Analysis

  • max time kernel
    121s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/12/2022, 20:56

General

  • Target

    Asking for a term increase! #76896-4658932.msg

  • Size

    1.6MB

  • MD5

    79f839c46377c9612f76d211c9cb7ec7

  • SHA1

    aeb5dbf6e6521d6aab53d500d17a7ee05ee7ce9e

  • SHA256

    4713148ee633e808e70e2c1718122bd58398eac6b177667575577997beb83a02

  • SHA512

    ea0c45c3c53ebc22838a25b759c62d1e381ec605dc6da79b7102e12b0a10b88466db03803c8db6ac62467fcf77a3ed51328d0a6abe9e2b1240bcfc77b695ce38

  • SSDEEP

    24576:DNE/yEl7qrraXbJUucmp9T1d2Yt/SlGovVxz9:2/FluraLJUBuJd2YQGotxz

Score
6/10

Malware Config

Signatures

  • Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\Asking for a term increase! #76896-4658932.msg"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • outlook_win_path
    PID:1988

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1988-54-0x0000000072AD1000-0x0000000072AD3000-memory.dmp

          Filesize

          8KB

        • memory/1988-55-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1988-56-0x0000000073ABD000-0x0000000073AC8000-memory.dmp

          Filesize

          44KB

        • memory/1988-57-0x00000000761F1000-0x00000000761F3000-memory.dmp

          Filesize

          8KB