Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:05

General

  • Target

    callout_11_shadow.xml

  • Size

    2KB

  • MD5

    a43eaf2037b2a882b41912e5bf68e3f4

  • SHA1

    b1b73e482269c1c5370f7a6e4ab5a3b47d2c6373

  • SHA256

    354cbc8433a0fb42c500fa7039f4c7254db20eb9f589f8866846f142c45d94c2

  • SHA512

    5aa4640b5cc83376ae6f61c80bfe6e1aedd2e6eec2337f9478f4a5544cba6b1a09fd46cb4c93a8313d4843a7c42b498f610bf51ca90d476819088e8fd52b2c69

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_11_shadow.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa0488afe12b61ecf0f2b83cceefb54d

    SHA1

    61696cf9d907fedf8e3470f42221fc04ff257e62

    SHA256

    57591d524b5fa4d2e4ad3c04a34e2903eb5842244c49d6d0915a766d863615a8

    SHA512

    69c7b4a844a4f33cfdfba160afd0b9300dea048e5d8bc5285b8b975189755ae5930adec6cb28e25213ba156ce3bc0a350df97fb78da1ba6c3c8166b7d3c728d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    456fcbd4985059ec95fed7e973303360

    SHA1

    ccd2ec320786376cbb131b7ad5688db459aa58db

    SHA256

    9ac6734796735138b7cdc6733bd7a0424719041b60b85c89bea53c5d24c4741e

    SHA512

    55cba088e01fd526e3092af1b8afbb98e6fbc14b375db6b508baade0b469789ebb86c3d6516ecdf1f59aa6dcf5396c96984f66b98f37207dcd751975f8d5a684

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a64bed9211e88cf1a588d057b6b51045

    SHA1

    c4d4e7cd9f54d4ab6da79a423f95099dcda664e7

    SHA256

    c3143305c1cd95dcd311b6984778f3ffb94a645c24bb56001ee6b94a56431a1c

    SHA512

    938773be6ebd54b6d3b9dcf422749739b1dd3c665e5c63945859899e0a35b0e289ae847719d82140731f4e1756a0f95470a5c69860110cf31bebbeeade3d01be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6110d9ed34eba6afb2de07e00dc712f3

    SHA1

    1b70935399a1cc57439ab7fa1112b1fcb237da24

    SHA256

    8e8cf401071b635fe6858e414afdc64135a46bdf5e83ed82efb09a89e5108ca1

    SHA512

    acb9f04bf2b6628229d59143f087036667ef9d8f6d62a7541fa131223cddf6d59a7b41f82d58852f4cd07eb2e51b4b36649a094faacd8d75cd09381804fd7a31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b23b4468f74d728d1201b9a2b26af606

    SHA1

    e4ab05fed55289dfe84154e7a66c1651ffa28204

    SHA256

    8741ac634fe069baaf19888c793a7a1555722e36c1c57606ba595812941ace89

    SHA512

    89074965c4565b5c8ae48c55a0855b792a3edb87ab9b67fde9cf9cc114e386bb9d2da36b4b3c87c6cb29a34de399e1398e272c258d353b81999c22ee51d80e31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    462102505ff2c3760d1f977433f166b5

    SHA1

    9174ed6d916d41cbc5560beb9f28664210f4a70b

    SHA256

    fcdce2967474965b2c33463f487ed1083ddcb269315388da18cc3aabf140ae78

    SHA512

    88c76583a8f4949c831a1058ac5e8df957ca7b94f5532e5f28c6188160976a363b54fa779f114cffcc0f3c1a9dcc56a30cce3b6d5e1e40855cf852313eda3647

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dba7ea19208ec8231f1efd9eb048c282

    SHA1

    21a5ec25b36ea33bbd8304163c122d4bc1ba0ca5

    SHA256

    81f9bf4de28d5a1245ee36d66d1d37e1a4d0abf58c50f5f6100e21ee5d0dedd0

    SHA512

    2e7753283ca330089c669d42454f94778ff3732f8b8ae960e024f5e451d6eec558dd7dd3c85330dcd00ea4bcee68a6016a162e7df451055d2672d9c4acb6339e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd1a8bd1dca4809db4214fdcce6d84ab

    SHA1

    531c3d62b2d8b8c10e645d17dd7b8af46d7082c7

    SHA256

    960f2da097e740790e862814bae38255698205a11979de9c27b05ff82f404c7d

    SHA512

    e3c7c83886cc9c01546d810be5092aaae6dd3d7e3cf3821f80b9b97a1185fea217c037c9133573663233611114767d4c1ce2b03ba553c647d50309fdb99ed8fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e9600f190f450e7bde61beeecbe3590

    SHA1

    06eedbf64c12ce28ca86334b015860656a730edf

    SHA256

    98cd9df215e0b1d72589cbeee843e87b6dc1604df0919219399876d5b3ef8c86

    SHA512

    153dc61a7d8aa43d325a7f2d74378338a048564084d58aeb7a6255eda754357e885921c3385e830a2010f51052a2337d4525720732dd65cc5f5faac1cd87161c

  • C:\Users\Admin\AppData\Local\Temp\Cab80D6.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Cab82FA.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar834D.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf