Analysis

  • max time kernel
    122s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2023, 15:21

General

  • Target

    Subpoena Service.msg

  • Size

    1.1MB

  • MD5

    ac4ff4de69e7c8e38bd72c7318ceb0f8

  • SHA1

    242141ed9dfedf9d52aa49c9370ca142d41139c1

  • SHA256

    63fdca3f5662f3bda0d86ba6e77acdb7769437e2ec80c99d2aa05bc262348f0f

  • SHA512

    49e258886993da6a6bd510fcc19ad6c2ca2f0554243614d89c913daf72a624d1375501fffb05dc9de227add9ea2c77cc94bd745ae7254f78f692e567978c0943

  • SSDEEP

    24576:Pf1Q/hDtIFVn/6OjKLt9gaIUwqfCUyT0T:X+/TIFVn/XjKLjR3fCUyw

Score
6/10

Malware Config

Signatures

  • Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\Subpoena Service.msg"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • outlook_win_path
    PID:1264
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\UK0YEFL7\2022 12 19 Texas Associated Businesses Subpoena.pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1928
  • C:\Windows\system32\prevhost.exe
    C:\Windows\system32\prevhost.exe {DC6EFB56-9CFA-464D-8880-44885D7DC193} -Embedding
    1⤵
      PID:1484

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\UK0YEFL7\2022 12 19 Texas Associated Businesses Subpoena.pdf

      Filesize

      991KB

      MD5

      a7cf1f5f8818cee998f3f1dea6a54d2e

      SHA1

      e980db14ba7789de89094f56d8da1cecda5420b1

      SHA256

      cb1707b7ce822b7859b4dd6c693d2facdb29eab8fa51f3f6511cb349c74029b1

      SHA512

      1ade24b64447a465e9a9076b2981350b972b951cd88ee5ccb159153a5b44c85dca3cb0c7b6b298b6ec94b23cc98b91fa948c47ce77d1d9922bbfc3af6a4c5ad3

    • memory/1264-54-0x0000000072F71000-0x0000000072F73000-memory.dmp

      Filesize

      8KB

    • memory/1264-55-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1264-56-0x0000000076711000-0x0000000076713000-memory.dmp

      Filesize

      8KB

    • memory/1264-57-0x0000000073F5D000-0x0000000073F68000-memory.dmp

      Filesize

      44KB

    • memory/1484-58-0x000007FEFC581000-0x000007FEFC583000-memory.dmp

      Filesize

      8KB