Analysis

  • max time kernel
    185s
  • max time network
    261s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 18:53

General

  • Target

    a1s-root1=email_banfield_2024_01_24_18_SMTP-att-1-4TKsFW22b9zsRb6-2024-01-24T18_00_47.eml

  • Size

    49KB

  • MD5

    a17092b8af5a3f23423e5f69386de142

  • SHA1

    b050e9cf9c46192b4f509ecf585ec081b7a25266

  • SHA256

    eaccca860db7601ec9dd272f4dc5208bda6da66efc460027a937ad865a3709db

  • SHA512

    268a4020e40219efad250dbd4294d46d44139287bc69f335543fdb83dfad6e9f9b1163fb66ac372bdaa2b9288f06205812c67289c7f2cedbd3a30fbb8ce88657

  • SSDEEP

    768:3mur5OOI04W6nfu3C+LusP1wHPTHBcx97YIUWjeqTQM54+KKk2KPjJ6CHHHHHvbH:3mu4Of4W6fuIsGHPTXPjdY0yxFFqOhW

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\a1s-root1=email_banfield_2024_01_24_18_SMTP-att-1-4TKsFW22b9zsRb6-2024-01-24T18_00_47.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1680
    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"
      2⤵
        PID:3040
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65f9758,0x7fef65f9768,0x7fef65f9778
        2⤵
          PID:1724
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:2
          2⤵
            PID:2956
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:8
            2⤵
              PID:1132
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:8
              2⤵
                PID:2900
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:1
                2⤵
                  PID:1988
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:1
                  2⤵
                    PID:2384
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1496 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:2
                    2⤵
                      PID:2024
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2260 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:1
                      2⤵
                        PID:1636
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:8
                        2⤵
                          PID:1440
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:8
                          2⤵
                            PID:2044
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3684 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:8
                            2⤵
                              PID:444
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:2656

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8528809a-7214-490f-b234-be6d5c4db48c.tmp

                              Filesize

                              5KB

                              MD5

                              1c04cba21169dcca1de7643857c3836a

                              SHA1

                              5e6e2af99b6099015db85a2342372457082e60b8

                              SHA256

                              25b4c0229ad7ef8ea7749045bb44e5ed92411f28b8ca3b5b9b26204b839c2083

                              SHA512

                              9bf58d5a6c70d92ec7de477a4f60905b2b43e78170c5e1bfc880e218f37200a7b8abc9a23cec7fdd8319554d96d66e7059c23f98fd9b795ccd2ce919f181d41e

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                              Filesize

                              16B

                              MD5

                              aefd77f47fb84fae5ea194496b44c67a

                              SHA1

                              dcfbb6a5b8d05662c4858664f81693bb7f803b82

                              SHA256

                              4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                              SHA512

                              b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              80470a03948fe66eb61d2ff52959c28d

                              SHA1

                              ae53eca4412339e2517291c99a5fb3d5a5a7d320

                              SHA256

                              007d5c6aef7aa79dd02a46f60eaa0283a6a3d4009e45c3a508cac184844d5a80

                              SHA512

                              2beec5bb3b01a35523a083d39ae37c2eb317be62e793dfda7c281dd3587ea3856dc6cc4e81f29605ec41a169394cdc9b3de889bb61dd8832ff1b3349802a5d32

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              ebfc9faa01f0c0520a3822262ad940be

                              SHA1

                              eaa34573838a4f8bd7156cc0ac13790af4cf4137

                              SHA256

                              991bfb299bb91e8b8813bc47c7b8a871f4743c6889b55a0f0c98cf7ec85a6ce3

                              SHA512

                              c0a9f74fd3b8ff63b8a1cb52ce18db63ddb4229924867a79ebd2209afd20ea5a49bfd5be4bf4e60f6f6e6bb18f70c4d64b98878358d970fa44128f5c1a4d430b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                              Filesize

                              16B

                              MD5

                              18e723571b00fb1694a3bad6c78e4054

                              SHA1

                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                              SHA256

                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                              SHA512

                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                            • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

                              Filesize

                              240KB

                              MD5

                              d0530a8265e2c4f62c3fc12e057be026

                              SHA1

                              3df041ee8829c9505cec7cf4a677806edb11c562

                              SHA256

                              abd0d6ea223a2467abc7b63cd9a477076d92fa4d4fe9caad71e73d6e1a38ba6e

                              SHA512

                              a57757e6d4e283c3c06679cfd2f7f18a0f2b8d94ff15d76a668c724b670139af75e4feefe60340fc901406eb80f452f3ebb6d98b5058f2061c10bdb1405b1c57

                            • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

                              Filesize

                              230KB

                              MD5

                              cc6870a28af73bbf08772e0c241a29ce

                              SHA1

                              6f2c41ef3642449d7a6604e80b352e5582fe53de

                              SHA256

                              738969f1dffd540506a4becd57ecd4e1ae52921b4f83b927c31984660ddc261d

                              SHA512

                              abefeef5e9b0eb71c12ddbbb5bf2e9fc44c4a1a1289ffe30f85c24570754982f51f66f4d1544d39bc683312565569f735e6fa0d056321583e3032eedb17426ea

                            • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

                              Filesize

                              1KB

                              MD5

                              48dd6cae43ce26b992c35799fcd76898

                              SHA1

                              8e600544df0250da7d634599ce6ee50da11c0355

                              SHA256

                              7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

                              SHA512

                              c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

                            • C:\Users\Admin\AppData\Local\Temp\{2EBC5AC7-E7B2-409E-AF4A-101570E818E4}.html

                              Filesize

                              6KB

                              MD5

                              adf3db405fe75820ba7ddc92dc3c54fb

                              SHA1

                              af664360e136fd5af829fd7f297eb493a2928d60

                              SHA256

                              4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

                              SHA512

                              69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

                            • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                              Filesize

                              2B

                              MD5

                              f3b25701fe362ec84616a93a45ce9998

                              SHA1

                              d62636d8caec13f04e28442a0a6fa1afeb024bbb

                              SHA256

                              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                              SHA512

                              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                            • memory/1680-196-0x00000000731CD000-0x00000000731D8000-memory.dmp

                              Filesize

                              44KB

                            • memory/1680-164-0x0000000068FD1000-0x0000000068FD2000-memory.dmp

                              Filesize

                              4KB

                            • memory/1680-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

                              Filesize

                              64KB

                            • memory/1680-1-0x00000000731CD000-0x00000000731D8000-memory.dmp

                              Filesize

                              44KB