Analysis
-
max time kernel
94s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
Please share your feedback.eml
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Please share your feedback.eml
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20230705-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20230703-en
General
-
Target
Please share your feedback.eml
-
Size
17KB
-
MD5
29c6bc40c3c0e340048a59f201f0aac8
-
SHA1
f43d62a94c9695c87394e2b21bb0e3c230396dac
-
SHA256
7471520c96fb28215da011a8f363352897938e842612ad502bd52e1cc378b48b
-
SHA512
4439021847840ac4eb4284d0d1dc8cde89fed928830c256d98b05b6d557f2097e0622f589f97c313ea6ca79a02120ca12a50d93848912b9a1d1f4a8eebebbae8
-
SSDEEP
384:jnicgMphdMklI29dGrhaCus7Far2QH0DxB/1iwYFrlbHhWjg/c/qIAA1iG:NhdnzChXusR0200Dxjiwql7hag0iIA4/
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2332 OUTLOOK.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 OUTLOOK.EXE
Processes
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXEC:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Please share your feedback.eml"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:2332
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5d8c7f73c86348063562d483c9db39f83
SHA1aa9e9b3d36debc07d3bf1cc5699f2c80df480fca
SHA256bb39fe332eb1838fefb137953ee21b0697d130d1a50b469525b490e8631cd895
SHA51275c6b2feb412bc410235687a8062c33ac239257a2986fb7c3a9567d2573dea13dbb3b295fc6ac761632c573dc69d4c4b401d905fcc0d80af976cabb4f45df7cd
-
Filesize
240KB
MD54e5d52250da6dcbc502e7b70b269bbf4
SHA1df89b5e8eb396199bbc2867ddb5c20bd15987ec4
SHA25638e2fc69c67917d02f4a464e40dbcea3721b002a14766e2fb46d568e6ba64487
SHA5125a1640ca58eb9fcf273c5d2042fbd843730675aab6eb996554ca6cd54a00f7c9702fb6dd9e35796b5b496127623de5d8e2b8ee92ee30a0a2b923241e2a4ba90e
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31