Resubmissions

31/05/2023, 01:30

230531-bwt29acg3w 5

31/05/2023, 00:59

230531-bcdadscf5y 6

Analysis

  • max time kernel
    125s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2023, 01:30

General

  • Target

    rfc822.eml

  • Size

    16KB

  • MD5

    75402a5758466458158ed0b7e44a8406

  • SHA1

    5c9aa10c2444aaa4ef06de92e6dad27107eba336

  • SHA256

    bcc2ef7664614e9b0f9e67978fbccccefd77c6afef025a36cdbe097760cbd6a0

  • SHA512

    31109a8d4b0501199c0095877ec37fad5862129eae9f0519fb7ea2d30498b942e84020cf64acc1223eeb291a33983fb745f498ead302653f58ac976edafaf151

  • SSDEEP

    384:VKx9VWhEzI48cH08maPKsNZIpeJo45/1jLkpW23Jr7hF9:RB6Mlp+om/GW2h7hf

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 37 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\rfc822.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1504
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
      PID:1684

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

            Filesize

            1KB

            MD5

            48dd6cae43ce26b992c35799fcd76898

            SHA1

            8e600544df0250da7d634599ce6ee50da11c0355

            SHA256

            7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

            SHA512

            c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\ZJUQHV5A\docd.png

            Filesize

            1KB

            MD5

            0e38531b75a0b38a02e59f5732adbd8e

            SHA1

            0fd840fb21ab09441301250d2b414db9292535b9

            SHA256

            e8c347bd0c1fbba4ec406a4719cce8498f7398645b135e4f4b1d944f9ffa33c3

            SHA512

            2985fade568b12a62828f9dfc00e484659f72cf923d975bf5e6d097aa7a2230234c2ad4156e7b5057364e924170281e65554896f655dbb5d5b262d319b976bef

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\ZJUQHV5A\dw.png

            Filesize

            2KB

            MD5

            6a78b0944a1da4f3892d0f4a0163da25

            SHA1

            edbee8baecf4d272f1b52bfa4c823ddc50e5486d

            SHA256

            c9903cb4027bd617227a5f968c1b48883f9ffc3c140a629c418a413a3c14991c

            SHA512

            1ecb84b1b369b7cf3bfa9184b527b9ab5885b1a8be20a4aa408619d769379dc96ed56616400149381f14204c193ff359c86d7a7113089c6510a109705bf0c089

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\ZJUQHV5A\dw.png:Zone.Identifier

            Filesize

            26B

            MD5

            fbccf14d504b7b2dbcb5a5bda75bd93b

            SHA1

            d59fc84cdd5217c6cf74785703655f78da6b582b

            SHA256

            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

            SHA512

            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

          • C:\Users\Admin\AppData\Local\Temp\{C19DFC4A-D2B9-46F8-8891-A11B6EFF7BAC}.html

            Filesize

            6KB

            MD5

            adf3db405fe75820ba7ddc92dc3c54fb

            SHA1

            af664360e136fd5af829fd7f297eb493a2928d60

            SHA256

            4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

            SHA512

            69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

          • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • memory/1504-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1504-222-0x000000000A5F0000-0x000000000A5F1000-memory.dmp

            Filesize

            4KB