Analysis

  • max time kernel
    149s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 17:25

General

  • Target

    Geek Squad Security Services.msg

  • Size

    1.4MB

  • MD5

    b5bb9496599e31a8f3eb37b6e014f1ba

  • SHA1

    9a45b90e6dcc0ddd664cac8f5555ef6782b39e26

  • SHA256

    a4f7d62594a21be103f1f08a9c8b22e7e3f8a91835dfc18d81b36ad70c2bc8d0

  • SHA512

    8128e4c53671e3182548946a9b6c81180579ffbf8702144ee0ddba43b7830fb0b4d7eaf0c25999e96600c7536ede47f2c38a3797423055d71496c015b7af4c8a

  • SSDEEP

    24576:cV/yEl7qrraXbC5JnkWBZAveZg3aFCnP/E:O/FluraLCjk+QeU3

Score
6/10

Malware Config

Signatures

  • Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\Geek Squad Security Services.msg"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • outlook_win_path
    PID:1552
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1504

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\X7H3QS9R\Geek Squad 941025651.jpg
    Filesize

    1.3MB

    MD5

    17195aafd7769c4618a2b04e3be17e90

    SHA1

    e3e095db5495947ec3459c179b30570f70fc0dc5

    SHA256

    3ccbf73e9127f6d3fd281f8401e8926285ed2ce86c8c02af7e7d92abdb81dc62

    SHA512

    7ee13d629c286a2ccd080e714fa08328beb590d9f20f9419ea1ec7ec0e39d9f5931176199db5787df8c40924833bd190f5912ed6114e9c511c0be8997f7c406d

  • memory/1552-54-0x0000000072701000-0x0000000072703000-memory.dmp
    Filesize

    8KB

  • memory/1552-55-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1552-56-0x0000000075681000-0x0000000075683000-memory.dmp
    Filesize

    8KB

  • memory/1552-57-0x00000000736ED000-0x00000000736F8000-memory.dmp
    Filesize

    44KB