Analysis

  • max time kernel
    173s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 01:33

General

  • Target

    Re- [External] Must Read [email protected]

  • Size

    12KB

  • MD5

    6d8bd98dcf490ca9f6fa5531228fbe7b

  • SHA1

    68146c5420e7d9ed118dd4795b02b305cc5e826d

  • SHA256

    6199825ca433dd97a463e1b2241b44ad4cb628ab114d1dd8db429de24f4c6cc0

  • SHA512

    260f781605a2341e9437dfe4cc5bb98351872ff1814411c31cef7b3d0cd4d446edef0e89c66fbe3253f96c7651cf7321254854e5f28c3a50b15aa89d89b1aa15

  • SSDEEP

    192:dv/rDJc4XOH0YHnh/QJyDTMHUSruHtZCgZJT4wIJW7yZFNO+OVWK:JJ3XcXHJAtruHTczL3Gp

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Re- [External] Must Read [email protected]"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://its.engineeringtechnologies.com.au/westernsydney.edu.au/&adfs/ls/client-request-id=7c724&wa=wsignin10.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:300
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:300 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba08158ba61092bae65b60582a1ee0f2

    SHA1

    0e6ff4b97257189ee35baa3b4e14163122538e9b

    SHA256

    19e895d4964f504edd1171d669dc9120dc66ffb78d18639982bd6eec88aeba16

    SHA512

    f6435d639f43ae7ec2f1216ece2a12ea075e45a50a5c4234731b10cb0e3ba9b33cdeb3e1355cd93062b25527ee9794d6ffe8612707f64676957b6f5c4c52ccaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47e2cc84858015a61511f314c03d6323

    SHA1

    181cd4f26a36a0d9ad2f51f211e9fc286279d190

    SHA256

    9b21f27dafa9c8e3d5b8ff46dce9c0472f8fa98bfa7eeae3fc291b263406df41

    SHA512

    f612c28a25c875dbcd8d9d4f61f9bafbcef069834d56af0b497c3746e1e82c510a8e8c1239439a2d40567e0357411702b747708e2b25ee002b417ee7a0c434cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e147d917ecb10e50522bb8a657aefff

    SHA1

    4aa47a79f8b1115dda5916fd01a7cbc31a8af92f

    SHA256

    07a03a300ca847c52395c3ab7d2bdb1885df10e1bd4045f2ed2d04a8e937a95d

    SHA512

    21ff6862dce65bea0b026446f1c3e4eef1feb477f11dfda75a90a2b7aead8605612a3e12581e7808ef712affd727236d774d0a4b1f6942c8046b71a95f527890

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    947cd0b664432bb5242a1a7f763aff4d

    SHA1

    e02ddbe7206911032de2cc34d9315f037fc2bdb1

    SHA256

    c407d91d4feefdf25b90e156aaa52fd64afe9ce12a92288a29a68715fb367823

    SHA512

    d9d7e5797a852d325752e59e08a5ed63422451afef2daae481c03cdd463aaf9432eba9aafb91113a8bfd9a256b6f9f4f99a559ad25b0a623c7a2d7ebf2a43af3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    146fe490efd47dceb12a1b9303b3c929

    SHA1

    ff04f9d9e2dbeb08bbd453a1ee2e52fb2f9e7aae

    SHA256

    4823db4f0bb75b58c838e985465cb0f0cc28a62da19d2c2fa8d011282e6beffd

    SHA512

    34ce6b63060aa380acc012d210de9e3d8134d48580903e3f62a16cec686e525bd14f94483b637b15cde354f7a3279dc2df4de668a53a117f8dd5c1dfc901587c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08dce51ae3add749f7978ba4302f610c

    SHA1

    cf8509b0d959b6577037110f72c84cd60e147d4a

    SHA256

    8d9713f5cfed210541763d767621b1396b2986b99ddfb8f1281844376dcdcc3f

    SHA512

    57924d612e7ee223d148f9fc73c0cc2e649de193a8f5aff6fd790e98ba257db4ccb7987a20718da156b786ca74224f611b882a153e75a1dd75fc7fbcdfd1eea0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4269e88029dbdcb9fbeb92887a79318d

    SHA1

    849cf187d70d172a1f1dfaf558e684eeab234070

    SHA256

    452c6852fa1d9d7b1cf8b965d2ae24bf6af94e6514d77620d1e28863dd74548e

    SHA512

    1c1ac0205caf06a345e063806548830261255027e05e59e47982281b3df0518cf60b2c35ac579ec1a3c27cd7fbe3cd7c13677bf625e76a2bbee61f9408e4f086

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07a0253a454d81fd180e9ff3df82a2fb

    SHA1

    06614ccce70a86d49c5edf6578bdfdb2ba95850a

    SHA256

    af415df899a4569dbfa6c3d1250d0a2279c6b17a24f834e552f76613a7b2c9d1

    SHA512

    339e39d7c774782cb41e2c24c1396147ad9161017f81ca9a3688e0b55afe2257014c68ad28f786508af2e7c90ed46cfb87020f79935bb9765279eb13d4e19435

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5a12ba41ef8c726d096dcff6d2f684c

    SHA1

    80b326a6e8f50d6801ddfc54eaacc35a1eb6b2ae

    SHA256

    415e89a203e8a34d64c8751f72ba719f129a56e732233d95bd28d4f30345080e

    SHA512

    cff49c651723e16a5a37042862deebb3efd9f5ac86f5c2c9f16ac02dc71c41b854518c85ea5b6f8247ad91e495787895e8849fa7f2ef6351aa3310377446163a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa7965bc4619a14cea503f8804b48c10

    SHA1

    9f941229eabfe0af0397f1b6c06bc513aecf58d9

    SHA256

    d1793af15cf5930fb7bc1915d8569bec75563072d5be0fc34c0d933c5aaa1d6d

    SHA512

    08c78a7cf60ca54aa4827b106ccd2f57fb030b8a8fe618ea2508e129a1d25894a0f721d2603c6e00ebf58208cc55d6fe8df2b8da667c34016eb1dbb6de480b74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f91baeb01dc8877b766ed571f32d8e15

    SHA1

    1967f32959617ee6bf16c6a913079448281f6227

    SHA256

    7dcbc7c3262aa1e60783acd0027404930d11e222d0170b7a2d32029d78b452bd

    SHA512

    652da81b79f462a6788f57e2cba9e66d0db5512e6c12839459fa36586cdbbd0d72d3e3f57282700700c3bf8e431994fdcc01d594906adf4d031a43d73b9880d9

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    67b5880b09a877da3f2882914f6eaae5

    SHA1

    dfc45f3fda3896a92c58c3b18d84cd0ca954b079

    SHA256

    00091842a183df03d89f0e1837011b86503c10bd7b2d2b9061d9cd486c06e366

    SHA512

    02a93540b0b5ebcf666c53002c566daa0e61280aeac3a5bd22ea37c4e8d67baf177afdb050b8b2023f90d8abaaf4a6f2bc867e081f43b4255432f3aaa8699c70

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Temp\CabE14B.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarE20C.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\{D8935208-91D2-4316-992F-00371B188A87}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2456-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2456-1-0x0000000073A1D000-0x0000000073A28000-memory.dmp

    Filesize

    44KB

  • memory/2456-124-0x0000000073A1D000-0x0000000073A28000-memory.dmp

    Filesize

    44KB

  • memory/2456-163-0x0000000069A71000-0x0000000069A72000-memory.dmp

    Filesize

    4KB