Analysis

  • max time kernel
    74s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 11:18

General

  • Target

    ad2f7d31-61de-4b81-565f-08dbea1ef17f/0990da3c-5bde-ce87-ec4d-65df4e1dcb5e.eml

  • Size

    13KB

  • MD5

    b4ebbeec5857afbe96850c232acd7970

  • SHA1

    b69af7c15923d2493ea8b12f40a3f47298822937

  • SHA256

    9200451fa114f1439482d7b239e81bb5b224f037477eea96d30105912185eed3

  • SHA512

    fb6ab1e4d087750e8b97b9c30794b496c82c6dc3072d96c45f9790112b8ce57280964d6cf4441d928356f041954164f29be805c2998c04045dd3245234bc5cf7

  • SSDEEP

    384:3eEF7rdGqCvgUacZIW9OmB29bue+09dJvW1pZnRnEnYhS:uEFPIqCzZOmBsbue+09dI1LnRnEYhS

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\ad2f7d31-61de-4b81-565f-08dbea1ef17f\0990da3c-5bde-ce87-ec4d-65df4e1dcb5e.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://mandrillapp.com/track/click/30702553/extranet-acm-supply.gem-saas.com?p=eyJzIjoiSzJMcGRSX3RUWTUyTk9mdnpINWowQWV6eWs4IiwidiI6MSwicCI6IntcInVcIjozMDcwMjU1MyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2V4dHJhbmV0LWFjbS1zdXBwbHkuZ2VtLXNhYXMuY29tXFxcL2xvZ2luXFxcLz90YWI9Y29kZSZjb2RlPXVqQzh0SGNjeXJtWkJjTWxVUk9pNW1Vbk5cIixcImlkXCI6XCI4MmNiYjRhNzEwOGM0NjNiOTViYTg5YmJhMjhiNTFhMVwiLFwidXJsX2lkc1wiOltcImI1MDcxZTkwOGJiYTIyNDRiMDAwMzU1YWRkYjU4ZjMzY2M0OGRiNTRcIl19In0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          54b7aa54881f9ed64319d2f01c991b51

          SHA1

          3a61d9c597b7be0ebb06bded0c9590c590dc4d7f

          SHA256

          9206bbce3075ce48ad1b61418a8170399134dd69fca8a446b838c8727bd62244

          SHA512

          35c5d6b8edfed2c6cc3ed99df1b11aa4eadd39638b2a4d8e1f90bb7a0096b0a3d766e27595fb93041061bb15dade203a07ce5aebd37955a0e815c70cfcb93e9b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ec4337addd4c7fd06149fabb3e413806

          SHA1

          6a3195cf5042fa722a95c5ee741c6d9404987b6c

          SHA256

          df5132f55f8e9af9d948adf5b1bf8fee5a6676d470e774d32f91f1ae701e5b66

          SHA512

          5afe4377d8513d35fc022380c9dd37c9ddb1f4c3276a22782af989bb787d8fffb02441c796d584db363a998c6538089b3c514c7fd4ca20b297b716da6ba5152a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7e968a20ff1e7beb755f8c5830636413

          SHA1

          d6fb4fd923e2f3e8cf213438c5d1c4ebbc9bbf53

          SHA256

          f880cf2ffb02720d9fe18aa0f814c2ef75e74f8907dd11c6890415c42294730e

          SHA512

          2d5c563b2340901a149181594cae30e73521b2402ec9040bc0917ac910c860e0f7c9f242cb94dcc9370ddd69ee7b3a8e7caf5605547e1a6197c5da2e71ddf452

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7fbb9b04953e2ff21509dae1ce5c10ef

          SHA1

          e088988e6c22a3901ce9c9a59fc313b440e1985f

          SHA256

          2b3ffdc868e195583708e8a83a454ce277434560ffe0adacfacaacbef572588e

          SHA512

          ce3699268cdebbac13ad39e0fce12b25d84445c1ee64a36871b0c9ffa92a0cb1f94376e367d02de0b1d54e86fc4643d7a49bee42df27234043d56349dadf108b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          33c600a7119d02a135da53883cdd044f

          SHA1

          f9579b3b86e6e09ad8e987104c795ca24fe1f378

          SHA256

          7158ed02575e12caf35684b43c6462409a099bbf36923fef6fdf285c8a69f46f

          SHA512

          c0767882d4d6d36c244c843242b60dd03ac86983f06bf83462336c26957b2a58b5150acc7ab51641a3b27421673fd3d7f56b5ea42c957ef49dd47ee5cf540f06

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7465b6b3b472c74f111026d6d837ce90

          SHA1

          10d5420bc62420c055b1dbccda0c8bebfc131cd1

          SHA256

          02bd18c780c91e69d95151a2326ae0448d1daa026f050ff8246e3cf7ff3b5d86

          SHA512

          a53ddfefc0da57838fef4095a378b0016f927cfe2f212c372a615a0cdfc5eddc352f96db98f5e30c1a4f8fbdcd6e62e3776613ce0a3c5d212a8ea4e5ddd70f59

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8bf03a796f3bec8466d0ef3c354f9cf3

          SHA1

          f1b7a4bea47b92ac0e2e4ac574ff36acc8dc9e05

          SHA256

          19544678a5e88338269a53555e6fd37d79dea112ca9797b76a626537daf34e2b

          SHA512

          f3f12d9afb6c1f5629f5b77f126a7b61837c3306f006b4a2fdcfe6e20e27170eb5a3c7871d19865fd7d3d96ef963680577f696d3e1f296204b88c398598228fd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7b9f71f7f4528777d77d35775264aef2

          SHA1

          b56fa48de5940217750ee99aa61bb8f775bde164

          SHA256

          9803eca6c242577565f3285217f3f71255003756a187a87fd9f09eff1821dee5

          SHA512

          155d8a52f5b744ad60f5566e1fb8aeb0d25fdc1ab24791973b7d18351c06d71ba5abcfcd4870550ea1a0a78bd085389e3bbb0e346735873504fb2f8e74838340

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          77e111c7629ef06e2e52b34b6d6f8c28

          SHA1

          09f6d55cfb9220f14f1dc6ed96c26b0d4128e2ec

          SHA256

          0e368bcbed00dea597aa45e1fbc77712e5eae196da3a0ae8734a1193e3060c6b

          SHA512

          d24d071c621cf62d9b133148ab95496ca36cb9ab9c442b3bb3a43378b0eaa429f60bb77a4b2396b1a8cbf68be577de54f00be327fd4efeed52a3353ead573a20

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8491d1d0f32354bc79539f347a1e42c4

          SHA1

          c4b37d7745843dfb20be144b5fdf2fde7a98eec4

          SHA256

          4e0cf3b7e14a8743b5253bc03a7fa14123616571f2b1ea55f44ee7223e24a5cf

          SHA512

          80a94316d4420830fcfac776fbbad803f867c1a90b65a4e1a9697fd9e19c7250cd272e7fd61feda90cacadb55a19f8e213f887da8010110d4556427d453f9507

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          96b04bca2c89d3e6559b791327590f18

          SHA1

          a774aa0e651486e97b2b4f1ddd5432bc9c5b96bd

          SHA256

          d84be7909e835602ecd4a8fb2ada0d418687ded72cdfdf439df8401b9ece2160

          SHA512

          3c758496d4d597c8f7d0957d50304b4472d823cc196ad2c780832bc444c47046767931e7e2ea98cbeb22d1f261827f7b2f8cc02cc997e59984ed19a88b17e41e

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          a0b4bce285c327399c17c3f52c6e9f65

          SHA1

          60de7f03c7279eeb76125d7bd9e2473fc1783013

          SHA256

          0bd40bf2660de9d293032ab55b96864f1ac7f3db729312266242dec7c11d55a8

          SHA512

          989d74d9e6d9e7d27c55eddf5adc86edfbec2ae90f766dd7169ee4c313235cf7fc20a67797c03f6b29cf9692ba934e4fba4a2388f9591010c494932644e6050b

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          a0b4bce285c327399c17c3f52c6e9f65

          SHA1

          60de7f03c7279eeb76125d7bd9e2473fc1783013

          SHA256

          0bd40bf2660de9d293032ab55b96864f1ac7f3db729312266242dec7c11d55a8

          SHA512

          989d74d9e6d9e7d27c55eddf5adc86edfbec2ae90f766dd7169ee4c313235cf7fc20a67797c03f6b29cf9692ba934e4fba4a2388f9591010c494932644e6050b

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          81917546459d4ebc7b112525b11e2fc0

          SHA1

          ff8f53c2c0333511b618ec00d17953ad9281fce7

          SHA256

          2cb41b20de873c886bf210318cd7aaaea21fabf3b27dfebbfa2209f3ce1e5e38

          SHA512

          42a41ebd5c349a56111ea7c390484e4c2ec1c3edc5857e6ab12c195662787b7432a45895c8693d7c3d9a758b29e30de48ba4dc1d749432e4f29924c3e03cec2e

        • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

          Filesize

          1KB

          MD5

          48dd6cae43ce26b992c35799fcd76898

          SHA1

          8e600544df0250da7d634599ce6ee50da11c0355

          SHA256

          7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

          SHA512

          c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G7K4BN0H\favicon-jo[1].htm

          Filesize

          7KB

          MD5

          a28544055c039f12cb502c81c4185297

          SHA1

          3c6cdb691021d2f5de708d44e0059240f4af69ee

          SHA256

          55aad45454698543fb094568dad57200810572f6f4e617c21bb9d5867dbea5d0

          SHA512

          f40054e72d4f4aeaaaea21bcf23cf0f21f619cc5569ea343498bfa53f11e2a6ee7ceb71aa7fe2688edd54b7c12d72412dc34f4856d0d889f657f7d74a697d211

        • C:\Users\Admin\AppData\Local\Temp\CabB35C.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\TarB35B.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

        • C:\Users\Admin\AppData\Local\Temp\{A190C957-E178-4315-99CA-0863181434A2}.html

          Filesize

          6KB

          MD5

          adf3db405fe75820ba7ddc92dc3c54fb

          SHA1

          af664360e136fd5af829fd7f297eb493a2928d60

          SHA256

          4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

          SHA512

          69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/2200-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2200-1-0x000000007323D000-0x0000000073248000-memory.dmp

          Filesize

          44KB

        • memory/2200-162-0x0000000069111000-0x0000000069112000-memory.dmp

          Filesize

          4KB

        • memory/2200-194-0x000000007323D000-0x0000000073248000-memory.dmp

          Filesize

          44KB

        • memory/2200-748-0x000000000DE70000-0x000000000DFA6000-memory.dmp

          Filesize

          1.2MB