Analysis

  • max time kernel
    141s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 13:38

General

  • Target

    Payload/Hot Tub.app/Frameworks/FirebaseAnalytics.framework/Info.xml

  • Size

    1KB

  • MD5

    c0e37bf9b1f98f7e19122ac3496fb5a8

  • SHA1

    cbc2e0d83f38dc040841582e3c9b1dc985e23089

  • SHA256

    5f5ce89bfaf647206d7f4dda9c4221c2aed170875e10f4d505b0acb99867e6d2

  • SHA512

    432d155c60ce3f68b6c69ec89508dd00ffb3fd3a12bf8f65c9c57d26cdae74c3615df678e98bf35a75598e2614585a1609e832ff15fd4db8adc15621250853c6

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\Hot Tub.app\Frameworks\FirebaseAnalytics.framework\Info.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01838c78d77c58d383f972849178e825

    SHA1

    d84f699f720f1013794666812545610e67f5fd38

    SHA256

    9c58ab58c3ec758c016c7e3956c281ecb27648033f19bcd81a17cc5af49d1007

    SHA512

    dc68640fd5e4ba158b1c3778cd9189653e089b8d9b21d3e123b6eb35c6f233c66f5a1cb5eb64c91e5d8624d7653ff39dcef0bb788cc7dabd1007b9875792f090

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e23cbf3084faf2578ad5a1cacab5cbd6

    SHA1

    8448a8d3b583a367d38fd234e7b636671e0eaff9

    SHA256

    4e66fbadf3bf7c22fb24ec753a0f4c7910160b7fadbe78d2964177bc2b4a6e98

    SHA512

    43f4cd0c90f2cee8ff77b671be3883af971a1fa6f4f23ba5d73461242d69d2621d165593b1bfc9f42a4da239c0348750bef82ea90256c17414dd91b1a11cc22b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4fc7c706cd1a77c92c6ba324eda8373

    SHA1

    d8941efa0c950c528e2a331f704e03c080723665

    SHA256

    cae564903e57213e8e760f5fc8846703496bb4ac1d4a2b06382de3e62cf4d94e

    SHA512

    5df0fc36e9725d2eaf55b1399d0afd471cb945db84563d65fa60ede28703d38cb67c425b7578d9701395c24c59b65311e694e1b28e002de4054124f12a227353

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    41998578a2db997767e94793cf49f354

    SHA1

    af37a59e48718ef4ff492428ff1541e529752be0

    SHA256

    847f20f87c176bad2c53422311e7e31a9a7119858929c07bb826fe3943b7e8b0

    SHA512

    22c6af1ec18bc38b86afb9213a936f59a0681a7d325543a84429936e67c7e63fb6a789c4f2c6e75a7a15ffdc73d56b6a879514bb0254af3a7adf21f85e0451d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72a6a58fa14335fd2be7f49522901870

    SHA1

    fe595a819bf0c6aad9637a65120a986e39921adb

    SHA256

    6b9e2982f420adb3ed1ff579d6ee01cb083792a07a268cf6650d621a51125165

    SHA512

    7acf1fab1a53e40482d942ce23ff2b3948da4743935d0ed1a7d847eed9671d32a4b80568c45dab8dead5a264ddfa2a49ca76c76bdb792e9d2b72dbffe2939e5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0bd114b945b3cfba656bc5ae8df70222

    SHA1

    4f32d15b559dafe50e5622dcff2ecad41a585079

    SHA256

    63372c876325acbaa4e3a87f4d08071d5d56f4afb25c5b825aa7a537100fe7ab

    SHA512

    93e620022e9879db8ab67134de86052be9e419fa201d57eb5af055acd35fdb3b43794b268246ff0f90cfa71e4658cb6be7c07241e893b8d7d2431defaa9a6cc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1145e116ee87a02b97e15d2fe6e560d3

    SHA1

    6abbe1b98aa15ed1ada47cef48fa3c759932a247

    SHA256

    43518c983108a230e6657a02454867ea4d4d5df7fcfa7f0d7c47940ae0382537

    SHA512

    33c5fcc258a6756be272f14b8aa87ac0a5561745f4a35f00bc574eac98b4a4042ccbba619b78490b1ec8f782bd116d04e146e79f2be823ce83781d0497ff83cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b697cbb8e92c1701d39c0642ef45933e

    SHA1

    2272d1940d11da9da33ace36dae05222af3dbf48

    SHA256

    69b22cbe998f51cd2b1ce00143e538d74268b7e9c22f82e068cafd07479c8088

    SHA512

    635cf1ae25ef519379094221cda84b1560ed87cf7226cdad96730b97c02a25a56b97649a0a4dd705a9581398bdcdfed6154d36545c69be7f7a2f6a119eb80787

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86b8af6ed113854025e4330c287b9458

    SHA1

    d544cc3fe866bd22a937d744348bdaa2992ffb34

    SHA256

    4b6c187787bd2c2f4f84e08fdf3f63f6815b872d03a58e11058ce0e0e63f9c9e

    SHA512

    7855d704eb1abd236602e95a29f07d3e3a590a6deed9fd26756e49ef0ccdaaf93e8c2adc73142fa2f319a777a4c485ad7086e477f4c13b20227e04617711265f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62b401a5079482bf9b76f411d43963ca

    SHA1

    c9e07cc6df0f4397df317b64160b78b2ad8e17ec

    SHA256

    2903da0d0c367887b0904aca9a190e1543d3d36c43ad080511a86bc87b86023c

    SHA512

    d389de64bc8a7068431d90cc4e10f669b118de6f137bfa98603a91b0bcee62af36f22def6da532fccf7929b8410506ccff4e0002e3399d5eeee495ad1fc30f55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1246c32dcbc6a514ef7962347b6b10d3

    SHA1

    f4c76df06466ccf809c38c735d84365ff1f42503

    SHA256

    eea8049a668cf5d936d23fbf7ea9899c34ddc1c6a56cfec99751986da832f46a

    SHA512

    c7af6f0828dfed5b1ede621a3bcfec23cbce1d699a77aac41ef3fbe77ffacef9f39efd9b830701621d9c8afd0adfd63ed9b0d1953b20de814c7c1116e2a84fec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c21c4c0331681a5f31a8cea0b84cc422

    SHA1

    edf421114004b576eb924ada34bdc1da8e9516b6

    SHA256

    876e494466c18fe2855453f5a1b6c7aa8896121ace8b66fb89f5f82b10c0e6f2

    SHA512

    6a8bdb6dc3d2cad1775fdfd596a8293e3184fad1ee270757c4a1a245a2d2d72be65b5d0639811e528aad7d25b0756dec8123523efd5ebd2723aeabe3fc282d4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81b2bc239babee3df23fc9c7138dd227

    SHA1

    968c671aac383f98a2aa80ff74d22300ae69b5e3

    SHA256

    5813bf8fdd07e31331008c1d2d20e25bff2d5a08c04d3eebbd9880c0338c8060

    SHA512

    deb6290127e1bae903ec89e2b726b4e360687390bff6a417a6cbcc671cadc2b8a1840e54188a34b575facbd2d20ac4dbb714946d1f16c3c27bc99cbbcdd6a006

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb7049b23841181c0a3ba66db6a629e9

    SHA1

    ee77ec67b3b1fcb07b02492fc8790198056616e8

    SHA256

    c6837895f97fa395f5428208e43072084108898bc30013c02188e8aae7ad7290

    SHA512

    9c50de03f097dce84d2c3f4e0bcd7b577fafb3899d151372784d6b202620f1602c15580dd186bf870f6f7d7a8841efea13aa7f02e0f7c25eb383f3581f067dea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f0bb5da9a797938a8eae2bf72e2f326

    SHA1

    0a6771e91e5e50a159689263751262cfa1083367

    SHA256

    010d4abf71f8bfec639934e31132c4dc461a9562c3fb5b823dd15ab1f63dca0b

    SHA512

    5ff5617a1b7637d5f777525131ae3a637d839825da2781efbf3b10bacc5bca59fbde31fce4460d2376fa7b2b0a3bd8366a093391d3452cec5719136768af90af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8efd4e769fef26d51a9ec62b7fc992ea

    SHA1

    c323f298b324908243d31928d258a63e970af766

    SHA256

    82e79f2ed4e57243201a9f65a275051d2990bb89533b7584948e0863d6560680

    SHA512

    6b7ef838fefe0d8fd8ea4765e53c86ad82739a6996e2e02c756b575d2ff1b24647f31b9f4f6a5da7eb8bcf667d83da13baaad0091aaaff87347dd11858a841e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71cf0535f2702727b198365b87e630b1

    SHA1

    f082abb033e16b0e74b36aa37bb7ca4d866a8020

    SHA256

    ca355c349982acba3dfee37cfee02ee297d61c0eb979801e3f0bf63b5312487a

    SHA512

    ab315fef6e690947759553843fce71d175945f30ea16165532b48967016fa537e0f0f81ca12bb1f07ece3f4d3327132e222a60acd280865631b8421d1fbbc7ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f18fd588e5cf27e6f6ad93cebc1b197

    SHA1

    09e151d064dc1b65ea5714dcf86d261bf64c967d

    SHA256

    4c65c7f691c99acd19bb934eb362a7db7dde8eeb572a07793dd2263d26d1e8b1

    SHA512

    93e28cd7a654c2abc37feb50adf9fa027d81ec2cadc38a0ba45ee6368fb50f45561b61814ffcf1dd5ba0c5b4bc8c210110dbf50d37c99e3239a686a15928fd30

  • C:\Users\Admin\AppData\Local\Temp\Cab7B1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar874.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc