Analysis

  • max time kernel
    136s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:30

General

  • Target

    callout_shape_2.xml

  • Size

    4KB

  • MD5

    6dc1e0aa43dd2a582b24b6487605fb76

  • SHA1

    c403b4c464908b8d740d03775742fdc72a6e8327

  • SHA256

    f6ec4c71c9e3ebfc1d23691364cc5736a12c3180ad35e55f4f9dc0fa3ce03669

  • SHA512

    3cced4fb52552f26f35eac6eacf8fc408b6f5e251984f486e203777b0889261db83ea127a97b5e53c246456c819b23b6d6209fec1bb3a6df5f173e66de370ce2

  • SSDEEP

    96:7OKfvMkrs4v9rTicBaUTnpI5kS0nvVfiYPl9Cb7dMM/SAWicJPjiBwlH:SoT44Vp3hrnvVqY99CR/SAWicgwN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_shape_2.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3981b28a210c49e6a46780c8b3c52f7

    SHA1

    aa515c55d97623fa458d015c95e632f87ab15bca

    SHA256

    5021053ec0344f8c1babeef4484df3d27a804908479e21321d54009796609cf3

    SHA512

    011a9858099976f96677462037b5e95f2ad01387ec1a4de2fde54d22eea0fb678972ca8d762c90137ce11b038f7e18bb575e99540456f0a84a9173fea6264cb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    27d6874bdca8da3e7e8c7101d5c0539b

    SHA1

    b36b1726daf00e8493e6849630f29b45769a3576

    SHA256

    d0c59c851ae83c8053eb55c27c593007fb539c2408f757dd0a16e3203248a208

    SHA512

    58f4cb59646081b5bdc16f458b897a9948defd40800d601957ebae14310d4fb1c33d660d7287d89eead872f27fc306eb60b77b7a94702ae3152db72a29af12d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba526cb496d970e5e215dcccb0e02426

    SHA1

    788a6df8216c3ca9ef20cd4a80ad3b4da8bf0ab4

    SHA256

    abff53351d57618e34e25e74e9483baee80b92b98a92ff024bcd41b529b8593e

    SHA512

    6c2b16398ab2f9551f7d2facb14f38c41127eda96a1cd21e4c16e54c0dd69594b8769492d36c3b787b3b48351fba25c0c70629f96e6e6c67dd0c9949bc281db0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7588a76792bfc30244b305fdd7d050f2

    SHA1

    dd4cc84444cd80dfe512b8a0d138d4a4e7fd1c3e

    SHA256

    c69c8b37b8c6355b9ad7436ef0e80256d83a9ba06352657c92b33dac1d714964

    SHA512

    a56e05eb3e0ff446b02b26c3e8d14564832a981cac8780853a645734c4056a937b204c847a9309c61d57284f9adbc4164831adee0e492e79c96decc0791d3e2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42793dc3d29e23713a1b13b8bcfde7e9

    SHA1

    7f729549a22c208e855f7e9dd52a74d4fafd2b98

    SHA256

    06dd3784d45ed2b336149d527fdc3cd66d88a5385936472db7672aca3787b178

    SHA512

    00cef55ed28545c360b509f298990379635583723ab77742e881c22af3d4c2d653d45d41986b55a008a7ec10fb5cbaa4fabbfa42b00c8afdc343ee7edd4e282d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5937fc0bd9e423c9ee871f280e900b97

    SHA1

    ed9a3ba50495abb6fa91c56dd54c61def6f16396

    SHA256

    7640ecf55f1dc208aa29667019ffbe7878d1077be8c1b95514dbf9a8fa0d4959

    SHA512

    14954951915a362fb9b7f2b26b9ca069db0d18ba6a2a8270c1af9ace3623d9f3abb5dafac074aa78022911c2224a25a3e7ad4298703025701c772930c0582723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4921e04c232de19763c57e7f92db9b8b

    SHA1

    6bb992867f6499afcfdada70b96e9eff2f243dc8

    SHA256

    317c8f7e561c501cce6c773203bbca41df96fa3ccec404820a420c284bfc02f8

    SHA512

    45f903befe61625ea76a70eea8ee809d5beb0f3574e70165f19afcb24cbfcc1ec1245f498e705fa15478b3c2370f9bcb2becaca66ee0469b740e15865929f60e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    adb544f47d250d815cfbf53c9724bfef

    SHA1

    36e6e8a80085158cba54f6c88876480b2f999641

    SHA256

    f46476d779d3ee05d921f42812c1723eeaa51483146a28782e6e3475edfb80d8

    SHA512

    bdd8acdd2a831f98c644b997149ff161c1252f1be56a0eb5a08abf63d55db88fb0094e5afc043efb7b8fc30445574c3cb5397f71a1b95c06aa7767b2b1a33342

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1ef5a528f3b67eeecedca42b225b901

    SHA1

    5a3c5e7fc959c82680cd1bc8c853a64dccc64019

    SHA256

    4979d221942449224b96bb6c7f43633afd06c17c38d20d92d4652400181aa3e5

    SHA512

    f72bbb204da37355c7fb596032156cf32d12fd9d9a1849eb0e7d723ea350768aa996d8c816f7324cded4aff01eebba3d8db70cbe9d73a24add6e271e48992e1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5beb90bc2c72471520e105ff218f727

    SHA1

    ec97257aca85cebe928b660391870d0c458db6cc

    SHA256

    d2422c68c1c2dad14c0638d8acafba9127b1470f11594c3d0e5cf14a798ee124

    SHA512

    9a4571ee0d3f660cec1d86efabbd0e0c5630c9d61544e5441a9b2f4837c1ac3d97133364cd2e0c3ed166ed903188b705d6ffc6cac02c3d8b033bc856f15cc7e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b619858efb79a9223d7ced0cab1b55b

    SHA1

    4746d094267a697ee6e9ee039d7ece53e0fea9ff

    SHA256

    b76292a67cfd4b14a5e852919a358aaccda0f14da389de1f9cf9df8787f0f3dc

    SHA512

    e3924b8a8a0c0668ad3444ecd3c6b12327cab5c602781784f60b9a479458060e6d2a6c7248f2ece1605c74870507ba4c11db497a58ac39421a39a825797914ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d249f0b6454aa4208c577929a49af97d

    SHA1

    6f66420d7bff397885e707fe5e505340f037acdc

    SHA256

    98748c9bbd262bf8cb794e7af082c87e70d503b7c8e01d1495b7d059cdfa2d29

    SHA512

    d519346cbc673006b4c131a3f0628bba57e53f7a588420f56ce3e3539c78f78041499660712bbfb560cbf9df4f372c4dba10714d59b86a6fa30965131ae4d3b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    549d4ef5961b14f030fdf89071775e96

    SHA1

    9c83b9b5a69cbed6eb6913f38f244967f8ada338

    SHA256

    32244b38eaf3d0c71ddd6a6633438947077034921083f9566ef8903209589cd8

    SHA512

    1a70e3ac8fba8d5e1485f606a3b5f04a2bb82f2290ca6751b715f290b8cf814c67f4df0a0e54902695caf33f4a906a154ebcb6b8c6f938cd4d79cadcbcbe8e75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b2461c37d8a7045c3ac5f523a94e575

    SHA1

    6a72295634a5530f4e79dd65e9ef1796da6dea45

    SHA256

    aaf67349694cc869e64c9e8193f21765dea7482a08b779133408d1ff7830e21b

    SHA512

    f6f1949632cc1eb6f813bb3c34189121ce34bb25140146adf4d86fbd824c1fccc38d878cb0fbf988dbac6b045498e69be7b16eecb2370bd54341669f6aede0fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c53a84a8b10bd708344a038f976f1940

    SHA1

    e8fd4e8f63a686e22747ced7d68d08ba19adee5c

    SHA256

    dc30dd61ec2b54b7aa419da8f563802dd0a203c0d0d8bc0557cc987aeaf9521c

    SHA512

    2efed7694cc70bfeead42356e981dee96d604e9acaa72b467192f66d8bc258eb29a3e3d8b60d104c430e4f0dbdaf188daaf6790fbf4fb5e76c46df1f111b131e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66ba9e2102128f296effa0e9b6be8d9e

    SHA1

    8a35bb95db366482a81160b8dfe24cacf7a9d146

    SHA256

    7e899d5ec2a690ee727f75d2d53f18bcc6cfa41281a5cfb7980d11718f8830cf

    SHA512

    d59a2575a9e788b6d25d5df14958477cfe97084250d2fddf16c25e9f85563182305d626ddf33e30f504711ba2d582d1fbc7d1a00ca1df502c6338aaa756557e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8d0528e3d520b20a8f875cc246a2ca2

    SHA1

    6e2cfafe4fe0df32b74fe91b044b194da5b3c1ef

    SHA256

    b430d59398ef1ea248b86a76a23ceca646a041b2735569699e0a98354449e8e6

    SHA512

    1e98edc2d1e4eabd05dcafe2e871f1b76766ff75cdab1c101e821518b13fde52ea91c3d0480b7e64b19fac7c497efe208441bd2722b76db4150696a96df33c7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8da0426c27770b99348acaea97b4f83a

    SHA1

    3f5f911c5461eb8f8ce58219d084af3bd15f499d

    SHA256

    010635b0078ced4a5415aa3dc67c7afd334ffec66c5a7979778ad23754e5071f

    SHA512

    1e851bf3ec3b3dbec86344897f7fcd1326db2eac57338ca91e2d6bfd7dc5cd4c012cea20369f287b1e75600f00fa3ba94b168a53912a86476c676ed5e348f7fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b83cffd796ff19283408334df5fc7837

    SHA1

    4e10ddd8bb3b76fd824bf81364aa437f8f47310a

    SHA256

    966421b84f31d93368ffb29fd9a545c3d7213a4d1030e98e3d3849d113a15b2a

    SHA512

    739d8b88141b59b175866de4f9a508fcbd15297d1735d5010a5e80e73b3c83540f5a90bd56504efdef9a829cd239758752285c03086c6562ec6d37f387ef108e

  • C:\Users\Admin\AppData\Local\Temp\CabA565.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA74D.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27