Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2023 22:08

General

  • Target

    callout_8_overlay.xml

  • Size

    2KB

  • MD5

    65a2809f038ffa4146cf59a57e6bb32d

  • SHA1

    3b5e30bf5de229cbeb085e1ea355288d63ebea51

  • SHA256

    8dc35b01684c284e85275509e698edea94e73f6e328732993a96b881f20eaaff

  • SHA512

    2f792059b6aa0a1dd32924169fb9176e9c6523c6f17b17cbaa2486bb246b6f726e01717b47372d9558501cb2dc5f51c1564b7ce195bcde1769e07b3fb8a7879b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_8_overlay.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    214c2d0ca95f7fa0f238b4b25e83e83e

    SHA1

    ed6a05bc6ab52b3a16e60ac84517e496ed93d91c

    SHA256

    c36de5344fd5eea749ce8cb90f62e551005b636b9fa23c14aee8cd2dd949b2b6

    SHA512

    b4ecb93e0b6de3cac9b2913ed510e579c1a562bcb82def22e69e5193d2a6d0746cac7af0a226e4f557a34cdcdc8f1e05fd2898dbd2735e32d782673e6076af72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7023d83c1a06c728d99ef4b0a2662a39

    SHA1

    709e2b56385159813eecf2fa2c5b40cab20c07d1

    SHA256

    7854f4ce0611a3a067bfb4a1e1b965afcf371bba13c00b6d3c59a53c7bf6dc13

    SHA512

    301563cc8c06828fe415000a1564ead9df5155c6caf5bb17119c9db0c530108d7f9d88974d45a7f6809221114cc159fe6c383f78c6c7022a2ae0e18a2a8bd6a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dd251cca951f63bc349642aedff64092

    SHA1

    ebc81b7b9fed8db0616fb82407ee6957d2d3c6fd

    SHA256

    7658f4cda6379cf1f6a232ff6eeed8863fbe3cb5ef0d977ea29609bb8a1ac8ee

    SHA512

    f113a38c63559ea5ee1a8d74c668c4934e164dcecff8377415e99fe070e34f9bbfc85c2b259c7978d148a93c08cb17ce9ccf11e8deb8a46882a28ab5dd0cdcb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed6852af1ca408d29447724cf1bc69fe

    SHA1

    aea5d7a2a80d4369ab382f59316db2c5461fc2e7

    SHA256

    ed9885737565e7371a84fcf462f45c39977a6eb6b1c4db083f7b2f826bc7a166

    SHA512

    b876e7a0f60dcf3126b043021d74d473914233e9cdd5c25ef2d926e36409297645790874f070f0f6d5f0970a1c1d117d77b5e86407ce26e07435f59f0dbeee37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6f0a094c0d3a7c0f8828b051c941e98

    SHA1

    f02f628384dcd4f7a42127fc673503fdd814162b

    SHA256

    4c316b4804e7bc0ccd257264d9f3dc85c4dcba6921987f254639bd16ce2c2700

    SHA512

    42bbd4886d0859fc13fcd92a9fe3777ab9936a362a530ec71ce1f9a1ba526bd61a69d2c782563cd1b0486b7eda393af6f6de764f2125d38fbc3703483fe60bb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c57f98a243eb1b56c434cb7f60fb690

    SHA1

    8ce14c75c5a43670dc49cb2a7ee8939a25439b88

    SHA256

    fcd46f1e79fab8e51256ef874e38a446f04710792af0751479c64509db16f426

    SHA512

    04b5c707f408bd1369480e8d620226859f1a3df012e0626bc02279585cbf33e43818a1fface7b2cffa417dedd7445172e3ed69186217c44549863c921e913008

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    def8056e18b74d34c5230da2f02f0753

    SHA1

    0562fe206af1ce81daf5ed4eeb08a40c4a197d7c

    SHA256

    94f047236a7b8ea50892ce7ee3bbfd21dabc7dbe2a2be434ced17128f7355493

    SHA512

    518020d035ba22bb07b12edd1b34a9f7d7ae52f2a703e383d315d966aae97fd88463b0b672b2c027f2a5c9a15f9e821ff7c4b83a79caf9ac4e871ef55be4043f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b413b497ba88a1de038090d4cb72650a

    SHA1

    118724ce1dee65986c9b24970d47223afc68a74d

    SHA256

    38537b68763cd77dcb04cc686f52c62d221b563ebff9ab4216fd45d363bd490f

    SHA512

    e73d29067631446f73c6858d6deffbe3455e2fc7873f3f989c919e8333e5841a8bec129e6fb21727c87fe589beb6445e684ea0ee729697b3bc85fb6d1dc3739b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    efad0af5e2a6b8bd1e6104f59dbbfad5

    SHA1

    7945ee5e3bb73e0e050c082c54a5d5c23732be99

    SHA256

    e6d6838f0a6ee7c5eb5d5680a18fbce52ba0506de3a59cf433b78ae19b9e0669

    SHA512

    97d03c5260a581a58df628d4698dbfacb4aba6d6bbeaea55af8f7ee693eb571d8d5753409700a88bd28eb483a4adcd5f4c4f24e7aaa8686be8b65e23529b2cd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a26592b1ca972c20d61e2cd230264f02

    SHA1

    77e765fb4a7dc0757c91f20c39de5921031d857c

    SHA256

    c3407b2df3e4d9a9cc3fa9e653f57e739b9dbf975ecbe3d7503892944158f809

    SHA512

    01e9d627c449e133bb756b7641d996f60e4dad200b984722b7622665a4116a187fb303a91dd6b4576a886c28735b95fc41c73cd1579a0ae13410c2d0e908eb31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    abd05ebb14caeac69140c520ee8a6aeb

    SHA1

    c5d00f7eaf1344dd9faa318ae32555660c7ed343

    SHA256

    358d4291963b17a290517884a4144a05443cf2b45b363993ac5fd14efc5b6f96

    SHA512

    c6bd5c6b505c771ed2d09839c15527e524304a3ce0d5ec29da2a06d4f28a0a23494e617df34e2aea5652be18659e511a6bd5c1f244e530fbc0a15bf2811bb5dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ce30da5a6cd651f58bb41d9abe8d59a

    SHA1

    6d27ec21e7a41a128834bcc9757e0586f94daa57

    SHA256

    d27aa319d464bd4a09f6e8a5523c0ee1a65a9d2b50e5d20583bc1a01e34874b8

    SHA512

    4e504998453363cad8d5e7e433babc7cc5519f8622968b3ceeacc311f264ac275edcbc19f490e0d7fca1bb61eae9942eea657288115239e88becf266d58674f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0b21529b7151db50ce40dadfc644d60

    SHA1

    5979331605d6ecdf2bd2c12702b620b3b71d8f9a

    SHA256

    17bd9318a031bd946fd00b99860435babc7631d2cf77cd84113b5683a862ba29

    SHA512

    2a674790b110a24371cdddbb2c18df13cecf91098e90e071a30ede335c861b4bd0353a00c08136289f70dbf8d4f9e1784b6d07ac4b97fd54a220a599e1fb2c77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6655d4f29e1ced625d28cb1baa15a7a5

    SHA1

    44882e147ac593c1b85dac4182e167334e2a8792

    SHA256

    307f50d8216dbf196064a743bdd099f7f31d1085a70d8efa136dc55e27205996

    SHA512

    ff58fe17fcbc484759a6f5424aa37039727fdb5b3b536397a067dc9e059247dac1a558e9b77398eca278d630dec11dcd1349829ab04d117724de371a0d1e8402

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c336d19ea18bc7a3f7aa6c41a5c023e

    SHA1

    3a898ac31c8dae1ba251596ce3f5abf5647c951b

    SHA256

    04556288876cb3b256f412029b703e115e98479a6c42db145e8fd119de12024b

    SHA512

    3930e85aa3fccd05ff5de38b4b74a50615cb2ef886fdd1d093c5191cfbb5b50fba7b6559b496efee45476f7e4f3d602cef88098fa1151ff2ea8b28660b664a2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf7be214ed0f4ed430113a156947365b

    SHA1

    df2efca05c00828cb5c7b0f5afbe37f94ddc4948

    SHA256

    6912e81d85cb0f1fefed2e0d27a52b0761ae59618e3836286b5445b56a5b6aba

    SHA512

    e3a84f26a74f8c987600d66716559e0113bdde0be20b0e89193908906d615ef34c9c88b9867d49315145b2ad8bb54a1270acbe4146adf84f3e03837e72c8517a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    588b7562e030c7131d41d96f44ab89dd

    SHA1

    3f9c23ec68ed944bc9a63aaea40a76f9ef5a999c

    SHA256

    c526291b3962675203562a8a706029ff518591f73e93f3ba5322aaf6127d5af8

    SHA512

    e41011dc1ef04d75d7faf21fcce4cf1d9b6e15d64b5e727f689543cc4fe15c8908921d6a13f0b49e1bd45d11e80701e0817e85d0e44c20b2d967f2edcd246f46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92506c4fbcdb7dbc04b6835aeb9ea348

    SHA1

    86aa3351f605190307c173bcdfb1af91bbd2261d

    SHA256

    0414303a1dbdaf0e73a1d9f6357c76c2d292145b27075d7b1714c3a7c1b921f4

    SHA512

    e9fc296fbb2de0cf8eef3608b6be468f77e1322b0675c9100da1b879ff055e73fc4d9716107e9c989cc1c099da4e28df9d0acb9f78aa3ca455caa7439368f31d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1aa2fadf3e7583da7c65e39ad0cb67b1

    SHA1

    b9492cde25e2b1cf197cbbcf17b36b0daa32ee5e

    SHA256

    585a49cbe0a6e3d6395c84fd528d0e79a6c1b6ccd8bca6ae9aedcaadc08f3c35

    SHA512

    4fb2c590f9164c1f94a538a00eb3b46faa3273ffe5ee4ba9314423d4dd591a6b4de1a91889ba5c3c5ac4a833f3246ad39dc7a4cb7600f65cffc80bf030e23a55

  • C:\Users\Admin\AppData\Local\Temp\Cab95EC.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar968B.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27