Analysis
-
max time kernel
126s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13/07/2023, 10:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://group-support.zendesk.com/attachments/token/kEMhBUhxh4JYXxKzQQmiUOIhV/?name=unnamed_attachment_3.eml
Resource
win7-20230712-en
General
-
Target
https://group-support.zendesk.com/attachments/token/kEMhBUhxh4JYXxKzQQmiUOIhV/?name=unnamed_attachment_3.eml
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 50fb02fb75b5d901 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003d000000900300001d020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37D0DE31-2169-11EE-899C-6A17F358A96E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396009603" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2300 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2364 wrote to memory of 3000 2364 iexplore.exe 2 PID 2364 wrote to memory of 3000 2364 iexplore.exe 2 PID 2364 wrote to memory of 3000 2364 iexplore.exe 2 PID 2364 wrote to memory of 3000 2364 iexplore.exe 2 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 PID 2364 wrote to memory of 2300 2364 iexplore.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://group-support.zendesk.com/attachments/token/kEMhBUhxh4JYXxKzQQmiUOIhV/?name=unnamed_attachment_3.eml1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6WRIL45A\unnamed_attachment_3.eml"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
PID:2300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b43671cd691d24478e98f08a7a0bcc2
SHA1d4add97f1c237e0cd1d7377d9c929afa276f0565
SHA256e42ba1914afa33f2c514712c4caa857a92429393b6d97e4a9ea618f6fdffe2d6
SHA5127a765f7bc2731e521c3353d7140eaa8f61788fe56236dbeda8585598e34dc4dc5ad3922825bcfbd8b5e1e1d26f9fc89f97090109e35e75d671082664af783671
-
Filesize
240KB
MD56b037ab4fae848383a2b18f4efcf7c2c
SHA1a285eaa3e1de48247f78c44014850f11d6b80f2c
SHA25667f2233d7c3837f470b484f1adbb562796bdce7ab5815ead4b1cdcbdbbd11c94
SHA512e7b03191ae4ba1e2fe199acdb23385c562aaf8456f5aa3854c8875e9750f79db8ef3933376e8661c113e11aae2d5cd755278c3210288c3003cb0fa5959c62218
-
Filesize
225KB
MD54cdcebc3cb2ae609646ae01f019a2139
SHA1c632c6888db26756d5e240f14369f231e3cc30bc
SHA256c82d5fd4a4d2d80dc5438520c10fd156cd0be2ee32c56f17811800bda82a18d6
SHA512e6881c2e0ea2df79175adaaef6fc2ce76a9e84218d0a40b2d9a067797a079579412aed3672466f37b0d84697fd5dd27a32329beb5fe36842b63daae73053f6d9
-
Filesize
240KB
MD5f0731d2ed10e4d04155f67a38a86bb5a
SHA11b45796edca64552abd4f8140af2c45d47713ab6
SHA256de8a7ceec3c57d694f5a1969fa0fb3cd88ce0c346ad0e531c44ebb1f9b19efff
SHA5126adea047cf61806d316d316af5e21324f3c9ad0c14438d3fc8bacb302bc39caaca61ea529d7cb9a0c786bcd694c0d15028e8f05fa22b74efee1f225036d999ba
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3VKWFGCX\unnamed_attachment_3[1].eml
Filesize15KB
MD52915af1e5c096663824e9385f939cc1d
SHA1fd4df4c77577ec0971b74bce673ef73898f95da4
SHA256d0bcd3c54c8aabe90b04ad1c2226db0231cda55aeac4f4bdd4ec76b93d0a4e86
SHA5121d5647bf983a29251f0c0c6aa04dfcc1f47f02e3a1e853eff2f689e0259f3212ef980bdc69b1a5e848d58deeaabda71ebf2e0838e6b5a0ad58a75c8f681cda1e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6WRIL45A\unnamed_attachment_3.eml.um3icbn.partial
Filesize15KB
MD52915af1e5c096663824e9385f939cc1d
SHA1fd4df4c77577ec0971b74bce673ef73898f95da4
SHA256d0bcd3c54c8aabe90b04ad1c2226db0231cda55aeac4f4bdd4ec76b93d0a4e86
SHA5121d5647bf983a29251f0c0c6aa04dfcc1f47f02e3a1e853eff2f689e0259f3212ef980bdc69b1a5e848d58deeaabda71ebf2e0838e6b5a0ad58a75c8f681cda1e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ULULORKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD5305e864799410104efcae17c70443da6
SHA1df6979428f2c14ab496a9c16b7204b665c75338c
SHA25631e68b84d63477adae9642e58f0f0009f5d4f740bdeb2637a1e374a6dcdd4aa9
SHA512e1cf6fa6f3b57e72776399df0700686fa82a0f22b2a640fe4b69c692c86440c895092975bdbd75bbd77125e2d2a2792bbc5128710fe197517fccc0617d7f18b6