Analysis

  • max time kernel
    1791s
  • max time network
    1595s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2023, 22:25

General

  • Target

    Headers.eml

  • Size

    14KB

  • MD5

    50c6234faec9b9f1e1ba8c0b018e1234

  • SHA1

    b925d63178893fa000598d3e41192527fbfc4475

  • SHA256

    fcdb77e1237ecf7c7d143aed4340421249d2d42b1b6c45a91d86374a777b87f9

  • SHA512

    67ee7eed503f861130f0bab8c06e2106498b0f5be98aaffdcabecb6dfce02d1d0694a2df819152c3649c83cc63d4f19b18b94337e7d76ae811e19208a5cee0de

  • SSDEEP

    384:l0oRDbB0BXTXqPmVCe4k3lNgilhT60PJ1HS+JCfgiPWaHpxlLrnJxKOq/q1LPQ5Q:OoxFQXuOVLtnS5JTLr/KOq/sEQ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Headers.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1236

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          d1d29fe57e1967dfc4ec52df2296b9c0

          SHA1

          d287b9444c92b36fde09c9d13e5315c2b2fffa74

          SHA256

          dcb5d082dbbcbca65b570bffc7ccffefeb2b1f72ea864446ecc4d542d1975d15

          SHA512

          d6cd090c4becc20396211858d6ad4f4d00b5b167a2358c016ef592c19f13f2d088442a21d117f30646fb183ef9305b3a5e06a76ca869e6f3a424ad511b03ade4

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          98bd97dfad2080e9fbef2481bc6144dc

          SHA1

          2e1e15e0d117aa94506138e16b67f196498c4acf

          SHA256

          525d320bdb031dc38d19ca5d4709f4efb148f9f32f3a6fa2e2430dfa69e93be5

          SHA512

          85142ae681e48bc4125e539178b7870f085368de06a86f23ca47d83a4261e0f226005101286a4cd56f3dc6c50dd2c4a10e8c53857236881e30ed7d03e5804e6f

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          98bd97dfad2080e9fbef2481bc6144dc

          SHA1

          2e1e15e0d117aa94506138e16b67f196498c4acf

          SHA256

          525d320bdb031dc38d19ca5d4709f4efb148f9f32f3a6fa2e2430dfa69e93be5

          SHA512

          85142ae681e48bc4125e539178b7870f085368de06a86f23ca47d83a4261e0f226005101286a4cd56f3dc6c50dd2c4a10e8c53857236881e30ed7d03e5804e6f

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          98bd97dfad2080e9fbef2481bc6144dc

          SHA1

          2e1e15e0d117aa94506138e16b67f196498c4acf

          SHA256

          525d320bdb031dc38d19ca5d4709f4efb148f9f32f3a6fa2e2430dfa69e93be5

          SHA512

          85142ae681e48bc4125e539178b7870f085368de06a86f23ca47d83a4261e0f226005101286a4cd56f3dc6c50dd2c4a10e8c53857236881e30ed7d03e5804e6f

        • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

          Filesize

          1KB

          MD5

          48dd6cae43ce26b992c35799fcd76898

          SHA1

          8e600544df0250da7d634599ce6ee50da11c0355

          SHA256

          7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

          SHA512

          c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

        • C:\Users\Admin\AppData\Local\Temp\{3E5C1647-0CD0-49BE-96E5-0DD186B3C1F6}.html

          Filesize

          6KB

          MD5

          adf3db405fe75820ba7ddc92dc3c54fb

          SHA1

          af664360e136fd5af829fd7f297eb493a2928d60

          SHA256

          4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

          SHA512

          69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/1236-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1236-219-0x00000000081D0000-0x00000000081D1000-memory.dmp

          Filesize

          4KB