Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2023 22:05

General

  • Target

    callout_dest_bubble.xml

  • Size

    1KB

  • MD5

    5a1b792bf859e656807fb87228b66416

  • SHA1

    21612430725df233bd8bd7e10ae17a33a7923429

  • SHA256

    07c9841559f933977b9448e4ed5e18e3000666faa8768526136bccebefe8b104

  • SHA512

    e908a8dd836b51193f62b60eda3a5371cb9f2548e0b792e90fe624e012c7d64c20c987ead14f591a1e59b7786eec31221f56148447ba8deb53082c7594462b25

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_dest_bubble.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b9e82e399b5ce1e9923a80be4d87a179

    SHA1

    f256315f8ca80e83d297d512fa2f9179ee1f0495

    SHA256

    436e168bbdaf8aece81508c3d3961b8c471bf5547f19571833e06f6c7cd78516

    SHA512

    2fafaa70cc2f6d0fd3831c9e241b537a893e20f52d8ecd55abb6451e54c4c51371b66dba516b4d32daffa5bbbb129f7c1565b7cefb7a7382159fb4ecba0c2b5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0baa4f857234d2826c7d2cabac3557d

    SHA1

    16b3f2a1e7acb710ba4290c15b4d806b32a840ef

    SHA256

    dfda01d2d5864aee47d7cbb2de8a2657b6ed86d26477a2b2bd5babfb71b456e3

    SHA512

    4590bd2c17dcd67b08150fe85af5900169b3afed765f74537d6d67fe4bdbea5be2b4f92c6d2386e55ce7eb7af3a29166ee116ddda68ebd98158607c326cedc33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d71e06a18c8fb3179b4388375ed3f41

    SHA1

    dab004660bd1e1565e0c1fab9d67bc832ea2e357

    SHA256

    97bd88d432c477ac635166894ba4e35320f144ef9e881487af1df364051ac36c

    SHA512

    9bd7122c9eed00ba84d16c13d4db0ea294c9b98fc12c85b32c0ef4e19032e73d98cdd5f335ef5440f48c8b7974a38a7c8b319e56e68be436d61956b7ac6d42af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5dc7bd84896ea3c682ae0b76ba0d916a

    SHA1

    453ae14f4d8cb30faf4d9709bd6e63d8ae80607c

    SHA256

    b8e4a44a4c8f2db97e210ad5ad02a29a253014a853b929e5bdb4931562aac30d

    SHA512

    f7ab8407bc019469252914339247ce4edbb436160e380a05e65c1c70e7b588d3331c071eb40bab49a60f3dbb093dd2c9a48a6fd4cdcbbae94fa17212c5066b86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9ba1033506744dbabe7ccbd9f68e993

    SHA1

    c10b2d4008784acb845e2da360aa58c27ff79b32

    SHA256

    2e9ba6f71f796df3ab6ff4d2629d24d9845762099c310d2b1572c65fe627e5fe

    SHA512

    2951b93e6abce02575377dfebc95c70ac99805051ce83cfde291619a9b5985c7b6d50e6bfeb72e38a7e4e3becfaadf2712a0ded2de2ba6a8b5454f78fe2e09fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70c1a4969c2af291750ccf6437d45100

    SHA1

    ca1829365b3d04af8ba885e713702ecdf4565f3e

    SHA256

    070c36dd85cb9de2f397f344566f8d750b740f684caef042ae93087a68cf1fe4

    SHA512

    f6360209f737a4ae5240aa6e6139206784b2ea9cad7871605211fe27f873e6476c37677cfcc4344ef4186bf51e75e5c22c6b75192afdfd609a97d2c888c47723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07288770bf37e5d79ef3e07528699480

    SHA1

    70f7aa4e5332dde9a5f02ea1eac63072be1f519a

    SHA256

    37c8ebb297dff2fccf92e8f862a8fb0aeee01bd54ff21b4329a864b23c4e4188

    SHA512

    e520676882a08c406fe2e68a1a850af8cfa891f046e531746e038e8634656354b65dc8015c55a746e9a70a860470d1a394690dadbbfb7f4016a0219e69573e3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74d896feb08c039f8ce36012572fe095

    SHA1

    e8da488fd9126f687e67e653f11e8db31d1fada1

    SHA256

    d99ea9cd334345ab975a624732e669eee54263ca19d55524ff9fb2f1d2453586

    SHA512

    1ba700fbf8bb6e06edb53031ba9b9775db800a7749d538c7a8d31d977908db4ad5c600237577e73256e91a2b56e98c9dc6143ad4d0fa0ca71961ac94f2da8a7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8e534ee47a1e23ca6bd3a5fff2c0864

    SHA1

    2f82168a833eac4c148316eda562ba218ca42086

    SHA256

    84c93afddb93eab891bbabec36bbda37d06c3720c1b9a75a69c4d8cb8dc43414

    SHA512

    3aa2fb7bfe68df2dd4bb23c52f2d95c654f7a7f3dda95467bd5455462c2486de0499ccbf932713f0958fadb27abbf0e84e5963c8c713dc3ef5a40aca2be5e11b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf18cc2790cadd02729f6665e4c0eba5

    SHA1

    85648b7a487ee7f4ea5ff2b8edf6464fe0b2b7a2

    SHA256

    81f4cb418416ccf5ccc36ce103b17231be05cf6cead47fa0ade068d6c83056cd

    SHA512

    99f6b4ffbc67ffbe300dd02a96fa8f36bcad6cd4a7f721518ec3d71425b436fa976be4834ef40e117618bdd054d01718a1a6c591f8600bc43c9472a80f250e4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10f1c40714e0255d50880860b77f85ec

    SHA1

    9b74bd96e0f71cb397a69f265b5505663c9b559b

    SHA256

    89bc5ddb6da38a9896a2e42cacf6ce0f48569dd3a10882730b14beb4862e4e5a

    SHA512

    bc6b26818270bac6774d8bffa49a48ede14024adcfbed9fd815c9a5b279ad0ec2b5a51a47a191aa357968d349d4adea11b64857912a92668814fa395fd106c39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bca48f6792174e5361b6e31f1fd331b4

    SHA1

    c908308f4b1a8d7924ba197015b3e60481c43657

    SHA256

    d66dbaba238b20f227c628dfa75eff63fbdf4ca08899597b687fec7a1cc769db

    SHA512

    2d0bd1d8d32ef924de8a0d8b124cc9f332c302a56530aa62dcdc95ed732930b7939afd6ef81a5f8bb840f3b608528a134b94e76c4f76412f190cdbcbf2cf2724

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6fedae47a556cbee56672b143fac3824

    SHA1

    4f3b15c4193d9018e0a5dd8ebacf2ccb6744d602

    SHA256

    20841058ab7dbe7b40e685cb350a1cb5b4f346fa7edd5ff4c19fd68c36c861f4

    SHA512

    78c2c474880a774a06d2fbb0a614fe7c815cfbabef0240e86b47258be8fffabb1a7d1a4a0a4ae0408c6bc16ab19752f1f4ae54841b5aca8ab4d86b0fd85cbe57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6226e2de0524bcc4728d68f488b209bb

    SHA1

    c3ea76f9bf31ec0ea7609f57c571289bebc21d24

    SHA256

    c4a9f1aabc9d0160b1cb80f147c73452aec874882f365e228c3bdfbcf0f7409d

    SHA512

    28b54c784fedb3b1f55f48830d7a3881232d82cae4b4a6411601bae9ee961cd8aee65e0f88ba57ee813fc4468bd0182aafaffba373e7dfca6f5a028cb2bc1e10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e382a4cdedeef004e2b2be0fe8db745f

    SHA1

    141b07886119a1e683734f82f677935f2c4c5621

    SHA256

    5cbbf27ffebef58a1b5435dd0c0d590aa0cbe0e2860bc25fa760bb2755ad4f84

    SHA512

    2c67d64f71514bfc20bf77d68848736e22796d212ea268201e5a86373ba343a8851c29529949de2db0c5464fc9f04b5bfa971a50f7a7fa6d4fa320c770bc91ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ebe542c0e3086a9d9d3e9b31f20fa90

    SHA1

    c6b6af974e5b87a29410bbc1f9290746b5452d52

    SHA256

    2dfbdc14aba4f1880c5a43811364e882372cc4d4ec0e6390492c1425f9be0b1b

    SHA512

    2e85c7119080cd10d39851c631a4e73b72190a0f18720712995f9d223249edd7a3e808a2586f6e296aeed7ddf960a8a7aa3ddcbbe51aa63e37bfa0c81737a186

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae4fd4874aa2c84c665e11503c6b2722

    SHA1

    6440310cab2b6dd455a086959fe70f425ed8338f

    SHA256

    5fa19a28d7c4996c1cb3f01259eab5e6c96bd682105e93aaa74b249a275414c9

    SHA512

    3c839910eaee53faa922f4f649e3abd3a6a3e664f513e2b65e3bdf1552f4482c9d5ca9677f89d71d2541fb6519799814040f24576650a5f086974c27bdea399d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bcbfa47058eb40f1652189cc9cab075

    SHA1

    839142ed3b38bf2eaf30d811b64cfedc3101603d

    SHA256

    1b1925b9f8fa7c3a5fe87937b360ef22517772e7568be9d0dc8a3731a3ce649c

    SHA512

    4692abedfb94a32840d590a1a713c1dff51e398a6dd13dab54e892d1de77e47b9cfb73315853ef7caacc8df15e229d80de41d537448167d93ca706cb6e4286ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc7a3bec4b1e407e9616cfbbbe6d9772

    SHA1

    0f4a610af557d093bd50843fec99c78c51597148

    SHA256

    9ca53e384f17988925a50b5d2c9b0e92b785febc3b19481bf3f04fabe77b2141

    SHA512

    ba6c018af4c01392e384d605555473df1ec883f60643db51b03d537c63398c0132b0eee240d2eef5da009d52bf9ba61dee46be7d56f498f08f0cbf02744c3897

  • C:\Users\Admin\AppData\Local\Temp\Cab9B4.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarBBA.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27