Analysis

  • max time kernel
    74s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 11:18

General

  • Target

    ad2f7d31-61de-4b81-565f-08dbea1ef17f/0990da3c-5bde-ce87-ec4d-65df4e1dcb5e.eml

  • Size

    13KB

  • MD5

    b4ebbeec5857afbe96850c232acd7970

  • SHA1

    b69af7c15923d2493ea8b12f40a3f47298822937

  • SHA256

    9200451fa114f1439482d7b239e81bb5b224f037477eea96d30105912185eed3

  • SHA512

    fb6ab1e4d087750e8b97b9c30794b496c82c6dc3072d96c45f9790112b8ce57280964d6cf4441d928356f041954164f29be805c2998c04045dd3245234bc5cf7

  • SSDEEP

    384:3eEF7rdGqCvgUacZIW9OmB29bue+09dJvW1pZnRnEnYhS:uEFPIqCzZOmBsbue+09dI1LnRnEYhS

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\ad2f7d31-61de-4b81-565f-08dbea1ef17f\0990da3c-5bde-ce87-ec4d-65df4e1dcb5e.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://mandrillapp.com/track/click/30702553/extranet-acm-supply.gem-saas.com?p=eyJzIjoiSzJMcGRSX3RUWTUyTk9mdnpINWowQWV6eWs4IiwidiI6MSwicCI6IntcInVcIjozMDcwMjU1MyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2V4dHJhbmV0LWFjbS1zdXBwbHkuZ2VtLXNhYXMuY29tXFxcL2xvZ2luXFxcLz90YWI9Y29kZSZjb2RlPXVqQzh0SGNjeXJtWkJjTWxVUk9pNW1Vbk5cIixcImlkXCI6XCI4MmNiYjRhNzEwOGM0NjNiOTViYTg5YmJhMjhiNTFhMVwiLFwidXJsX2lkc1wiOltcImI1MDcxZTkwOGJiYTIyNDRiMDAwMzU1YWRkYjU4ZjMzY2M0OGRiNTRcIl19In0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54b7aa54881f9ed64319d2f01c991b51

    SHA1

    3a61d9c597b7be0ebb06bded0c9590c590dc4d7f

    SHA256

    9206bbce3075ce48ad1b61418a8170399134dd69fca8a446b838c8727bd62244

    SHA512

    35c5d6b8edfed2c6cc3ed99df1b11aa4eadd39638b2a4d8e1f90bb7a0096b0a3d766e27595fb93041061bb15dade203a07ce5aebd37955a0e815c70cfcb93e9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec4337addd4c7fd06149fabb3e413806

    SHA1

    6a3195cf5042fa722a95c5ee741c6d9404987b6c

    SHA256

    df5132f55f8e9af9d948adf5b1bf8fee5a6676d470e774d32f91f1ae701e5b66

    SHA512

    5afe4377d8513d35fc022380c9dd37c9ddb1f4c3276a22782af989bb787d8fffb02441c796d584db363a998c6538089b3c514c7fd4ca20b297b716da6ba5152a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e968a20ff1e7beb755f8c5830636413

    SHA1

    d6fb4fd923e2f3e8cf213438c5d1c4ebbc9bbf53

    SHA256

    f880cf2ffb02720d9fe18aa0f814c2ef75e74f8907dd11c6890415c42294730e

    SHA512

    2d5c563b2340901a149181594cae30e73521b2402ec9040bc0917ac910c860e0f7c9f242cb94dcc9370ddd69ee7b3a8e7caf5605547e1a6197c5da2e71ddf452

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7fbb9b04953e2ff21509dae1ce5c10ef

    SHA1

    e088988e6c22a3901ce9c9a59fc313b440e1985f

    SHA256

    2b3ffdc868e195583708e8a83a454ce277434560ffe0adacfacaacbef572588e

    SHA512

    ce3699268cdebbac13ad39e0fce12b25d84445c1ee64a36871b0c9ffa92a0cb1f94376e367d02de0b1d54e86fc4643d7a49bee42df27234043d56349dadf108b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33c600a7119d02a135da53883cdd044f

    SHA1

    f9579b3b86e6e09ad8e987104c795ca24fe1f378

    SHA256

    7158ed02575e12caf35684b43c6462409a099bbf36923fef6fdf285c8a69f46f

    SHA512

    c0767882d4d6d36c244c843242b60dd03ac86983f06bf83462336c26957b2a58b5150acc7ab51641a3b27421673fd3d7f56b5ea42c957ef49dd47ee5cf540f06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7465b6b3b472c74f111026d6d837ce90

    SHA1

    10d5420bc62420c055b1dbccda0c8bebfc131cd1

    SHA256

    02bd18c780c91e69d95151a2326ae0448d1daa026f050ff8246e3cf7ff3b5d86

    SHA512

    a53ddfefc0da57838fef4095a378b0016f927cfe2f212c372a615a0cdfc5eddc352f96db98f5e30c1a4f8fbdcd6e62e3776613ce0a3c5d212a8ea4e5ddd70f59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bf03a796f3bec8466d0ef3c354f9cf3

    SHA1

    f1b7a4bea47b92ac0e2e4ac574ff36acc8dc9e05

    SHA256

    19544678a5e88338269a53555e6fd37d79dea112ca9797b76a626537daf34e2b

    SHA512

    f3f12d9afb6c1f5629f5b77f126a7b61837c3306f006b4a2fdcfe6e20e27170eb5a3c7871d19865fd7d3d96ef963680577f696d3e1f296204b88c398598228fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b9f71f7f4528777d77d35775264aef2

    SHA1

    b56fa48de5940217750ee99aa61bb8f775bde164

    SHA256

    9803eca6c242577565f3285217f3f71255003756a187a87fd9f09eff1821dee5

    SHA512

    155d8a52f5b744ad60f5566e1fb8aeb0d25fdc1ab24791973b7d18351c06d71ba5abcfcd4870550ea1a0a78bd085389e3bbb0e346735873504fb2f8e74838340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77e111c7629ef06e2e52b34b6d6f8c28

    SHA1

    09f6d55cfb9220f14f1dc6ed96c26b0d4128e2ec

    SHA256

    0e368bcbed00dea597aa45e1fbc77712e5eae196da3a0ae8734a1193e3060c6b

    SHA512

    d24d071c621cf62d9b133148ab95496ca36cb9ab9c442b3bb3a43378b0eaa429f60bb77a4b2396b1a8cbf68be577de54f00be327fd4efeed52a3353ead573a20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8491d1d0f32354bc79539f347a1e42c4

    SHA1

    c4b37d7745843dfb20be144b5fdf2fde7a98eec4

    SHA256

    4e0cf3b7e14a8743b5253bc03a7fa14123616571f2b1ea55f44ee7223e24a5cf

    SHA512

    80a94316d4420830fcfac776fbbad803f867c1a90b65a4e1a9697fd9e19c7250cd272e7fd61feda90cacadb55a19f8e213f887da8010110d4556427d453f9507

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96b04bca2c89d3e6559b791327590f18

    SHA1

    a774aa0e651486e97b2b4f1ddd5432bc9c5b96bd

    SHA256

    d84be7909e835602ecd4a8fb2ada0d418687ded72cdfdf439df8401b9ece2160

    SHA512

    3c758496d4d597c8f7d0957d50304b4472d823cc196ad2c780832bc444c47046767931e7e2ea98cbeb22d1f261827f7b2f8cc02cc997e59984ed19a88b17e41e

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    a0b4bce285c327399c17c3f52c6e9f65

    SHA1

    60de7f03c7279eeb76125d7bd9e2473fc1783013

    SHA256

    0bd40bf2660de9d293032ab55b96864f1ac7f3db729312266242dec7c11d55a8

    SHA512

    989d74d9e6d9e7d27c55eddf5adc86edfbec2ae90f766dd7169ee4c313235cf7fc20a67797c03f6b29cf9692ba934e4fba4a2388f9591010c494932644e6050b

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    a0b4bce285c327399c17c3f52c6e9f65

    SHA1

    60de7f03c7279eeb76125d7bd9e2473fc1783013

    SHA256

    0bd40bf2660de9d293032ab55b96864f1ac7f3db729312266242dec7c11d55a8

    SHA512

    989d74d9e6d9e7d27c55eddf5adc86edfbec2ae90f766dd7169ee4c313235cf7fc20a67797c03f6b29cf9692ba934e4fba4a2388f9591010c494932644e6050b

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    81917546459d4ebc7b112525b11e2fc0

    SHA1

    ff8f53c2c0333511b618ec00d17953ad9281fce7

    SHA256

    2cb41b20de873c886bf210318cd7aaaea21fabf3b27dfebbfa2209f3ce1e5e38

    SHA512

    42a41ebd5c349a56111ea7c390484e4c2ec1c3edc5857e6ab12c195662787b7432a45895c8693d7c3d9a758b29e30de48ba4dc1d749432e4f29924c3e03cec2e

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G7K4BN0H\favicon-jo[1].htm

    Filesize

    7KB

    MD5

    a28544055c039f12cb502c81c4185297

    SHA1

    3c6cdb691021d2f5de708d44e0059240f4af69ee

    SHA256

    55aad45454698543fb094568dad57200810572f6f4e617c21bb9d5867dbea5d0

    SHA512

    f40054e72d4f4aeaaaea21bcf23cf0f21f619cc5569ea343498bfa53f11e2a6ee7ceb71aa7fe2688edd54b7c12d72412dc34f4856d0d889f657f7d74a697d211

  • C:\Users\Admin\AppData\Local\Temp\CabB35C.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarB35B.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\{A190C957-E178-4315-99CA-0863181434A2}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2200-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2200-1-0x000000007323D000-0x0000000073248000-memory.dmp

    Filesize

    44KB

  • memory/2200-162-0x0000000069111000-0x0000000069112000-memory.dmp

    Filesize

    4KB

  • memory/2200-194-0x000000007323D000-0x0000000073248000-memory.dmp

    Filesize

    44KB

  • memory/2200-748-0x000000000DE70000-0x000000000DFA6000-memory.dmp

    Filesize

    1.2MB