Analysis

  • max time kernel
    134s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:32

General

  • Target

    callout_dest_bubble.xml

  • Size

    1KB

  • MD5

    5a1b792bf859e656807fb87228b66416

  • SHA1

    21612430725df233bd8bd7e10ae17a33a7923429

  • SHA256

    07c9841559f933977b9448e4ed5e18e3000666faa8768526136bccebefe8b104

  • SHA512

    e908a8dd836b51193f62b60eda3a5371cb9f2548e0b792e90fe624e012c7d64c20c987ead14f591a1e59b7786eec31221f56148447ba8deb53082c7594462b25

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_dest_bubble.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2856

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    df2beec063cd86421b43ea953bfdf9d2

    SHA1

    bc3abe7f5f87727f0d68a8620f9f407254a8fd2e

    SHA256

    f874e17c5d5243e4ed499ef08831f6f5534a91b67aef59ff4bf7ba1948d7c3ec

    SHA512

    8f9db681bdb9a0b3e60d1f10f9a67de5d92d9ac678841e6de120da42e49806dc91fa175f56cf8f4c092708fa4bba5b48315c19d6897dc110155777fb95ce43ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    96247eb77773e82f10ba6a32fbc91488

    SHA1

    652ae30ca5e0f1a05bfccd6397d3cfbcd1ce6ccd

    SHA256

    4f6f6822a109cffab9428fd6fa847dd25b381590c8c1ba88cd1455acc2fb2768

    SHA512

    9be807c2c8f55d38bd1221ce69b22ec5dd65ffced2f866ab47b5497a43a1403ccedeb7d02b7b2325a4339e55308e17ae1107cc34601a97993a9f5caf0903bfdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f86feddf661e7f2df286ca44017b07bf

    SHA1

    7aee7dcf3ff7249a8fa1c79dc8d257e2b0d8fa2d

    SHA256

    752aaecafc95d0caae56fd4483310f55ef21f72293b6b8dc40863b6781d9c237

    SHA512

    18bffd430ae1fb0e4cfbc55168cc9781999994aa0d30cab6a69b185da1a7cdc4496768b3d355da94480aabe75042fca3fb7ccdcaf2bba7846efa11606038cdca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2a839e4091f7a238420e5a794d49ff5c

    SHA1

    9bfd3f9301d465115936f40800e98eba1be851fa

    SHA256

    a5946e5f13c26de933033f0631e12d8101d8e9448509df7b81e55b89cae8267c

    SHA512

    5d1cb1bd4b2d08dd4dbebc5af5f04f475f4a269c32d6e5d35596c2e1ea5c41606de39639a75afaafd075f3cf9d27aac719d3c3cb24a6a35e9c68424fd272b2a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c3c45dc7a3b8b5ce7c200cb034171497

    SHA1

    b8d79957423cea4cb5868f0cea866854353c096c

    SHA256

    5c48fd95f1a878b406e66c855d086e88644d4e059bcfbe3216e138c7844f6e84

    SHA512

    f9fdb656c6b98fd215861b14aa17f48fe322f4e34229947df2c5e9a07bcca1877e716e0db3221b15b2b1023eda7ec17faf1881dcc2c9e7686ea854362f792949

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ac1761418f9e01f3fb471802048240dc

    SHA1

    c8012c30159cf07d30ceaed7974c3c4e6d234170

    SHA256

    7cfcf99a24868dd3677cbf4b601624e00d5d21bc918eb251562fb320be216021

    SHA512

    ff882d3ce25420590e38da2e3917aff765580adf96bc5ff52247a14038c1531ef840f3ab1cd442d763eca86e898ef8255ffc657d28163a2d571e12e4ec677141

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d2a43847ce2db5cedb86aee752fa79ef

    SHA1

    63023cfc70b4a7056b88c10edc811783153ba564

    SHA256

    d6b39002bc37817b0a8753f3710a765503f48144412c6267e2565661b8832d1c

    SHA512

    bc0084ce831682bc5b3f009df18f06ccd3f006b215f7da3dc46291adfd4b942cac950e9483f479289fb5e97805f753c0df7dfe01f8ffba0a8ed18156462f5c20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    874546b6dc0d7c6b3a0149f3020ace83

    SHA1

    fff34b7e97aae251a379e39cdab9604c841753cb

    SHA256

    d5990f887e5804ad2c530bf17453e63cfd9dec77677b5042c42f1fc8685ece9e

    SHA512

    e246b83a358927fac2a6a876b3ea25101d7c92f079c2c1b1b55786c4adf49f30b5563fbdee6569bfb96aef414975acef5a6aac71e2150b2eb981d9a8419ce277

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d4c18dc93ab3edb163dea1c192c960e9

    SHA1

    8b05dc54a18ca1fc1ccb64ace8dbc39aac52dadc

    SHA256

    fbed02678e834ac97ea32d2e44b1489e2d9aa02bde5ff4e809a0508efc180c77

    SHA512

    e61599d98771f5bc8988c82ac1853ba3fe62ad9032df41176dfc33e90eac6ff1880a57e6655504a2d8f97b77e8887e5c971eb75d05623010d205b8b2d22b4f0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1491ede5d715d27e7937ca6b5883c41e

    SHA1

    84fdb4e4a7e386b85ef67e17c07b1d04f6788fd7

    SHA256

    a74ae421175f7b4d2f87a309dddc9fe53b02045668bd2c0a34d5901fff1554bc

    SHA512

    5c221e47ff0edc1d81ef6efe1851c16de3ce224682e5d6564242c0aed45ef050918b42d5cc44f974dd2548bcb5e5e30c0ccfede2f01ea765b835267862e7fbb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5ebe978ce2da8884070dcf51fd9f7387

    SHA1

    f954d13a0930c7ccc16ccba89c22897bca425708

    SHA256

    392c64a4a4f7311a735c6f495f41fec7fc62306310b66dbd848d363b299d502f

    SHA512

    b32dc467b0604c0ecc2d3c076f0dae015bc30bf8587c0eddd3785660d5d779770cf0de3da0289689a90dab9c4417105533cd2cb82d524641e07d4e90c8f1f8f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c51e4d4711754a0849b5d1604b9e7350

    SHA1

    d337cfb14039a7fb343541d3dc4d5b4a7f440aca

    SHA256

    731ead7145d89c27bd54f9b21f760a1f6e72dcc39c2d819bc72f8f3ce171b58d

    SHA512

    c510cac0294f0216480bf9631ee9d56a6a1a3e0c7e4d59405ae8e237e1f492819db85b12b843227aab2b254e35be8df3b95ab4592fd9ac833030a8908db0193f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    770fb0b7a908c83e977adb63e9b7b11b

    SHA1

    f18ec2d98214ee96e613b72a5f3e434cb74d805b

    SHA256

    c0f9a9b295a46a9347c46c8502a7870f21c6f3933d7b65f4aefa251e4729c3a1

    SHA512

    9ef220b0a1bc99170acf2e832b0ddf0343450ec67c4f62dc48363a81411abc4467035c8b9c87fb8233d6844b2cd225067376d0a9fb8a57e4c4e695de6d86af14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a66015b483174d2c846e5c73e3cf9e26

    SHA1

    3752446d9bb31c4d0e0b3ff6db0a9bb5918a1911

    SHA256

    3ca1afc3d71301fcac8b2f5d6cf7b6f88023974e5fa759e5d6fbc0541a66bff6

    SHA512

    b42d31dd916f60a792141bb27e1e5311ae28c6bf19fc7f890ba4ca80d2ca78ac3ef2f8876b9194b4b7cfef568eadcad0ef6a6e6454f4a62d5c677a69ab323672

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    27e67003c0e350c458920f8e32a3f959

    SHA1

    441a194383ce268c953af0acd911a693aaf3d523

    SHA256

    852f933430b9c03c5d476fe007c2e60dd3f10e0aaf3f8dcfec4fee4289955722

    SHA512

    6b221bbcca2f801500d2d5a83c8481c65ed803cdefbbe9ad2d78fe62f5a6aa58f01b2e8833587413df4781cfe7bd9b842d8765b012475072c57c4d67e66a9265

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    480467bebb2dd81a6b5979ea6ced8cde

    SHA1

    aa89b2797f9c1ee169d76d27855ef83a4fca7bca

    SHA256

    2e6590487c1a918676e686d1cf5badd4260b0165557d0f8a9109374deb0d25f8

    SHA512

    ae5e82147c4d8267a930a2aab36b0a1d42f639a9bda459ecb85f51b3a9c76823a7c91327c223a75a83d7deb2e46ec95d71d8e920e0847fd641a36b1a6794dd98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    87a327fdcd8de3f966c5f1054c45f1b4

    SHA1

    d1bfc386dfcb1c4e4027798b55b3fc5a237b30d4

    SHA256

    15c990a9ebc96d88a71f30e9c8abce41ec5fd0d865c56017b07f0a43013ddafe

    SHA512

    4d1c3eb5bc6b16babd94b634640cfbe19439e8df140b50265bd6356e46bc204ca92af2c17f674ad142668c70096d72f2b3b3a213875b87db738bd1af4cbca601

  • C:\Users\Admin\AppData\Local\Temp\Cab8671.tmp
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar86F1.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27