Analysis

  • max time kernel
    139s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:05

General

  • Target

    callout_dest_bubble.xml

  • Size

    1KB

  • MD5

    5a1b792bf859e656807fb87228b66416

  • SHA1

    21612430725df233bd8bd7e10ae17a33a7923429

  • SHA256

    07c9841559f933977b9448e4ed5e18e3000666faa8768526136bccebefe8b104

  • SHA512

    e908a8dd836b51193f62b60eda3a5371cb9f2548e0b792e90fe624e012c7d64c20c987ead14f591a1e59b7786eec31221f56148447ba8deb53082c7594462b25

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_dest_bubble.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    127db091661527c6b2026af23148b68f

    SHA1

    7aa95d067d40f8fc2a3745f64f0a7332b0b6567c

    SHA256

    456f53e638c692fac85b453be53c5b52f4b017cc45bf5f39e59ba81b51d2b5c2

    SHA512

    1533480b9c42b54f5d39762ed8333bd0c6aca9c70fb6384e9b30fb1e42c150c8f93cb2f1d59ee4a2a95beb2c3783045c9dbfbefd2e02a6c2739418423f55702c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ba52d30bc70240d94f766cbe59eec50

    SHA1

    26bb0684f1c33cb0b62a9b0fca2771de9709cd65

    SHA256

    2968a52879c13687357fef19b6d1f26ed56fd109d4c91a128fca9d83a6d15393

    SHA512

    f43b9796e31abb355df9a67c808c83af4dafb5ed914ee41295e2e70306e88a03dad9c2eb4c53e94424ab890d7f00be94926d6a83c7c7c9be6844cfbe710003a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    968124758777b2ac9fa1c1e8d21cb3a0

    SHA1

    ec32385fe391aaaff7795106b8b36a00676a5bc2

    SHA256

    92eca8d5eda83ffab781cb22f6b826b5b977c846fc4e47f342aaac2288947433

    SHA512

    3ca99af8910100df190b9805a1f428bcbd9ef75a519493f667f2554699cf2475f12be4c3217848ebb2d085ac00b66a632b413b0646f9c61df63af1d12e562e1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e19e9806e750199e94460b8803e39b3

    SHA1

    1e82b47ed9f96c774aca1777ffdcb25b48d44c45

    SHA256

    e012c9e5c608ab9659947ebfc30612e157f9142d21923672572cef35e16e5c9a

    SHA512

    281ab23a46d0ca38eccfdd541ce0dc117fab03c668afa7a15e73bb498c51a53ee56e83934c279ff893b9353039b91ac1bc0b0bb4ed027101fb5a33db9fedff5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de71690ffa48b92b6a6f2bdd95d7e92f

    SHA1

    3a9c8b940b68aa3cc291d0fe7e0d18e26702ba77

    SHA256

    beb1f76f70120d1f1e3ec954814c729f83f4dc5c9c8df68f847b9c7b0e506caf

    SHA512

    5bd7310096648ca3c2c04f066a473c90bd8ce38df183410cea75dcb91f212913b3ca9f57323c826c64006a38b7edba3ca938f4cdd357739280283d555afb31e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    372eec8035be7ae616764e61935dcc30

    SHA1

    0a6ebbc25816dbd564458343e2a21a9f5f118c47

    SHA256

    e2a298383bc331ac2528bb5e3732b2a974522853236d0dbe76140e751ed1d64c

    SHA512

    d0cf81f8c2e264dbebadab9f63adb3eb03ea978b3ef998e95a40127afeef159aa07cd975dff666c662cc6e3a0a940a57c2dee5987a844e6a069f829686ce33cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa3620820ac55f83fd5602bed7a39fa0

    SHA1

    84f94d6218c2a9c7c6f0e7c04c6640f5e4672a9f

    SHA256

    036470e3386fda22b3f05c5b9e63d1527ee93b3c882ba2f2af4c1aea38aab659

    SHA512

    fea9e954b8745b91a30b7569002581d5f85eab96dfd37ef62a3e163f2651796c41b942a848cbc239a6dcaa6df145e123a645e8dd4ff14a2787bf43ecf4e22685

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8e0c9dad0c4c790d2c8ce4bf5d7d4b68

    SHA1

    ef28f4c462908882b983ed29d610d0f2f647e628

    SHA256

    eff23bdd2c5d09406d66b2207e115a62aa534dcbc1898c4252d6aa0bba521d61

    SHA512

    706310f441f878ad25437265d26b7cae4157ddef55ff24d088b6f3637712ee9c5e11709ad53f9dfcd1bdccb2487d16c716c3f0580ed444517f8fde77756266dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c063c887d123eb882b38d2a511ee2837

    SHA1

    9fc85080526ea3f50dc57cd2f231c179f38fb18c

    SHA256

    610b936c893de7c74cc7fe6e02bcff39053029b7c18c69acba6674ee302d70cf

    SHA512

    fb789a1a6e04512466e6f68b63e45a8b4cd121761fc3e831bd30419c5766b3793fd08c9632355588f8bdc6b0092fd0f6a1dc7d1dc5678c4bdc43e79e01467c08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48e8ae7f170b2db6526f0420d782a31e

    SHA1

    ddd39a22ba815a761dcb29e39b133b6d3c50571e

    SHA256

    ca306f9540b1dc8995d546c2a1bc666ccd4fa21ab57de220872c2a89e177b915

    SHA512

    ace0350c06e1a7ed3331c78751d0082a596e3e3ab9ffb9f667c3b0487b65b6fef9989c49f950a97e8e6f0d7f44b0e6c333ca5decc2cf1ee355898512fd645683

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67d14ac9fcf489f7c9921ca891691bbe

    SHA1

    1ba92610f2f68012cb0adf5c7277f5f3fc9b7650

    SHA256

    ecef6564ff929a1d17e7af15d5c57a4c2eb03c7139f0b2e64ca1d928fbaa41d6

    SHA512

    4d52f5823338e3f34b50c0b4ba2dab1112fb58945015d2675cb90cc23a91a8df3fa0766ebe90b2847668dc5dec867fefca7c4c2be4f4abe3ea91c3229c018239

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6aa5b25b9961b7e13469ba466983699f

    SHA1

    620e3b2015d1218ee08b23b2b7f2594f22716dd1

    SHA256

    5a4fdcbb0cde5059673d522ade6694bb3c8b445731e992e2c2723b72a02a4059

    SHA512

    617ae0ac0a993ebf9ad1706410d4a19fcd9791fb04d0b1c2aaa1ee7bac92f5c895aaeedf7ca751450f98fca4792b0e5a0492b353a39ab39915ef5f37e4cd6bc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32922a3d51e9708ce8f93f5598be5f3e

    SHA1

    29e11f10fc439850b3235ff2ee8f9dc2b928f783

    SHA256

    d789a67bbbddea309ca58350fc2de98fd4dd4626eb06fe71cc035cce1d4ad15a

    SHA512

    f6c3c301aadfdd55ffed26f0e6a64044b32d1c33d07638e842f776e2d8c04f93bc4c3973ef91d738ab4db776ca7461dfefcb679b190d0f75aaa0926522b6cb8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c662e8e7a91ba9fc528f8a4ad9263995

    SHA1

    340b9379b9cc5790723408c1f8a9488091479f93

    SHA256

    7c9740b0e17634f454c6588f7541a83ddb3806fa2f4e1b3404133e71d0ecc8a2

    SHA512

    ae353c2136d2c553f5525679932c732b302162bd0a4e43fbf53c7e3ffffcb6b1c3354a29bb6393c0f719ef352022da8ff29a0e1a2330e2bc1b5121f4ac61e10e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    528c0800f2a2ef2627d98e988efadcb5

    SHA1

    88531d4c94b7e906a2ec1f7ad9fba98f636e3f69

    SHA256

    858cdd683c65489969fb5c881ab10a43c998c666a53fdf98aa290657135adb90

    SHA512

    a83dec43d7c0880040c17994178493668ce1e47b7b67751c5786ecf099d1a957395d5b35023c600532e40d4ae30fad187042eab97a6e80eabe4913e28f1123e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6999995d4a76f5d4b361bb6f0098594e

    SHA1

    e9629b347f1d060b22a4310d595821c73486803e

    SHA256

    f1918e04a059fd7fb194078f4035f0850798ca45edbd083c47b0877c05c2de16

    SHA512

    e16447a92b1a63ba361288df4febe29d1653a995a976d968f1168cc51edd8b052f3c9b82a870f11d3989a9c87bbbbbe4434d18a2ce5e1b41f68c020605d82ddd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bdc0d50d53a419a55685eb8d310235c5

    SHA1

    c14baf8bd7bfaaa1891b2dafc9638d545ef86f85

    SHA256

    1293a289e6f58a8c74676a707fd69fc67c1cb1a7a84ffaebdf9743e0ce5e0c47

    SHA512

    c908d88e072f8edbb44aa5c6cd7a68bf3eaad271de112252a5f181ce805b5816992ad07d428ea89523a1e054cd38fdd5e53df5b068467690c1ddc26aafaad490

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    980e41c6a9e0e90e32f95db491febfb7

    SHA1

    5a699d22436df984057caefc13e2044a4719a4e8

    SHA256

    7f264fb06e41826aa5b41c3b40d42f8bd08b2911486f6f7f32a86812f47e67f7

    SHA512

    9def43b93c27b9468361b045b33937f11a9efbeb05c5f525ecc1811a7eae0e2b3242fcd61945291c6f26494b7df5eaa761fbe7c8ae66d3c3bf1b087e66feff1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f80a469075f0bee80dc7c5d8ee5eac94

    SHA1

    c8df448ea4deaf101ab1a3d83efed09a326a8916

    SHA256

    87285539f84b3770fbbbb69f5f84b120aab5aced05f0597189d7a7584b051684

    SHA512

    29817aa98a365403a400fbf35eda2ce5f614f5588546a8b1fc32c9aa9f2c21b5ac30f142d4b58f84cae1c58b0b1966390b58914d1705cf5fc2f95928d030f5cb

  • C:\Users\Admin\AppData\Local\Temp\Cab9FEA.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\CabA26C.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA2A0.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf