Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 13:38

General

  • Target

    Payload/Hot Tub.app/Firebase_FirebaseInstallations.bundle/PrivacyInfo.xml

  • Size

    1KB

  • MD5

    909ec8a142f6427169254ceaadb3ba85

  • SHA1

    59741426bef978c4608959cb1b27fc1abdee2d45

  • SHA256

    cfbb3c4f76a66d53698bae91f7110c00f2148e6e6f13ad7d32592909bc010e51

  • SHA512

    4fccee3177669409985a6822d9eeb36cff23333845396ed33cfbf88f4d862db597ec6a8843d7e82c29816c44c7f0926614e225a9416201b6c2413023b04b8466

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\Hot Tub.app\Firebase_FirebaseInstallations.bundle\PrivacyInfo.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7f8c699acc785ffb38a1ecc603a4145

    SHA1

    d597688eb9ccde51d9cfa398c0a62b502b13bdf1

    SHA256

    02c346a89ed9df9c979c6befffa75fe59e44ef265c000f84030e5f440eb9d0db

    SHA512

    17ba6f0ce9a6c28ef43aade84d14ac5d5095a387427dcdc844f4324c658a6c058865d8c3c3b84d661f6f7a051d4213c4c14df6fcef75e82f0c0afb66468df3a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d04a87a18acd596e8a1683b73dda25f

    SHA1

    d10fc78dea070bb81cedb16c3df39d2e5b7e873a

    SHA256

    1417cef9ff7c4b265179af1a5d3580baf01aacb771793e5c9682c86f69fe7ee5

    SHA512

    44a96386b68f78aa3c8718143ab25eda09fd2de7c22618a91735b87ff351c115fd11a6c131d2023cfd279f94860d90a27d9c76b9261338a1713799694e2e5631

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0d8380d5420ad73a23c49161e6ff0f7

    SHA1

    2e8e77f04085a764307159931b53179e85f7666d

    SHA256

    fc151281ac9ebfc00dc09b8e65d0c589be33acdaac9c1f92047a863d731d8303

    SHA512

    f2acf197e3ed46caa92c4f117dd45e146f1635f0d7ad82d49e4b71eb91f30e1314826df92051c8b55c8597bee94a767a6d4e253210d110f7e51334aee4afdc07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5cf67fb6087ad5f487a59326322d408

    SHA1

    5b6ee176606fc87379d549b6f19807527f6b2c54

    SHA256

    f1875e206876c898258dff3a00001c00dd38f2f25df6c6feee630286b83e4383

    SHA512

    e8a246282adee4ba83168c78bed97da2c7caa0c62915139a0bc10e46071d224f321a30410494010b5cfdc4050272a697b9c1b5fdc344768540d6dad6aae27e7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b9e232dadbeef6386513cc99feda74d

    SHA1

    901f98d907559452e21bac0ca796b306d6385d7c

    SHA256

    1f5be684db3936fca6ecaa10259bf347a1fbfbae47230e14aad3710235f19a57

    SHA512

    d0a8d15f76dd8dba37f7797bd4bb3f8dd9a121b093b632169a8907dd8115f597875e3596ac0d851a4262990ceec3de7d09025a0325e1384040b53d200b986448

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    579f2e62b8c2f14f777a947be0bb7389

    SHA1

    339aca3ce65a7923ecd9d5d8638959eed8051e5e

    SHA256

    85ec626d75581edd9c1e9fda7cca84d7c4e78d322cad7f98377997c7802c6539

    SHA512

    bd9e331f0a714eb1a3d521c058d87977df04941bbaf6459f2a1c75f21e1a499ce41449f0a827258e0ac217020d88e7ef764f9a827566075b1f3b8162f87f9308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc300b4fdf978b6b204fb6a164a8d794

    SHA1

    4189946a29ff509b4bdfe5275fcb7ea0c72670a3

    SHA256

    467a331b45ebc06e4e825338c61f0895537bb9dbcbec032320482d1b1964bef8

    SHA512

    aac63a78c1f6e73eff1e2706d5c7086701b9334f137c0b73b0f7503bd03ad31c3bd3707238f0f553301d5c13f0c4b3a9b69b98e732eb0ea8c860f9c177db20cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3096d2815c3f1aa7911b2bf24145bc24

    SHA1

    8c520319e74e429d263ecc31246124c84e5e2caf

    SHA256

    05b351f71e6a9de9c4dab6cdb33f686822a144a95567d6002c9805723d395b8a

    SHA512

    8483a168ed0646166e45a4034e605446245e3580bd5c2aa23ecb261886e20f59ca2b15d390293f07e2e25cf5ccb9229b964295041a4f2a53a001e9c313ce0aab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1cb619004b6175f52d78cca76135bc57

    SHA1

    1edaa58def0450ebf0a3fad4ce7794d4b38edf34

    SHA256

    aaac8f231d2c593ed0fb6299461bac5774920ff11dc1b2f4388d7ee49d077009

    SHA512

    4c2cdb8c9667bd7c02b127d6ac955fa6836da9fd98ae42bbf2c93c60581a3df32b526e0db3dfd8d6e135b92acdb8c1785b694df03fbc4a6fcf89ff0d8f8df54d

  • C:\Users\Admin\AppData\Local\Temp\CabCB0E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD0B1.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc