Analysis

  • max time kernel
    107s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23/03/2023, 16:33

General

  • Target

    Validate your users of My Oracle Support.eml

  • Size

    10KB

  • MD5

    639da532e4dc2d4677f1d4c662047709

  • SHA1

    0e4f79eabb94780b0dac9546d3d0eb6632dca305

  • SHA256

    4edadad4a2808ed5c1a00b1c0def6286613f69d57a1b4fa42c8068995083a655

  • SHA512

    05cb8358dfbee6ec25130d02feea526fcdffb2bc176c32af03066ba632880e38fbfecbd92392832876db5e8738c6bf52233bd166f02447631035ae55e8159777

  • SSDEEP

    192:tlrpxBz8/PlZNT8Q5qDPjx+lOFxVZq4SMrj8uBXd:blxBz8/dZNT88qD9+l0To4xf8Gd

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Validate your users of My Oracle Support.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1060

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          263KB

          MD5

          a3f587107ab3c3cf2685f422a6194f4f

          SHA1

          d62060c86cead28761265c594437007206b257e4

          SHA256

          80f8257fbb6ff789eb42aafd742835eaaf861aeb8d002bea0a20c4d645ebafdd

          SHA512

          d29b0497cceb8a639f444b9ae07a8072c129947f337f7851c8898971c626fa306159977718e1ae592cdac5f3b2d8a376a08024a11bc7dc2dae950d163488555a

        • memory/1060-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB