Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:05

General

  • Target

    callout.xml

  • Size

    557B

  • MD5

    e754f3032bf46c6d8d97140622f7cd43

  • SHA1

    c3b07417ea1eb6101ced7ffe4fd1b52822863a6d

  • SHA256

    6a05056f555e8ede6117732f3fa4ba5b538b0bd81fbfa2e665f7109a535e78f5

  • SHA512

    8beeec4db830502e0963276512e50513ac3d47da758e3e4b9567736ce3ef3552ee84c81ecc5657822c70adc921181e95ef1e8ba909c9dfd4828ef41fd2972e8f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:312
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e3bc88c997d9ff6035b0f3fc522f714

    SHA1

    7f0240c76de00c36d699c917c77915d250866fe4

    SHA256

    5fb252d38bcfcf7750add522b8724253f13c2541f889a5529ca5af01d3c0a668

    SHA512

    99623d3f01625766c2404f4965de18ca0921a4eed7524a0440f0429bcd4346b56b31d7c524065931de7bf35203a49b4665fe5745bda5b25bb099cd956dbdb05b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    169420fc2c2f65878c4dfced811a1689

    SHA1

    3c059c7838664328e767d3284edf14c12e1f6b2d

    SHA256

    5f51f9f9527801bb69911704896888e55b9b401276908bcdc987718197fa808e

    SHA512

    c0acaf1ff11ed73df2a989fc1a74313c3cc4b5cebb3e17c6fbc3a9a947738a1a36ff95b03880542d401bd9bd6149873d975e0f4f5fe20e9b7804dce7536430de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    630ddf6d6c3ea96802301cd36536fcff

    SHA1

    e85babca862736e03dbd630e7a4ea84f45079eeb

    SHA256

    145fa747126eb1dec15506b3d4cbf010a89e3dc688c558cffb4edf857357e52d

    SHA512

    484ce65d5372f39acd071d85b99abe61cffbca601999f46b843fdbd8836eab0c8348955db05812bd5595a5d495e221ac52ab7ff4a531ea5817f4e58092d32435

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e393fd3d772cf26206d966f3eb7f5fcf

    SHA1

    39385055e09f67f9dae7cdd2fcc004fae3849e1e

    SHA256

    1988a52517b7ef22757c0328cedee89b581efec0c2c4388ec8f8b4c5f5f4b0de

    SHA512

    0692cc17ba4326fed69fabf89f10623a8cf0bcc966243d2f7311847e79e25e51b7cc512eb903c3858389dc2d3193fe70ff8306a0d7854b359b7b27e52fdf6b29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7492a377da9182bb154fea8c8dfe9f6

    SHA1

    30e80ca4ea3fdbfef244f76961338f0eefe842c3

    SHA256

    f7bc251ea407d5c1fea96ad5f55add59af9ea633987b337624df2fe0e5b9b503

    SHA512

    a613e6f573b9290df68200c9457913002131c13f9447340ca2365ff14dec39b1fe16e3f7d20abce91e07751c4d4a051860185180cdf168ad4e14573ebfc80df3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0e8d63f723e63642b32c8da84ea4e47

    SHA1

    cc07fc6fd3b5c906e02e573b6d3e103ca0d48912

    SHA256

    ac7593ead9b300a13dcf4b2661639b0066322db86033dca15a72bb158849594a

    SHA512

    e0f22d632ad0889810c3cfe4cd8dbb02902d6a84add0a752ee4ff1e4b962627d71c1706f90cbab03cbe8131ff5b6fb5b75880ed62f96a14ad66c32dbbde7031c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aad6e4c9bdd1300a38881b28c3fe40de

    SHA1

    e89478362e3747fdbdd822124ecec9af0fd171e0

    SHA256

    865f83ba67a5a9e0dcee41536d8e033a7e542f82e9e3ed0dc8483b93061cdb32

    SHA512

    bc8bd7489e8524861cce3a8d2877f3309f7353762ec6d4b764e5851fd2816dbe575cad126c833352e1760a1f8f73cb647ff1f33c18a7ad56b96295dee2a02ff4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a186714ec39efc1bdfabe74b795e62e7

    SHA1

    5f5fb24ac8ed079923b7a1f4c1549991804ff5f7

    SHA256

    05954a9d704668e663fc39bd42df1541264062a096d53c1cbb167d36d84ae2c7

    SHA512

    8b6be4e00797fd633853addcd2c9f3470bfe57c1687a58f97107704ff026865567446c1128f20a6ea5baad7b6269dff000739da93809c97f0d19b167951dc52b

  • C:\Users\Admin\AppData\Local\Temp\Tar9989.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf