Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:04

General

  • Target

    callout_7_overlay.xml

  • Size

    1KB

  • MD5

    13da4f83c32b6af839f40448ad4093dd

  • SHA1

    2dd817cbb6c2198c9b622bf8a4a4bd0f58c5980d

  • SHA256

    22a5b339c8e15d0b1393e540966b414ca577f1e6c2c4682bef22e98f74e5a5d3

  • SHA512

    3c5e37b7638099495ca3773edd1b4c780ceced0db68749c7c7437ad460ae765f1e3f952e146f7851a778f9dd32a5c7cce57ee616c0f015231b0071c9a39013cb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_7_overlay.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64d64baf3c6e0f43e8f8d8e43d51a2a4

    SHA1

    bf1d5aa019e7c80f662ad05598891c39d17af527

    SHA256

    6f4d8364592415c5a63e40578f0c85c9eb8feec8ee995ccd5aa9d1e2775c22df

    SHA512

    57498c5d277d15a890b2bf3120839607ed13da9d6e3664b89e18377a68821f4c49a45d822e20a62c66c9c64fa7cb7222aca935424609a1790be6826de9641c4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    015500e182df1ead0ffc698516291ef9

    SHA1

    53337e1e8f94e24387f78d3b3f6eabcd1e9cb14f

    SHA256

    c6b8995bcadaaf7dc900ae234cb6f817218ee8dca5f4499b95f190414140d773

    SHA512

    f391e60ea183f98ed9b97aa9fa99af57054af25e785a9e883c405fee9fc44fa054fda254d4d00fcd96aaca739596b68fb70d80c23759f3ef803f43dbc45768a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f456e78ca1b7d4800e87928feabb12f

    SHA1

    5ad53d1dd8cc03a8dc656456895366230729dd9f

    SHA256

    f54f33d240078d214c826b7b721b2d9e3ad05e0da50ed9ec2a7988d0a4e4a7a0

    SHA512

    03c5d1ea893218be699235c2657b0227669c66de2a8fecd49c3d9cc8ed63ef8906919e640c19f17218c6209dff4a4ccf5ecc9933bd1ea34eb7dd4dd9d1587406

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8d37569ceb94b4b777394ed215e5b4e

    SHA1

    abdd7e55b659d6ca2c109a0b6b9eb7ee77d1aeed

    SHA256

    c99fd66d586f89eb4f478b6fe903367be5b57f63d133986039cf4729edf75272

    SHA512

    c8e56a8fcdd08a323b53a324d2f0e47a39f90801442459d389122f5226ca5c13529a82f35e5e447ee8e2c3e84c3389008865a73e41fd4230e000ae441cb0d29f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc7c31632ab9c9d340a8a8eceaed4fc2

    SHA1

    0598bd8286c89b5b11fa9fd8c30ef31e89fc7fb8

    SHA256

    1f4ebd3f882d803bd26d65030fd95697614ff64af42218b8d8e656cf53a10044

    SHA512

    1b10926cdde0fefed5e2adea7ec6feb8ed998cc595962683d5ad3a8ff1c66b9bf53b78b675245993e8599ce0ea3f0965c66cf8f362af7a2b9917ccbe8be6e979

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ecc1334d20bcdafbb11bc17acc028b8

    SHA1

    2d0d6b1ba7504cfaf2d310e9f8d0dedc020c771e

    SHA256

    1930cb09f7a377c05683595a6bba827d866c9eb93ecad96f78a1cc2cd57eb3c8

    SHA512

    25c9b84a97558c5134a399147ad9fa8699dce6023aa6dfa3b2562d59175fc4c3bc34d6d01280f64f22207ef2c1709fef7830a030be04f86bc5ca18d301485e78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d21f21e339cf5e9f7ff1452e221f12b

    SHA1

    6e5ad6ba394d2f31f146c4f5e070b922fec65753

    SHA256

    7253190ee4442ac9d3f144107811dc1a293998fe27a6295b5b2b822857a04083

    SHA512

    91fec85f1582055f646bf26b35d8401f401d1f58ae5fabaf1270aed8258d9b9fe1c5df4ac86f530f45e1d06f534f32acdf3af0327d4928b43d8a8275a34c2632

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e94d9a52c4e59bef146e15ffa5b2fb2

    SHA1

    c5ba8417c365a5c6679a4bb740064e971cb73f7f

    SHA256

    29b2b883ddb8443f8aaf143527f8b877932b8141d1cf807ec10bb2dc14216ffa

    SHA512

    dd8f02a01d590b5ea1bf2cfcb6c276ed346f050a8830e81dcad0ea8ac1f60db113d4c1fe8da0ec3d59b75cceebd7d91dcb7b5b556871d1301cf21a30a87afcb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53799f1f1b60156d73442c04d232d580

    SHA1

    321dd2a84824b102f227829ebc6bfa9a73cb6fd9

    SHA256

    423e26ab25f5fb0ed5be46dbe3f110a8fabf46a379ef3b386c652c154fb1e781

    SHA512

    5e67fc5a3cf79d0a7ce91f5dcd955720c2fdd237b6e79635db4ad16d234981e09819050b403dec8572d3c000462f84a92cdabfca49464cb9601546a171478f8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cdd61520e7440f207e81e6c790e52408

    SHA1

    d126ee94edd56122f0f6b2cc1a6d8fb82929f68c

    SHA256

    491934b976e445158497e61bf5b7ddbfec126561ffde7de170416e6255ed0808

    SHA512

    4d10ffd8fcbc7588c08f33859a37ba7aa74213689d59ae0b27b6217bd9571cf72f7445b4435c771e1f0b3b7cfb285a84012e9dbfeaad101dc59c03649a26a6c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8a4e830daa28f9f51b9b5a69d9844b9

    SHA1

    91d25dd273a82f7c682f5e3f5f221720a4029841

    SHA256

    a964d486f96eaa23b7ceed986db0ba87a850a64f468d7a610b7e24e8b00489c9

    SHA512

    32abdf2926e55b9a2ee215744372e54a42b7aadb4444f5e37ad4b97509a49e439a985fb87111f7370bac03aa51e19aa6fef2d91dc3fdbeb64434862705b4250b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b75913060b8d450665e0c23d781cd9e

    SHA1

    e5a66cb272f3c21eec291187edfba953283d2b30

    SHA256

    06ae65ab75b841f60e7f16f2772caa31da08922d2678064d46cbd65b80b4bc9d

    SHA512

    14d38ac13dca84f9a5ad485d46c713a2205a16dd702ac44ffc35883a68c7c7227c4f071e8a8bfc4334adcf3f4e4f74ad6bfdb58177158f79da1559337f7bca53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f73d02ca0ab8973ff9ae87495c744ca

    SHA1

    dee3d8b412c1e9c104b1ab50cb16be5c08fdbe42

    SHA256

    00a07ca588925feec8c8aaa11dd0e9d82458e7a6e778d51121167cbcacac79e8

    SHA512

    516fd40f41af4ffad37370ead3862e2d788d48d828ba880c5a98012210937b9282f4fecc9a30ccf4964b364a266a9570d937943e2ed149088bc07079880079f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1706ea77d5666213935c28fd2752465e

    SHA1

    480199daa0f6afe00a40eb2235d05e31e42a724c

    SHA256

    e0afdc009ab70e7bddec12a354ed8a8b31f4dbfdbcc0846caca64ef84a53fa5f

    SHA512

    f3094f08b9e6f356e7a860cbea7b4e37a51659e45ebb115e9def4db6ab7df1c268626205ab4d75ba064613b8d71c116e29fca84bccc97205cdd35ffda5463b41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61456da86571e11f20e1ff41328b404f

    SHA1

    209bdd5769ab95d7698b435794b0632307d17a8b

    SHA256

    62acb5a49c947aaf40f74cce4382e5d8c898223820409a3c7057131d1630dc6e

    SHA512

    729ed0d753b2a59877bdae05cd5251090d6d65e1a91deb7cb55f6ca59f1e7a14bd90c861908cd46959047fdf0f4757754b7963e5367b246e332703d134d186fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0fa5cd282cf0b13292e9ea3d9859df95

    SHA1

    b5597a1fb92bbcea94c1da2dee0094d533ba3dfc

    SHA256

    3abd451b2e7e67f30d004decc373465db27d074b68752927fd7f6b5c854951c3

    SHA512

    4216a1d60ab526283f7ab711edd4917774c57c24aaea4dee12f1148b431941bca012062d643fe353a02f3ff9261933e465d6eeba9cce36a4b1e74fa79b2b2f7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62c2a55af504379cf19e51aa5ace5671

    SHA1

    8e09d999fde78376cdaa446327d96c181e157609

    SHA256

    4021f85c7a7c94368b191e325420588a867415b3564e1915db6156bcc8e04783

    SHA512

    5f16a6add2b3d865517dc80ec40c85ca40b4ddc71ff378827dc4933273359c703e9cffd73370b37d3fa3dc8d39e2926b3b41b991fb3bfa8d141ea55ae9405610

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ec8add50578ea6bc74a84fca497dc08

    SHA1

    575479f1cea76aada7155f71d7ede1cc07a08694

    SHA256

    019653d255c7de2e772b89be5baba2811e4e824e3922163a8cfb25c46e8c26aa

    SHA512

    3c94c99b0e30bb08f3a8d9525e78f70beec0a9ff7a902a2f9a4c1075e61bf4814e7c3379cf3529d9708332eaad786eaf557b0312a025ac4a494cbcf62dad5fb8

  • C:\Users\Admin\AppData\Local\Temp\CabED0F.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarEEAD.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf