Analysis

  • max time kernel
    157s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:04

General

  • Target

    callout_shape_2.xml

  • Size

    4KB

  • MD5

    6dc1e0aa43dd2a582b24b6487605fb76

  • SHA1

    c403b4c464908b8d740d03775742fdc72a6e8327

  • SHA256

    f6ec4c71c9e3ebfc1d23691364cc5736a12c3180ad35e55f4f9dc0fa3ce03669

  • SHA512

    3cced4fb52552f26f35eac6eacf8fc408b6f5e251984f486e203777b0889261db83ea127a97b5e53c246456c819b23b6d6209fec1bb3a6df5f173e66de370ce2

  • SSDEEP

    96:7OKfvMkrs4v9rTicBaUTnpI5kS0nvVfiYPl9Cb7dMM/SAWicJPjiBwlH:SoT44Vp3hrnvVqY99CR/SAWicgwN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_shape_2.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0d20d0d2c50d0362af8afac0609a532f

    SHA1

    04b402eb420533f62376374841f3266c36159bf4

    SHA256

    e418498078e712721c8b743e936f86409c8fd3433ec88f65d02c0db72b28ae7b

    SHA512

    f5d2e69691213329facf620c26a9c11649794329e830acb71db1c982770c4181e1b397305da7a140f7ab82e2b059efe23c6f0173cec50657026c27f23a92e311

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0cb9e0750ddbfa12d6edd457b5f5805

    SHA1

    92f302302af7c5e317f332d70bd4e1ab7cb925fb

    SHA256

    542c441d9d0cae1fdab915f5349b3d3d07b3d9c43c144dfa93c5a74fd75932a7

    SHA512

    ddaf3cf9071005b179b978089592587f5f8bfef941f9922d069f8ba16899514ed621a355f2b9401174c4d459abd9d01d45af0f369f9ea56ef26a06dccb2e5076

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10ba8991b6e41a324cea7c6a608c708b

    SHA1

    7c3dfb66063d7bea5e309e7804794e313eb55e61

    SHA256

    28c454884e7efb4d1521c81ecc49a5acfde63d4f51f7bb9356f73e71dc72882e

    SHA512

    0d5b10e69860342f4d3fa7c6ab4d3214b721890bbf9ab4c7ac5bc63a19423464789097fc0d4af196a058ca6495927c70ca297d46b1479a6877214e8350bdfee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fd2fb3772974be3663ef235f9a045b4

    SHA1

    22aae5d6f617dbddaef3ee6f177f94c3261a1875

    SHA256

    95ef49449cc2313b92c7e91e010befdff5df77ababf9d54bafe88fd774ab1d6a

    SHA512

    8f9e1a0975c74d0e1a477220172edf7bff38be6692196d680f1445d5b515b61e184d521508f1839223ead8dae31df553a631b02d4ff93a910368f86abd5f326d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9590fabfde53529ad965eff78048f300

    SHA1

    ba7b00d0c070eef00cf66cc13da94a8550256b1d

    SHA256

    94f9316ac88fbc856713c07cfcea758ddacf020a0c5145b8e945093b58e7a8ea

    SHA512

    4281163b47296a832088e87751ceade1a831fb4733a22474ae76c4e47d2c9ecf3295c9c36aac81d539653df06fcf5d51abe076662b48d2629a354feab0f8cc9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef14d7579a8a7c008dd4f6a7dbc66cfb

    SHA1

    f75165242f622223a07951e78ecf9fd2de051f16

    SHA256

    d1b10d27676a38b1bf09dd7b54fc3c28dce6166d8704f93e5eaab1b31c24e045

    SHA512

    973959aec0c323e9ac0d7744312c0486a1269a106f8d2ffaf280588ffd16d17117e0e0b068aca8b905ffa8d0477cc649286643d8260eef299e6bb35c8c8b2094

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28bb80c2a9fe6eec337cdbdbeb5b7ad3

    SHA1

    89ccd0f6b641ac8c7f75a9fb9a483393358b7c01

    SHA256

    962f9ff28e2f78774b6d67e930387bb52d3749879b40606edec2b971a1ba741d

    SHA512

    b5484d3605b8165407a10d81f635ddccf31a77ed3af82b420a14a416e9a6337456008888556a02f07d11e1a2de1970d355175564ddbeaa853b2c3edbc8fcd329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3548cfca0750e48263c2248233291632

    SHA1

    651055735045ba181b79bb3a6ddb372a970f2d8d

    SHA256

    4fed634bde236d9ef82f7009227f7047ac9f2203593831560dfd5fa3f3d57aa5

    SHA512

    4f64543979071c1751851027289ab606fdcaec992725b86e622b72082601cc4a9291c626529df06c58cb00af212b5d01d0b2b24e42bd35230dba1fd61bd6f18a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4cebf50c23c8eaa5c8e443405f3a61c8

    SHA1

    0bb6c2d60caf8220c02e851f50cc62b0e897e993

    SHA256

    742e7f5b6d9bd1d28aec9827be4f6128e909451c5e334817bb90666967165df0

    SHA512

    e28fc37ed6ff5cd40b8ae9a421ad7b53447a3cb3dd30806e75017f2d1191efb2a7c84f409324ef617f3b40ec2b8a0252c0b6517bbfc25fb4e1617722b90567fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2bf9e77de0c8f695405ed98ebd37f97

    SHA1

    c71a1bf5c7bebd2be0b7593d6c03cca2c0201854

    SHA256

    d69fba15fb00542d2cc447578d6afe73c7b4181c5da1c6ac102580cf3852acb1

    SHA512

    9199ac836c5d99d87443b8321daef894fd380224c19831be683b2ae24a20ab1c4606a82a2331a3d625791b35bd10214b0d95155e8ac81c51253821eb7ed9b9ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf195cb584e1fe000a6ad45a89dec631

    SHA1

    a240453a417df2555ec2c506ecd803256a926c92

    SHA256

    9c93517cdea0c230593c7ca16d53d7d76cc0390c0632c3f456252ec12e97ccdd

    SHA512

    91818e133f19007fa01e615969900447d3d57d627fdb05300ed2d9467a8099675a5815273a441def4c554f1ae83af4bbb4b9e7baf24f56ed4aead7b014755b00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35c20d51a2a4411e667c62e56edad5e3

    SHA1

    452763dc2adad9dca0d81c3322e093392bb1d4ce

    SHA256

    28781ada23a46990f91552c704eecc4916e0c0cdd48895b8ff32ef41964fe441

    SHA512

    28988f892c936cb67c1f3098173512c74048de67808bfe9f43a31e871cc3428c2ca783d448c48c63647c522c4205ff92105222fd797f6255af3d77175d98f1b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6ab6224b040435a2b3add39097f03ef

    SHA1

    e3d897434d9d9ca392526e4e1fba6be64c3a26b6

    SHA256

    904063f8ab6f7d899c81b541c3b8faf615c454ee833c4b445016260de4db4c17

    SHA512

    5406c833e4bac0b770dbaf27adde0c368e13ab71b0feb684edd4ce6a6a46cb3a1f69d5005651280090d14bc4d04bb438d1e1d3b90c365c3b351f288f244f9930

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    796382c9d65fbd8d36b83a91aa05b5e7

    SHA1

    17683bad6a067617cec52beec45019aa61c47e8e

    SHA256

    a25b8de673515fcdb85829e7774562bd805b8bfa844c4557fa0e78c4fbe32e52

    SHA512

    ce612df22047e998ee7d94d00d71a1b509e5c7d8e04e0a6654099b0b1731e737372daebd3cb2508c703bb72fb47b14c1af8ceddb986f1c7008de0355ab9292ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56500234ed7d8123637e34c9a11b005f

    SHA1

    92a28d1b9dbd473da51cec18f69dc6f7d6d847ec

    SHA256

    a83ccd13a07ddb36e1f862791d8edc14bd75dc758cf10f6ff94453ed0ef2cd0d

    SHA512

    dc85bcf0ec76d008341caf40f358c5912963c56c0a129a7b8dbd5cff0df6d1a30bec67dddbb8b9352b2493c081d37b64f95786d2a34f7e8048f7b2701a8e99e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92eb124c4e4869edf86a4eb1f998081e

    SHA1

    44ce936ac774fe30bc41f62092d6f70c523352e0

    SHA256

    8a83428220d7f34150fa7e608d57e07d07950806c2a43b0dd3d03828f79d4ce0

    SHA512

    951acd2f91e8ee91f84a694514ede69df2b92b0d3f86ae439c5921778f593aeca3711edb8d1523a678c4a50ae42f3e8b031fc90c8f95b43d3b44b3371598ab09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    167f28e625bfbc32b8b241334de17b9d

    SHA1

    52d4b0ce98ab7c83b79f81a525d95290cf248604

    SHA256

    7705fea802158c4986bb552f957ee13ed75f381d96846d2781856545cb4c2bae

    SHA512

    3f2b4a7bfd4bd3e364a79d54e5f8211435f94a990ed82c6c7ab6926532b32dbf1b37e808ed44cdc0b3c4c87a3666f36a08f6953fc15dd0fb82d2bfe6d6c78457

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    daa50b3fc47c6a67a3c56f05530d1270

    SHA1

    e08821b3532870a87b85f02bc27e2b9d806b59da

    SHA256

    4260671a445088d5966e6b56f2344df3f6e590cc1b89be693f08597aeaa81496

    SHA512

    8a5d21b97e12606f083608528241aa7d416273ded93065d5f6e8b2f4a97460cf64a53f86e79cfaa081e4243965a61ba5944f3b5e2557bbe9811b32117582a773

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e281a7551f912e236c227782df4d7a1a

    SHA1

    3897d8b59472b17ed8dc50a1c06e0d4e5ea9e5f5

    SHA256

    1a2e629d729469f8718b4a5c0a1bc00f4167701258be73aec062d6c9c5b0b77b

    SHA512

    07cda257dfd58a81c161524d23f7882e6c7c4cce368ae10642dfde4b86b91e45b18421a2dfa1adac242aa29909b65f73257fad44b41624fd8d5e98f025fd9755

  • C:\Users\Admin\AppData\Local\Temp\Cab5497.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Cab5E8A.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar5EAE.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf