Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2024 15:41

General

  • Target

    891855209;HOSPITAL SAN VICENTE DE PAUL DE PAIPA;437573;01;HOSPITAL SAN VICENTE DE PAUL DE PAIPA.eml

  • Size

    118KB

  • MD5

    957f2fb889e01ae0ddf14350d0f55105

  • SHA1

    a21f8b26a30c413cee29acce4ae209059bb65ffb

  • SHA256

    7f1bee27bc569a8ff8fc9c56b028bb0081bd0f5848e2880a0a5b2fd804209192

  • SHA512

    ad98d4de4b2e4a55bf106e7982d96160034c5b627d839dc1b2b9fed5ef05272b5444064c6be0e347c953c0780291475b60acbf5cf8f9fe481d48f75c224a47b3

  • SSDEEP

    3072:CzV+3DXkpllaMRyA5xav5zK6S0WQD7dp6Pvzdyw2MqM0b:gpll5kzQQdpgzMKK

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\891855209;HOSPITAL SAN VICENTE DE PAUL DE PAIPA;437573;01;HOSPITAL SAN VICENTE DE PAUL DE PAIPA.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1764
  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_z0891855209023241641437573.zip\fv0891855209023241641437573.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2840
  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Temp1_z0891855209023241641437573.zip\ad0891855209023241641437573.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    8646eb3cbca85bff9a80d1e676e99f64

    SHA1

    d55d7c7cb4b0be1ca5fb02d6ed3c7a53a4853bb7

    SHA256

    86189df9e12aed472a2e21a39032c93ec7591af7c4af62e1dc2d8a5687c18659

    SHA512

    8f45fe2e9c5679f5e23d5366ec6ca0040ff87d587eed240506169c92fc8a092d567c72a6c1d79ccf0da3407d68cb9111f4261885df7721778c061b5bf34f6ae7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5fb058638fe9abcaf76da97125dfee30

    SHA1

    fad923ca570bf34ff274ab9024f039b84bdd96cd

    SHA256

    0b8ff51fe663684328ca3e49199776b81746e1a13da1056c05d3e42b3429155a

    SHA512

    caa4e1805da8b7bc445135808381e37716c3f399205574ce1a2d1cd945c83e01f6d63228a99c6579d1decf4a1dbf61b20e8b1def49ebb8c7f55e73d3c5e5b2c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e6f02e1e1526fe90eb041a059279798

    SHA1

    a8c5e7a03e77b18a693eb93d40a7b077c33ea698

    SHA256

    047a7ed180444cc5fbaa844bf4328e8cfd0a66f1e3bf1544d04929c915effa89

    SHA512

    372b4d1169ab59ae2f06e1afc73b2d63f3073b4f15f53261b333aacdd5716aebfeb361d68941bfaba476107eb627b45ec319f4b48097746060dc75cfe87fee97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    995909e5abf0587115a1a9a5169acf4a

    SHA1

    a2e9d0f86220a18e54da8fe7aeaeecbaec777116

    SHA256

    fc816772c320f1ea4e3026d60ce0b7b1da5519651c3483bfdf78828cf5f78792

    SHA512

    7a7670b8d8ecfb1e0dee5fa5d7f302c1d1f196ff3ed2384538d0fa90d9d977f81aeb4c06003287851e698dc961fb4fce2830df411309389fa6219732f73e9c4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c67205883ca47af3bd041176924ba00

    SHA1

    7aead1f98e1dde775cd2a5bebee1fa7d3161ba7e

    SHA256

    3d5634d6f3d0b1d7a693cf3a12a570814d5d8e7f46b35adadf916e1f3114b49f

    SHA512

    c1a9c1c5348c5731af6395db77e45e8cfa3844ae1ce7b3dd4598708a863e339f1d264df3d254311f08c48fd561bdb42cbcb32d9d0e6f00aaa165c380bdb05d42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2efff879a9b2571419b9358f3874b917

    SHA1

    856ced4dcbd72138e60d88977208d2900841c082

    SHA256

    7b2517f2f7985170923f231e39e9f3b5c4ec3f41e6340f97bf6eebbbece49b83

    SHA512

    0281717ee6d247f5bef892b6d54477c23c6229a7cc4fdd6115bb34aad2d509113a39c92d4d009457a02eb539435eaa3fa5008c248433e720ba9d79dd4899b49f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8cb00e97ab269d043a333b02793adcf6

    SHA1

    cfa57331956fbd0fca8fc801cb9fd8501c5fc4d3

    SHA256

    7f7480c4687fa690ee1a3e165bdbd45cd4055928b183e1818566d7ff909e4ae4

    SHA512

    cbf584059fb80baffe5c9780662ccffac1446f43d91d681f066520f9c9a15fef9ac8503a18c686dbd064c2a845fa2987085851a3c2457e564fdc022a2cebc0b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47d5672b6099c88df7b278eb538bdb5f

    SHA1

    460b6bf68692bbae3a1484ab1ea26bb0dbe4a042

    SHA256

    4c3889c8eb6df0cc04a2c535070a351b4b19ed1e44efbe8081b588b3b89d8b4f

    SHA512

    d5ede908bf6fcc28bb71d5f1a3373bbbdc1a627a946f31c8d65ea42f3ac6b519223e71c97e2e7ae48ed8a9dd5cb278eac21bdbe7de619e11788bba4fe93a3c19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b57f282e037782e68067d8486bb53b3

    SHA1

    4e468c7252c2131579eaad573138b37b96a9c9da

    SHA256

    c69010dcf3111aef6ac20f111ebcc8fd6cb2c7a1a9349a2b8a856fe1ca1ddcf2

    SHA512

    d193c46665bb338995359132847296dd23f9d73410da1a4ea81b080a335990633c800e2047f31e6c94278d87795ce6ef1305e18bee14a4da653d4f3c04f14370

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f3d6d829ff24b2f4aebdb09c1fc8bce

    SHA1

    29281af363104252e6a042dc517095c48fc4204b

    SHA256

    c095e34f2db22e4f825771dd8ee4155f38ddc425d59b66be03f69ba44b852ef7

    SHA512

    fe3ad27c240c5d5d6b09e48d2ff3d9e852f0a87465ce0101fed25eefd01b5ec39dd4285d50b13f25d32093336e12c8ba6353549d743d9c6532b0bf6fd1dfc424

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a79c7e069372fc5430f6682013ee72f

    SHA1

    543c18d68d0d45f1a9b3935086be6276b24d4a11

    SHA256

    2a2ad92899071ba0f120680a0d042d75cee0677a5297659a09d51259794ca82d

    SHA512

    fb2c0013e9320df9e67b07865f384dd05e7516d5c16be74f20677a5a7d1cf69539f9dcbabe1c7d5823e1cd440ef2ff7bf1b5aab8f183c703cdc1ccd79bd979de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    8166d635fa73e811db0defd3c6df5654

    SHA1

    9c4acfa60ba0ca64921ff725236a451a6211e13e

    SHA256

    945b63bb85a095f474fae46b1993fd6bcdec0771ef7612d17c4904147ca70f9d

    SHA512

    db5bb0a027dc4de77e41e39d2b7409531bdc6454722e10b77b330a2ecf71a7661f7d15b4768ebd323ae0a4d5c29d938382bcea759eb5d5fd84d1ab935145f839

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    235KB

    MD5

    d04ecafb1023b124a30ff61e352d4818

    SHA1

    14aea08c422f68f9c911da37ddbcb7e83b249d6b

    SHA256

    0f1bc621692681f6733fb393f32290bd6fcdd029555f22b88dc7b026c69cc382

    SHA512

    851208e7836182692c20a1c714537d4a56f433bb1f65767f072d6df5b69ddbe3a28dbe3ee1205c0cc978d21700d805bbd0694b784bb69871671e79e2b7732f54

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\80873CE0.tmp

    Filesize

    4B

    MD5

    f1d3ff8443297732862df21dc4e57262

    SHA1

    9069ca78e7450a285173431b3e52c5c25299e473

    SHA256

    df3f619804a92fdb4057192dc43dd748ea778adc52bc498ce80524c014b81119

    SHA512

    ec2d57691d9b2d40182ac565032054b7d784ba96b18bcb5be0bb4e70e3fb041eff582c8af66ee50256539f2181d7f9e53627c0189da7e75a4d5ef10ea93b20b3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\9FXETYME\z0891855209023241641437573.zip

    Filesize

    69KB

    MD5

    6c7208db84ddf6513c2860e6968ede75

    SHA1

    70190044a6aae5293748ee6b38ce4339e717cfb1

    SHA256

    27d203e6cbbd6d549f7c30ccf0532e51b0342e4f65cf751a941b29cb41f2b4bd

    SHA512

    7c96f9e9598593d45355fdd0e0956d8e889275af49c2a3cbbdf032a296dc6a4151836f404bd6d01c483b72fe8c47a18e2091461d4ccd4fcecd9c8ca077cc7aaa

  • C:\Users\Admin\AppData\Local\Temp\Cab3F25.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3F76.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\{B5F33654-C361-40E7-8FB7-825730994675}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0d1d2896781c58d02daf13199be94479

    SHA1

    26f06661952854acc3734c9e5a106c203bfbe5a8

    SHA256

    add6d0d27fe2f2d83d7d5377dde702cbb8a01909aa8cac77b4582cc453c4fd2e

    SHA512

    163cd89e48ed661b3a11bb03c5ae8f67cc3b659554b3d98365c62690717e333abcd2ddd26937d5a86f07397cdbc7df5a5f7428bf4807ed606c74dfcddd8b0ab0

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1764-168-0x0000000068551000-0x0000000068552000-memory.dmp

    Filesize

    4KB

  • memory/1764-1-0x000000007324D000-0x0000000073258000-memory.dmp

    Filesize

    44KB

  • memory/1764-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1764-124-0x000000007324D000-0x0000000073258000-memory.dmp

    Filesize

    44KB

  • memory/1764-200-0x000000000D5A0000-0x000000000D818000-memory.dmp

    Filesize

    2.5MB