Analysis

  • max time kernel
    208s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2023, 18:59

General

  • Target

    PTL Capital Lnc.msg

  • Size

    308KB

  • MD5

    4c9b0e82fb4ec788346215bf878e4869

  • SHA1

    62c064db4cd8d212c7c67bef35f227a4d2037833

  • SHA256

    1a7f056ce9300cab56867c738f70095239b9d4d29daa1b392617b803a47176c6

  • SHA512

    6df878f974acc522e69dab520fdca76dd635dffa98ca7b43ef9b80850be4acfdd593a4e52175605d068fabbd5499a8d416ef3984bdbb74bdb8a7c3c29e65ddc2

  • SSDEEP

    6144:YBFbfTLmFdnKSCF1Kz3ykgYxCxNrJxnA4GnGS0FhekB/QbrlCQxcyH:U7XGQ1Kz3yk9xCxdJh1Gnx0FheIArlCK

Score
6/10

Malware Config

Signatures

  • Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\PTL Capital Lnc.msg"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • outlook_win_path
    PID:1264
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\O0KJJ6N4\PTL Capital Inc Tax Clearance Letter for Reinstatement Letter Comptroller TX.pdf"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:672
  • C:\Windows\system32\prevhost.exe
    C:\Windows\system32\prevhost.exe {DC6EFB56-9CFA-464D-8880-44885D7DC193} -Embedding
    1⤵
      PID:816
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6614f50,0x7fef6614f60,0x7fef6614f70
        2⤵
          PID:1364
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1108 /prefetch:2
          2⤵
            PID:968
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1316 /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:964
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1708 /prefetch:8
            2⤵
              PID:1448
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:1
              2⤵
                PID:576
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:1
                2⤵
                  PID:940
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:8
                  2⤵
                    PID:1704
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3292 /prefetch:2
                    2⤵
                      PID:2160
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                      2⤵
                        PID:2204
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3504 /prefetch:8
                        2⤵
                          PID:2268
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3612 /prefetch:8
                          2⤵
                            PID:2276
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:1
                            2⤵
                              PID:2884
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1576 /prefetch:1
                              2⤵
                                PID:3040
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2500 /prefetch:1
                                2⤵
                                  PID:3048
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:1
                                  2⤵
                                    PID:2312
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4476 /prefetch:8
                                    2⤵
                                      PID:2588
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4492 /prefetch:8
                                      2⤵
                                        PID:2664
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,8156147023883769514,15254966897468809438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=532 /prefetch:8
                                        2⤵
                                          PID:2728
                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2348
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:2
                                          2⤵
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2400
                                      • C:\Windows\system32\AUDIODG.EXE
                                        C:\Windows\system32\AUDIODG.EXE 0x524
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2756

                                      Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                                              Filesize

                                              1KB

                                              MD5

                                              2b9179faa2145fa981d380bde0393c95

                                              SHA1

                                              afd3856d1cf629d1ea270cde22bcabc31352d34f

                                              SHA256

                                              99306eb457a239c7131fe8e040fda1512b928de590908067a62a3f6f3d93fb26

                                              SHA512

                                              4f2826d6475a84dc3d3afb199773021300a29f090af733bb30f478a55758f54cc4d7b13d0b3343827b5db37d91d84486190ff633209a5f0e40a384d3f101a579

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              61KB

                                              MD5

                                              fc4666cbca561e864e7fdf883a9e6661

                                              SHA1

                                              2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                              SHA256

                                              10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                              SHA512

                                              c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                                              Filesize

                                              416B

                                              MD5

                                              a57797919e4251c79e4f8cdb11528cc1

                                              SHA1

                                              bc176efb7a30e4feefa63232c47c7023a88368e3

                                              SHA256

                                              0f7b72fc172eb23bd41657f1bb7476651c5aea2905e91de8ac0e8c75c9019536

                                              SHA512

                                              63e07c7bca1924801cca5fca72db8d44a699bf0825d6fbf340362e93f36b62725d5aa3b7224bf1ff8e58b790471d1dc7ee1d64ae4ec10a98b15360a9d77f41ef

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              304B

                                              MD5

                                              5b3efd2f7fd6dfab0714f5b077b45cd2

                                              SHA1

                                              444f37526dbfb145f4d8dbc626254f00437f945c

                                              SHA256

                                              1582bf17d9421bd2fb6ba13bc0a045a3112f7392400d50fe02c0a36951210048

                                              SHA512

                                              50b20d2a7ccb752eeaeb4dac0f5436d3a33fe677d002e1a56f5ab8f110f1ab7e258ddb288c49d01a84c157031bb451e62888f884d8d402a9790272364a9109e0

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              304B

                                              MD5

                                              24c8626731dd7369f4dd6ec549d43443

                                              SHA1

                                              173d1065b7c56e893eca58dd564fe540b9de0aff

                                              SHA256

                                              f55b27b9978b16b66d935b89e91984f6b4aa1926498c5313a6b948621cc4494b

                                              SHA512

                                              32489130564d1621a111064fdcef0a12ccfbee262c0c00659cad10d730650db30d9d7022c352aad64d15b816c10dd4c5edc5e60f785a2d7034dd499263fbc564

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              304B

                                              MD5

                                              ef7c31932419490c079c0877b31a3093

                                              SHA1

                                              1d0014ff6f915c39c4896f2d398200c8156f3bc2

                                              SHA256

                                              3fdcbb9f94d1616f7f6cbf1982002f004af9f368942b07c8ce79ac8cecfa5317

                                              SHA512

                                              434243f05a8fc2dad5224be0a01f753cfa5038204abc9f635f53e715b064e5fd7dfcb145fca40f825c246b26fe09dea4fc9cd48966334d5f7c376fe6d73cf35a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

                                              Filesize

                                              4KB

                                              MD5

                                              c5ee0d65d798fdcdea04908abf2a2ca5

                                              SHA1

                                              3601c42f38f0f96303caaf51a3449706964cda74

                                              SHA256

                                              dc4a30446385aaa679b9e8e6084abeb50e89a0ec5befeb0e51315a6b2c6e36cb

                                              SHA512

                                              d89f074f7012a94fcb8f4e36fc9fd3ba30208b13516797cb65fe51f28eab6ecadb1af7194075fe7d24fe74a8f5c8d6e1bfaecede309db1f52b654918603669b6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

                                              Filesize

                                              8KB

                                              MD5

                                              3efee513d8469edc1549262c4833bbe2

                                              SHA1

                                              477414731c0a171fbb8688cb1b407d2917b69049

                                              SHA256

                                              858f4b1f06f735adcb7e30cc0ce2d3ffaa2d2d0a73fee85f020b45a2ad5c0077

                                              SHA512

                                              965cf5acb2fb7b663b8ebe886636a94069e3ebd13a8327f845ce1e53fa43ab3d6be4e0c9b62c9e36a8cf8a82e04e758adb5eb952d4bc51beb9ea09cb2bb65fcb

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\O0KJJ6N4\PTL Capital Inc Tax Clearance Letter for Reinstatement Letter Comptroller TX.pdf

                                              Filesize

                                              207KB

                                              MD5

                                              2d5759be563a786b821a33da0ffa4064

                                              SHA1

                                              101ef7badeb56ae28d88499215ce9ec067ce0139

                                              SHA256

                                              ca725d6ad7d142f1d384cd9c6c4732730fcd4feb2fcb7d24217f7f91a2098d4e

                                              SHA512

                                              27fd65a431e78a8f5083127bc193620c121df6954a13dcf11b5944bf9f974f58595073003c243e3bde4901640d617419356a157528077c201f85bebdcd09f785

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XI1YQ7F0.txt

                                              Filesize

                                              608B

                                              MD5

                                              9ced97dc2d14148407b5e0ba19d83add

                                              SHA1

                                              ad4eb2f73a11d762710c02b0a0daeba3da575fea

                                              SHA256

                                              12bde514a30e05b88618c891879b3edd7b2945ebc60328143eec6146a8a0eb4d

                                              SHA512

                                              c8ad804ab5daf706ec597dd4a5926f2143c002a1bd1a546c95490513019fec43dacf73aea588508c2cedf13395388577dce141b152ce808ee9e1017713fd5e37

                                            • memory/816-58-0x000007FEFB8E1000-0x000007FEFB8E3000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/1264-54-0x00000000722D1000-0x00000000722D3000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/1264-57-0x00000000732BD000-0x00000000732C8000-memory.dmp

                                              Filesize

                                              44KB

                                            • memory/1264-56-0x0000000075291000-0x0000000075293000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/1264-55-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                              Filesize

                                              64KB