Resubmissions

12/01/2024, 13:14

240112-qg1c2shdb4 5

12/01/2024, 13:02

240112-qaa5ksgdfl 5

12/01/2024, 08:15

240112-j5sjsadbf3 5

Analysis

  • max time kernel
    318s
  • max time network
    318s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 13:02

General

  • Target

    E70FACBE-0E46-C106-89E7-F94D9FEC5190.eml

  • Size

    711KB

  • MD5

    c732a01bc1e068fa27a8039e83ef4e42

  • SHA1

    726f518b2b48c38b27346448a07d474d0f2764fb

  • SHA256

    931f5de97cb5f2d57d0158c65a3ce50b51e7f1cabbfb4b1d004b88be1c6de2f1

  • SHA512

    e7bc499f17cca54650e1474279e0e73b0c06884e502f63093570ee2a157244a79f14b73e416c37a20f8b41d7258328d0c55a35a94fbf5247c4ca74bec34be25a

  • SSDEEP

    6144:ZCaV/AES4KtFajaPEzjXZdW35JrmlWWpI5/Tq1JUM0S/LMGeDhPos5:AZRu+mlWWpKu0S/LMDDhPf5

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 51 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\E70FACBE-0E46-C106-89E7-F94D9FEC5190.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
      2⤵
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:1336
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
      PID:2876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      53ad7d1bde3f5e59ae310b55b1d89933

      SHA1

      275a240fe2dd6a1cc4f73db1c915e272a365e516

      SHA256

      ba057aee3c789753a97312b401d95632d54a8f18fa101a22aba4cfdff1d1983b

      SHA512

      d8956e8c9ee6dd8db40a3fb71ec0ace69a331ab47298fa7f81f3dc41c244b359e9ae95c0ef7ea6569f4f7c913018859c2f65c596dee91156ffe305cf458fef1c

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      5e72b26aa2f2e74741d95f985073f875

      SHA1

      e49f900e70ab8eaee6ce2cfec8f6ef5fe6779209

      SHA256

      1fde0e6c9033e28fff9c33af36a6d5dda56c2c502881f4d119d7b3f1a84d3929

      SHA512

      56e9142288c71f254c109f5c356a378d45216925c36ecbbfeaf8b80bdbdd994d423b5a74ebc1f9bfe419ada06623509617b4415da678b26f954bd138eb9f1e7d

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      551b5abaa9f87764b86ef5b57dff7a64

      SHA1

      a637b31b4ea32fd456c0dd6202685e5851a47f2f

      SHA256

      af12743411ca55ba53c4eb94aeac5fa5d68ea6efeea7f6bed970315f6b19ccb7

      SHA512

      77e382ce944ac7c18a68f5e39af83de88339fe9e61592b8f6d1b089b165a9353cc8b1b8608b51a06bc5625b0bbe0e3d8b57ce599520ab8c434660c318a7f27d9

    • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

      Filesize

      1KB

      MD5

      48dd6cae43ce26b992c35799fcd76898

      SHA1

      8e600544df0250da7d634599ce6ee50da11c0355

      SHA256

      7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

      SHA512

      c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\0T6CV3TE\HÇ-AC Ekm-Oct 2023.xls

      Filesize

      49KB

      MD5

      edd20db318007b1317dd2a9f0af68257

      SHA1

      54de4b361281e2772e953dcee6763c13e4d73079

      SHA256

      c084d5b6d0a577f2e4c98e7e3665e26907eb96779fecf481c0b7b20290035c2a

      SHA512

      0e09bf5c7994202a93cf9f5b951c35b19ae6ff9416262b21bb4856d34dcabae08c0f46c0de523897ef875f647087a6f10741412458656c92bd6e252804fc9005

    • C:\Users\Admin\AppData\Local\Temp\{64BFB67D-CD4C-46BC-B076-BF9FDCBAF93C}.html

      Filesize

      6KB

      MD5

      adf3db405fe75820ba7ddc92dc3c54fb

      SHA1

      af664360e136fd5af829fd7f297eb493a2928d60

      SHA256

      4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

      SHA512

      69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1336-214-0x000000007358D000-0x0000000073598000-memory.dmp

      Filesize

      44KB

    • memory/1336-216-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1336-217-0x000000007358D000-0x0000000073598000-memory.dmp

      Filesize

      44KB

    • memory/1944-1-0x000000007358D000-0x0000000073598000-memory.dmp

      Filesize

      44KB

    • memory/1944-193-0x000000007358D000-0x0000000073598000-memory.dmp

      Filesize

      44KB

    • memory/1944-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB