Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:05

General

  • Target

    callout_shape_2.xml

  • Size

    4KB

  • MD5

    6dc1e0aa43dd2a582b24b6487605fb76

  • SHA1

    c403b4c464908b8d740d03775742fdc72a6e8327

  • SHA256

    f6ec4c71c9e3ebfc1d23691364cc5736a12c3180ad35e55f4f9dc0fa3ce03669

  • SHA512

    3cced4fb52552f26f35eac6eacf8fc408b6f5e251984f486e203777b0889261db83ea127a97b5e53c246456c819b23b6d6209fec1bb3a6df5f173e66de370ce2

  • SSDEEP

    96:7OKfvMkrs4v9rTicBaUTnpI5kS0nvVfiYPl9Cb7dMM/SAWicJPjiBwlH:SoT44Vp3hrnvVqY99CR/SAWicgwN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_shape_2.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ea6f987873ea9e58c0dfab69e1e7499

    SHA1

    1ffb6fad90147ad13415eb682c792c19f9e1f640

    SHA256

    e0376ce9ae47a2100721ad58330b2e0c0e45577e6d1c4de31f37b44bd0a8ab52

    SHA512

    b2c23c4cb8f9a91ba0d826bdf636ec3c024d9d4325e81089b70c4fda4afd8447c38c720d104cfe776d4a96e2ecbda54922905e8d79135e288ae1c924a1541a58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    759cc77701ff80c6361dc2958d392187

    SHA1

    a533a129120dd8afcba849f7ff5a54797c3456e9

    SHA256

    6add47c8a6f9e7338d7294c3d77f392a0182d149ad615272313254345fe6e990

    SHA512

    cd91679a2e01248fdbf65b3caa252bd9dbd2fca472670dc76c83ff95908535cbe131cfba7af8c48555df63e2cdecbfe26fe3ff46c7e8039c24de8a10f1ee8841

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a5d0fd38cca4ff2ebfba9e80769eabe

    SHA1

    5a76e780cd1b1c3eb0a084ce343a15f9966f9337

    SHA256

    05e70bb0bc9111f0a3b005ade2a7dccefe5566313f68f95f03a609ba7f6443dc

    SHA512

    023b7f6d919f923cdf817420d6f76fe72472be092ac5e81871db16726db96091d6aa3705114cac47e55685aaae843968c539b78de7bf0c98ce24a22974946bc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    759f9cecde615c7e0379b604a6822b85

    SHA1

    2ae21b55855daee1c4292dc214b7ba58a44d9fe1

    SHA256

    70e371d7d994b4b6cc4a8e46704c95e15b10b8a58567540ab6046da3b46cdb47

    SHA512

    5686aabd4ffbe8a60bc3eb2e22815f5871840901c1dae23a785751935d984ae53f92dd843481e38f72fcfb0df392bbbe05807f967aa72564043d2b68a8436e63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d205fc0e1f9bbada38c46899f3bd799

    SHA1

    93e0b9e3aaa9138270bfa67d991e979b8dd6822e

    SHA256

    4694cb9a7a77587d1d8074be7e88a6941766e075d3bde49bc85ca8b888cd773b

    SHA512

    9963a302a73998a90b03af1572738bb4a34cd1b90ade2f89aec2faf0f25bdc05d51654a2a1a7d7be371d8e06fbe51da27190fa6a37db2c4b28d56d5e2fb63082

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    03312159309661515a336b24c69ee061

    SHA1

    162c8a189dedd2f2dd5a66997a078bb8c6b1d38f

    SHA256

    1fb577782e0a4efc19fa3ec62f31c909bed7fbf6090f62974fdd8b75190a351f

    SHA512

    08399d7687915dcbb25a97afb4038ce81b7ca8124baa3092de05a93fc1abbcbd9ad4ceee8fe8a90529c35202d2433009a992f750d8120b13ebdd007b2bd2a475

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06d188e04025d9efcd327c768e92b0c8

    SHA1

    1b024cc76cd7a4ee68cf3ea574be5f96dbc0ea99

    SHA256

    30e5f0c533557f8ab5feb5333781d0e92b70b304d06d96d32f90a4980bf2d97f

    SHA512

    f7a25947d7c65cb2ac2ac8a81c42c1f596135b8f7ee5e27d426217098f2dac48719ff48feb837af59c1b89e0db97d0477625dcb34b6584197e00f6b75da30d14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e4424c7e5198a9c5b41996a74839228

    SHA1

    918653b70de595f6c6174ad16279456b3c63a840

    SHA256

    c9a9fafb01cf05d5a08909c99e94ffbbaae2f7215f9d80e15a9a78e966e3367f

    SHA512

    c980e49b1f466dde30a9420476d5c2b7027d2b175eb65f0c49dd8a6d5b08636e8e1d2b534e82b8122072c29b65a292bedc524ea1718dd7a067411c0d2db58306

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54784fd70f3d278ea5fe2d5116aefd2e

    SHA1

    0a4283bcd811d632bef479027b146cf3416e50a0

    SHA256

    1546968dd4bddcb21ad3f4d42807d95524dd2c9976718da1c2adc07b74fac266

    SHA512

    e1034ef1745cca4184181d9fb9707a26e83dd74d2134d7bb6ae311746b77d9165c732d4d88266c2e253a4df1a80b9f893997f19e11cc130c9c8df87a65ed940e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1885d7fac33f07162f206fec461b540e

    SHA1

    6fa33a941c77b386b9fb8a8c0810fd546dba15c8

    SHA256

    6ba25a81f6adae82b399e063480e0d7fc0d27ba2d0f8755d3b2c8c85380e32d3

    SHA512

    e1a3640bb66e8bbbde5f02c100a9dc0da3f3fdd425cf04e8ba90d9c7a41e958bafd57cf11a485c39705c2c481dfdf124635e0e8f0a160a4be1e0d608ca735cef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7eda58aa171e81548fdfbc71579ec891

    SHA1

    7c4ac802451ed81834892bdff634f852f2bef77c

    SHA256

    ac17fc226797ca9f7f093c0126d6853545c7d286fceee50ce5f385d7fc02135d

    SHA512

    b2434e96403c5cd57db275fa8cfadba95ee10e5ee6c92983eff7dcb11909b7f0041e03cc9e38024431b25c709b6b94975d62e135f095943f919505f89bea9ac4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24ff845e0ae60ab63ced7b0b0a681b5c

    SHA1

    53886a8a10786817538665548d58f0e74760cca7

    SHA256

    d1865bdff400e18213ff70e243fddac6af550792a1b175402d21066aa7bf9967

    SHA512

    8b4427c9fc07629fb6db2cb1a86f0ed12b877ed4c8cd25b6879b26fc613c821705cbfe52e0b7b4280acea4b17d46e28e9059e4a594057c8b50b2657a1764f733

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a75ebd0b25ea2476ce5fd66557035fc0

    SHA1

    5cd6f3d4ddb622505e8aedafbb9ab07a3eb9f0a1

    SHA256

    67f7851bf2b45343a8238265afe93038f02a685cdb6501b6b0ea1f3a890d5928

    SHA512

    d207537fbade5c1432025a6b3430c59547e172ba62f292079b625e39e7f56821c267134d26ced47ce891a48fc38aaec78dcfadef3b0637d139d7709fe1ee8057

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5870d3079f0fd9810efc0522aa2ad862

    SHA1

    124e1004d2dc31b7941b63fcd65d23eb4774f0a2

    SHA256

    1bc0c2d45a907045178d3a5dfe5318006ddcafbc3a774c021b75e40b4559326f

    SHA512

    1ac6a96f1aa770aaec989cfe07bd3eff29f608af8240361db480b0872f842039c991c08ec6f1874901427252527f62700f47051659801748da5327facfa093dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9ac861b7a9d1c124897d0773e60abc3

    SHA1

    3f92aa56a6d3d7a407a2fd1b57b20adad37f3fde

    SHA256

    c82ca8b078209b49ca86f609538d2265a3e373382e319d1eec3d2ff6371e01e5

    SHA512

    72525c06aa1092005d8259815b330cc2cc452a69be46f9dfb64f614129b3cb8e74e0bd2cbd3addfa0bb61d04af4590ab5d2784bfd61350526bbfa13eec3af2c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c32ea241e722e6cc1beed22635bc8c3

    SHA1

    8b31681c486477e27508d958c1997970cac7e80d

    SHA256

    bf5ca2761896fa2436e0dc5798c28f9ccdeb9aa1d7797f550857eabb56f84a30

    SHA512

    c107171d2aae7d91fc33956eaa2b4c653a48430cab1f6cd0e2ebe9c6d0e94f72264eeee4e9f5f99c208c7cee52440badfc9e98eb8c58cc0233be9ec899f56c16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6916da5aec54b3d7604e7af6639f1874

    SHA1

    59f4c00f5778cb58c61bdcfba0788cb148eb8a5b

    SHA256

    587b8b53b3d2d96187e355e3e41e4317437b202e51cd65e4176796c0c5f434f4

    SHA512

    e31eeebda093821316de914ee35f9b9595869f1a788d07789491d9512befae212db475d015d288f87b2d9e7a5d78c0c1757bef09bba4e235e0e007fe527f058e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d57d6f4362d2d085eeac36f5bf5f361

    SHA1

    ed574e7fddbb705f819970f17a9bc28b2c83d96b

    SHA256

    c3060c5824be5dff1619a32ea424a4168b873740e39994eded1ab5a926028e58

    SHA512

    216e469bcc7ab0f3ce2fc245e68ae98e10fa8dc2bd7b5ba2bf0f8588f0e02ed8f1f816284a0fee0ed4d68866d21e06f679a4ca53ca77cc986c49da9abb11b403

  • C:\Users\Admin\AppData\Local\Temp\Cab531.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar661.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf