c1034e03f5fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aad0ea8648fdc380ce4096f1b2b912ed

    SHA1

    95907a2d38038beba0add7e6946618fe99d8e61f

    SHA256

    baa6c6fd04b4848f42fefb45d1a66482fcedda6ae754c97299ad1d6d457b97ca

    SHA512

    efc034940b8ad8e96fa028cb09b7caeef5a9fd3828800ad16ab665c132a4c5678e492c0f5534a088f5bc2be91801a322b511be32b17b25f08f28e78ee4a04e23

  • C:\Users\Admin\AppData\Local\Temp\Cab9408.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9534.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27