Resubmissions

04/05/2023, 14:58

230504-scg21sdb73 5

04/05/2023, 14:52

230504-r88n6sdb54 5

Analysis

  • max time kernel
    69s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2023, 14:58

General

  • Target

    attachment-2.eml

  • Size

    298KB

  • MD5

    b2fcd339b18e3a35acf9937b82dfdbf1

  • SHA1

    18ff6240ff29a8bbe77f1c2a45906c5a3e88ffdc

  • SHA256

    5c70baaca2e40bd6c2c3be0277f18bcf6fda98efbc3645acbf9575a474bd0cc3

  • SHA512

    abe47efdf197aa56438d87d5b29e03d772a13aba063032451219ac715263d255dacfa964e4a032e3ead47ec48cbaab16e76a0d4d74ea11382ccbacd31bfba11c

  • SSDEEP

    6144:d08dlmdWAaDOMDSkITQbtNw/N59nB8iw7gdFpahtXii+VfHNj+UAN:d0GqzMDSkIitSF59B8iScpaHXii+5He

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\attachment-2.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2008
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefaab9758,0x7fefaab9768,0x7fefaab9778
      2⤵
        PID:828
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:2
        2⤵
          PID:888
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1456 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:8
          2⤵
            PID:1992
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:8
            2⤵
              PID:1224
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2180 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:1
              2⤵
                PID:512
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2220 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:1
                2⤵
                  PID:1212
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1224 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:2
                  2⤵
                    PID:2356
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1512 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:1
                    2⤵
                      PID:2444
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3812 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:8
                      2⤵
                        PID:2516
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3928 --field-trial-handle=1184,i,4330235315655420256,7988107708066656423,131072 /prefetch:8
                        2⤵
                          PID:2524
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:2104

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\5afc97b8-5697-4d0f-b300-a1e1c22697b9.tmp

                          Filesize

                          148KB

                          MD5

                          89405c7f9a2eb82fcbff3905c3e78895

                          SHA1

                          9672dc7ee553b36cd8f43b247969a51d3bae013c

                          SHA256

                          99cbd9f53b62908f7dba7f63b10e1b7eadf071ab20dce97429640e8f59b5c54f

                          SHA512

                          d7c6245ac0d914ce94eba9d93f57c26c4f4b06f56c01b11f05216fd09d701976ee67f1816e0fd025b7319cf23de9a589a506ed136e5bceb869dbff66c114c649

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          6fc8b15d9859beaa6cd1e6132772d863

                          SHA1

                          9e076dbd73d4b4b59fc68e0ed9105ad70d61c3ab

                          SHA256

                          4d2c1be1516906a7400560fc3ed3677845704672baccc185877bc9d5720d1f6b

                          SHA512

                          4e5b0044f3e527fce97f712751bf64098d09c843e34fa5b307668655b09d78d76c9e5b7348a83f62c478f87a5ad1c4d4f2d6791c1abc62dfb6016735aaa27ebc

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          148KB

                          MD5

                          8e3961b932d1f8832385e97da4ae2379

                          SHA1

                          6d7873e5d1aea48b6984b7cda2b4382c9307a52b

                          SHA256

                          fe317bd16d5a503e32cde29278ba5b50e533ee13def8d62b8cbbc1350a912dd1

                          SHA512

                          10cf4bfb581b934bf8c8d75808638444a8f8a8ae93bdceabed31ea8c4db5d889ed681ff7ce954aecb1826efdb763bf59174128a52924d37877614bcc56539d5d

                        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

                          Filesize

                          240KB

                          MD5

                          42a51e0bd4fd62a497a72c88d1b9ea2b

                          SHA1

                          62f5609ca940815f4fce800ffa5355e976717ab1

                          SHA256

                          24659fb3d0f6e963554114db4a6aabab0af96a6786454fcb098c5718ba323d76

                          SHA512

                          b259ea9f20c11306c0db74265c6681c031b576dc2e9f9d9fc6e76bc1ebca79bf3f32788cb8d711a03aeb6a3ce5ec15afe90f72196cd1e201f970105b8857d7a8

                        • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

                          Filesize

                          1KB

                          MD5

                          48dd6cae43ce26b992c35799fcd76898

                          SHA1

                          8e600544df0250da7d634599ce6ee50da11c0355

                          SHA256

                          7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

                          SHA512

                          c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B2LTO483\message_v4.rpmsg

                          Filesize

                          204KB

                          MD5

                          a420bbc6467fa1127ddb69cb2082b3e4

                          SHA1

                          e03547ec3ac030d816250782e2b04234564286cf

                          SHA256

                          3be9a16201715453e48dbccec6d40c49708bc3c21526a915375364af4cab8e1f

                          SHA512

                          c1dcab23de91d19bef0c67f9ece2a521ce560144d0a7f097426825ef70c2b37bc7bc345fb73af624ee5cc667d948823cb488114e5d6291d0cdf43f1f894af0cf

                        • C:\Users\Admin\AppData\Local\Temp\{F3BACD10-BBA2-439A-87B3-E77448653FCB}.html

                          Filesize

                          6KB

                          MD5

                          adf3db405fe75820ba7ddc92dc3c54fb

                          SHA1

                          af664360e136fd5af829fd7f297eb493a2928d60

                          SHA256

                          4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

                          SHA512

                          69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

                        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                          Filesize

                          2B

                          MD5

                          f3b25701fe362ec84616a93a45ce9998

                          SHA1

                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                          SHA256

                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                          SHA512

                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                        • memory/2008-246-0x000000000CA50000-0x000000000CCC8000-memory.dmp

                          Filesize

                          2.5MB

                        • memory/2008-223-0x000000000A890000-0x000000000A891000-memory.dmp

                          Filesize

                          4KB

                        • memory/2008-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

                          Filesize

                          64KB