Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2023, 20:53

General

  • Target

    Rosa Maria Aviles Najera shared a file carpeta de informes de pago with... (197 KB).msg

  • Size

    236KB

  • MD5

    1067f8a884167e8a5a38919592175aaa

  • SHA1

    004f93d43d7656092e70c32fc0082fdd8f3ffca5

  • SHA256

    2a447fb59e8fb3acd2f0509934f91beb9355c01df33465c45c9917c9e6f49325

  • SHA512

    985018700c5553a898d9325530051a82ffd90e119a8b26b0cdb5b41f623a7175ca398afcbb9131fd6b11d626bf204a2c67a78e75c36f5520ed8609b813958af5

  • SSDEEP

    3072:QyBAAJy5Vamun6a/mbl7c3GOX/pxwkx/cLtZkJn+iqTZ8pHFlRD:QymJWdywhnULIqd8NF

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\Rosa Maria Aviles Najera shared a file carpeta de informes de pago with... (197 KB).msg"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2576

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          235KB

          MD5

          2608d9ec340d3bd95e51449d5c4963f7

          SHA1

          d5459751eec9cef2804a1195e474419b1148ff32

          SHA256

          eb3e7ab08aec05ce9589083adea546a53752dffce447ce811f2335f93fb58fd8

          SHA512

          a4b424a579cd5119685db18dce8c9fa76618827b0394102eff2d875feb9dade0cbb2266e7deeaacd38ca30ce7d3850dd9e5a491db6bf303edd70c6e0f36bf725

        • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

          Filesize

          1KB

          MD5

          48dd6cae43ce26b992c35799fcd76898

          SHA1

          8e600544df0250da7d634599ce6ee50da11c0355

          SHA256

          7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

          SHA512

          c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

        • memory/2576-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2576-1-0x0000000073BED000-0x0000000073BF8000-memory.dmp

          Filesize

          44KB

        • memory/2576-124-0x0000000073BED000-0x0000000073BF8000-memory.dmp

          Filesize

          44KB