Analysis

  • max time kernel
    146s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 13:38

General

  • Target

    Payload/Hot Tub.app/Firebase_FirebaseCrashlytics.bundle/PrivacyInfo.xml

  • Size

    1KB

  • MD5

    1fa581c145e442358018443c23c0b2ba

  • SHA1

    8377dcdf2eb7e90242a0f888be97d7cb07a5b810

  • SHA256

    e9bcc6e9c7382bf506cadabe74cfd4ed155686806ba81c195a634b86aa5fcce0

  • SHA512

    8b4a37d121f728a6608dff0582c6c6b28ad8d18fedbc35d0f6c920f59fdb650eaa66e79d51172bc6ea82e18d88bcbfdb60f373a892c3e2eb3504340e65dfc50c

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\Hot Tub.app\Firebase_FirebaseCrashlytics.bundle\PrivacyInfo.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    624e97bed28f962e75815840a3d73813

    SHA1

    621a335a3fb1ef364f12907bb81b45a4c6432ff7

    SHA256

    24d5af43f32595f4cad77930f90b9810659d113fe21802090d802ffeeb81a51d

    SHA512

    f7c4cf9763db475add67d6b48d41ccae878463b37009a31d86b4532f8509c76cca367fbebd9967dc7f4aa4a8ebb05efd05d0b80efb5158d4db709a16afeba95f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1610db50a4a85671f017c946ed43bc75

    SHA1

    1bab5241201e5a1b253797bab74ea911d8dbc43a

    SHA256

    a36e167ab5172a0f1e3a5bd8916cd243378758371b6420aac0c936af757ef387

    SHA512

    e8492ebb4e0cfc8e193ea51ecaace8eff81f4702dd4996029e3b28ec92124d489e8e70081b72b866874ee54e80e83c914a97a2302dde285e15721e8fa8c54816

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87b452be45b759f7ff97f80e32d8908e

    SHA1

    0922ae9c2b1c1679ea0322922725cd3c85d73a64

    SHA256

    f73a920cec8fb9e6cdf27602117f05bc2215e522db39e5a1398ca2eb7f7f1934

    SHA512

    0426ba7f6da1317bad7ed0a13791501fc5f5fd8fe7a0902ba90fc9cb410669ea250c6bbb5d8c96f09f67d54d01831c65cce1426ec2f85ac78b899fcbf5550879

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    feafb5eb824315e70501157463a05314

    SHA1

    1056bff22a0bf09ed240d763bcdea71f3635f10a

    SHA256

    6deef8063f8db05087884f689523e69e6545a375cb8baeaffcbd9aa96b11b4bb

    SHA512

    5e9a97c37e31884ceedc4b89dac529f868c5570c85272bd07ccfbe61fd6bd43ab820a34fc64c605ef5f15831caf1fcb69b757fc594a37a46b2f4ca0dbab919b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2772fbe405d7801898a2f73713c248d

    SHA1

    3e82a3c7a95cd25cf8ef16af77cb147a4272cd45

    SHA256

    837a1fd1f80745bcf48a004ffe8e90c61a235dac2d1c1d39003f9827a85042b0

    SHA512

    1716b1581c8ba24c8dce95f18599c1b7d51a62b2175ee93ae6103acf075881b64838ceecfe2be36ccd6e9efd3070d3e0589cfce167978b0b45e5ac3674d4dfab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6a6b87f64593cc1552317452608e55f

    SHA1

    8db183c1c0fcd88d60ef5a94a4e60ae4143a9d8f

    SHA256

    ed69ac523f9092b7d15d527491752c497d74a9af6398799ee7e6bbcd7575d41c

    SHA512

    ad8071b43d0385d122df4c3cf4b0142ca5851ec4c1899f9919f06a357645b6af61968cf15f8796318c49743a3195c615a30eddca6cf9c539695317e67eac97ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e44576f9cc0cf129e759f0591c8a2fc

    SHA1

    8f1475caffa9e5d861c8d6ea08e5da9195bc376f

    SHA256

    9ac6f1e5bb530272b011378f123d4bf5f6cd799e4840a97f5816aac625baf48d

    SHA512

    2e017e1b458b64726577db17332c7dee272b17e0b1d410b3a05d43ee325c3994cf8d7e2231fa8132e6751cf95555fb11ff7d256eaa199139981ceb5ea84df3c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26ebab6ddd331f8a33074a3ce45c5591

    SHA1

    5b01b6eb3dda6ab392d68d35cec84b1fae52f3f6

    SHA256

    69ac7a39ad22f8c915366cd5dd91ed86b7a49d5fc7adc82187d26e9176db6153

    SHA512

    69932fcb3ee4ec3d4e4b466c52858b1f37e456b72a2be16c5e52e481378e5bc9574ecad9226bfaf7efada138e4f0593e565ac896a18aa6bcf392e90a8f8af435

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c9e22aca03ddb8eb5ef5e863a5fd450

    SHA1

    67a2f36b73373a27b19b8cf1bd3b83c3528c29d0

    SHA256

    2d87a6ddf735f1d53b4fa371d16cf7cbcc06b152666365c0c229efe7f0e506bc

    SHA512

    e3b76aeb98229ce104c6db42cfa20da11611f27f5d728241c660f0c0bfe0ce4332d4faba4b65b9f05a6b0c9421490555fbced22eea58d52f5d47eaecbafe26b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3362d3748a8a7714feeab4921e469e95

    SHA1

    efa7a796c71695b3000d9cbed7733433ccf55e64

    SHA256

    44cc25c902ecf5b8065946f709eb9975149d782601d07319cd3c1e2499693a56

    SHA512

    3a203f71410eba8e25a2881643ace38e52e3f17430e22db7da6ddf15719639cadcf94bfda2b5330b168224b118c302cf95699a0aaba05a5ca5d3f9143f146522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dbc35f4770bd1c55a77db52a3bf9134f

    SHA1

    8911c6d6dd16ebcbb800a0c06ae2e53b65c3fe28

    SHA256

    357077da5b67a78c39a6db37be12f02679003628bd19b2d6b505071d52ffa3a0

    SHA512

    81af3e44fae060de1ddc5dbbba197b31a19fdc9f12b192142e44e8f75cf374ac163ac8650d586b4cecd2787e7fe21498cfe83297e57b2d7b791a4262b730aa62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bde343303905ae1f8c45a3827055b56c

    SHA1

    21f14fe0302f79d4732dfc17233aa288b0df785a

    SHA256

    312e8ef6b84ea4b1cf21dbbd09171ff0538830aecee710af95a6288311cb558c

    SHA512

    1a9b17df06944db64a55b650cc52f7a7e3224335bdc6e1de598ec1e197765c54dd67fb9aa790ff924dd8351be0d27906086bd0c2e4b036052f284a83de329cd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00673496295c2a48e2efa92756ce5ad4

    SHA1

    ffad45cd83802a24f7439fb808ff86f985e3be36

    SHA256

    5758e53ad5ff4727c3540f5a9b720217097e3f10c235b2787554240d42e63e5a

    SHA512

    83841ef103a46aeb51a49826d75105bae5fb247173b0de0255cc5b8edc7ee435225601c57ccbc0bf985e6490486aef562a1c8da40cec1b28f8464fa46ddf2d39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1eeaa1a3cc6787d5fa31d2de21735f8e

    SHA1

    9c3f0936809cc839294801f3d4f929e597cbcd80

    SHA256

    9b3239083a414739c0b79e1870b59349b72d9834ac0d6cd7e0267a9ffc314a83

    SHA512

    052ed5b835efe581dbc51eb54af37ff01e26f3ebf1397de505d8e65981b1e49ac8591d1369f3edb33cdd239f937087510358bdd41205bb01cc47b0c05731f4d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94c1483d1c9c85d5567dccc905c1f5f4

    SHA1

    86b6bc9bb93223806cef72aa7ab6be9d96e58f7a

    SHA256

    25c70bc55596ab8588169062895d325f43995eca81b9ce576ce04782280c0d96

    SHA512

    42d8ab63da699c0afc08b16c20cc4f2d799a9edcd05b247a1c5c3bf26b58b057ae4484c51f642401411dadff3a983054a9cdc7cfbb9c5a8f605774c4851544cb

  • C:\Users\Admin\AppData\Local\Temp\CabC70A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC7FB.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc