Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 12:07

General

  • Target

    Invoice MKN 2341740974 V118674.msg

  • Size

    96KB

  • MD5

    401f648c5c2b8c4adf1c7c0d6626a36e

  • SHA1

    b818b3229b56bb7a22fa7cc1506a31fb13148f45

  • SHA256

    c6d0446a164e1e8ea952d2340dcecd1c32308ea9db7e97c409d1f0000c5174d9

  • SHA512

    adf37c2806c45e29f0d978d94665f404f42bbc5462f4f5bc0dcc3402b7f5a8753c80806fe6adcb62176f7d8d7ce8be825869e2295df0a35b2bc623f251b8ec15

  • SSDEEP

    1536:6PWcWlWKTWKgWNWqUQNZU7x14X9R5cFGxY6:6+V1UQNZU7D4X9R5cJ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\Invoice MKN 2341740974 V118674.msg"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://crayoncolorsinc.uk/gd.PDF
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    d0ed5b19c53bd01683dc0ecb6ff2f487

    SHA1

    80cfff2864fd2470aa944b0d256afa3334aa1e1d

    SHA256

    5e221fe6973db9c37a95d42b73dc07779d8292de83a632aba1155d459fcf1fdc

    SHA512

    4c6e9bd60035b59cd30d9d6633d44ce680407a92442b87be6c94dfabcade40b9ef04d48ee7b419de570d906f3c44b382adae42de1092c41aeb001e1948edbbc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    091d5e6012891f84eaa749ef732a6c40

    SHA1

    c4dae59e185556b244b85c7c2d85ecc257a142b8

    SHA256

    32690d3b9c3a36430bb9dd16b9f263c9adc523ab23e2d774da9dd8cc7a2673fe

    SHA512

    a06865ef709c424ab6c05156c77828fb3e412d4edd74fcc21cb1d32e46652e884c2af2bbc4e1e7e72b647fe8e4bd2c1efbd215cef58175e8bbb5579d60edd0f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d67be2423936dd46a404ba4c943cb2dc

    SHA1

    8d2c9d17764f046175a4c53a6775564614a076ec

    SHA256

    173aa9b754ac34f1938f35449cdea478b2e99de89de68656df6ace60fcd6c7bb

    SHA512

    7071aa1e495e4c027e1b84a1d32cbb0e8d6a50e6c1c423371cbb47bef816ff376a0a7633f8e835015f6423d7d4469c1add9f17748b566d01f5a6153728ce564e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c4ad9d32822341349fe6fbd386d69306

    SHA1

    1daf134f7ae0db585c5553140288e8cfabaf2ad4

    SHA256

    5f9b8c5e7d695c1e096c70b90a09dda114d893532c6d73a6172c263a4ae375ab

    SHA512

    c4d7ab532c8d3b4cd4e8295aeb539d776c8d9ad20f29bf3224ce6e9bbd342314b452d2ca0cdc682499a65b90abc973b2b16733aeb96cb46bf521e0a94f8a2fde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f056f3d7c4ce4a3bcbfa8142b2cc6c34

    SHA1

    e38ed1ea840bff1c508891a0ee7e930e8ae15f45

    SHA256

    2e8ee8b4c668cb406514531a6df063305a744016d4c4cbbbe71e8d00b9f5105b

    SHA512

    bbb4c283515548db23bb0d29545db9a77797b411a64ade5c433635845073eff24929bcfc846c6083a0f0da526d571fa7f95c538a454f686ea0bc97e59e3f9895

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ede9ba0d2760ff8aa386c9c88cfbb093

    SHA1

    02a8ac39e4e62464d6d44e75a21477506cae1ae2

    SHA256

    86e0e645f6991281d158fedb043647675eea38d1eb414367572c7b563eb24c63

    SHA512

    80902e8593c7506a2fc1236dc9ade426dae1acf1127a69c57b30abe080fc30608f83e167e97eb2f0e27f11006b9b8c0163ab836a604691f81bbf2d861f0bda9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82ba729ebe476dd00e6e7b5a27a52818

    SHA1

    7d6424ec4aa848bdc5426b9300f67740ec57d649

    SHA256

    a28f9806dcae7ecd5076232fc5644040356f03ff320d281d74c95b3b4608313e

    SHA512

    7591eb9d5f2f0353fcab12ea67ae3ce1e7904f0485e1eeeb2a8a706dc2ac4c4beaacbbba81e558efc45f711f5ca5c5406e8797cb474001a38fa333495e80ac60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34fbf5252d9cbf2b1062e3b709631f9b

    SHA1

    997d82edd392a93bac669fdd8a2d16feb9cf1e83

    SHA256

    9996fb796fd290f7a81f6dca5a97457aeac98c92ae86be824cbb9c6c40df035e

    SHA512

    d2a0c815a7af2e07c6dce472bd2d735102de69f85faabbd2385b96d94861cbc1ce9012358025cc559e0d19e1b53a5172fd200afd80695c5b564d887e7cdb774e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc87a7591e1858ee1e196c1fb7517fc2

    SHA1

    ede0f7e50da532878788245622b46a398bf9e1b4

    SHA256

    e27d0683777e6e82a72b80510b8a04e26dc13f2e22e23c332a7a85ce8feff8a0

    SHA512

    0806d3e730a86a1d343f4789ec772a1eb8ba44b387b3feb908ba3ae658d59f8b87b5329ec633b69cb6f543ec4706d00a7e82b54de7cd7b4c694e3ad22772decc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2079fdd4ff571f3a4a50237afbdf3a6b

    SHA1

    f80f9c5aefd3c3b031abe5311402a0cf5bef4018

    SHA256

    32c60b2eb5229bc0d3e05a736e1d3ebde8446f33a5baa0b434b52c7d096d6ee6

    SHA512

    146f0ef4d81b1ee88bb308c4f413753e76435064ff3c232a5803fac663655e3c755562c7eedb6e604fe65d1495baf25f6e0177ad3bebc105d74c893772ef8495

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    f52b7e4c42e948178b49edec3e1fe502

    SHA1

    1eda824f27ff42300cea2b0ddeeb37bd399793b4

    SHA256

    5f8b7c840bcf8a32068da6adc952359099fa4606206a3876a9a9a051e4e0c02d

    SHA512

    5faaaab8e1f52411d17a1e0fdcf863776b28d48d16870e0e7f196af995d68fc6d2b8b72f6a769dcaf7dc0423cf51dabe6f6f7611e2f2e1ec8915c422ee435461

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    8b76996530548a8ea5b314c452d62bb6

    SHA1

    d6e010425369fa81a110adf5ad43b57baeb01f82

    SHA256

    6ccd00f8e9e3497b10d189c66216e0726972f6718b5f991037f4cb5a86eb682c

    SHA512

    20f5017f86c12fe0c388599ed4d0d69847a6f1ed0e31a139a168984f1a20014d00b9ed7b3bbf83a1f6af9517827e66dcc8ebd29cc69f0e669235b4bb225996b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Temp\Tar6B36.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • C:\Users\Admin\AppData\Local\Temp\{3966EC89-4D12-4C11-B354-4E091E5D4E8A}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/780-197-0x000000007315D000-0x0000000073168000-memory.dmp

    Filesize

    44KB

  • memory/780-816-0x0000000008F60000-0x0000000009034000-memory.dmp

    Filesize

    848KB

  • memory/780-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/780-161-0x00000000690E1000-0x00000000690E2000-memory.dmp

    Filesize

    4KB

  • memory/780-1-0x000000007315D000-0x0000000073168000-memory.dmp

    Filesize

    44KB