Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 18:27

General

  • Target

    Payment Copy.eml

  • Size

    2KB

  • MD5

    7594f057487ee84717dbf0a6e7020805

  • SHA1

    fb30b79415581d2dfa9362be725676e71a64671d

  • SHA256

    7649652c7a2e3d61616c538325cce6a04c3726c22b027f65023cafce6c394a89

  • SHA512

    10c8407f84c6580212176e7d85e52ea60f86e48b2653f3d0b44fe843d9f08cfcbfa7c012b9598c2410774f822347cf9025f0ceae5adde0cba6a0c93f36f2e6ad

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Payment Copy.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    a53968298469db96f66e143a40981c17

    SHA1

    ebbcbe9ffebba64c80ea78867fa75736cd1b018e

    SHA256

    32d84c3ba418bc62d67566449473dd8af377f3f6f0cd99878771542fd6ccdd2e

    SHA512

    07a73a37b376e0cb649735a50780ada5dbc5a5ed6935c9ebcc9f59bd586e4059d92ba3fb0dfcdd1a5ddde53ac361eb639c2651968ff0a5b80eb15133fd8277b9

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\Outlook.sharing.xml.obi

    Filesize

    185B

    MD5

    ec704e439487853195459ccc8dfbb621

    SHA1

    4166b9873a515a7c75b097ecb4042e63bf9c3f52

    SHA256

    cfb85b79e92c0f719b25c4cc12a0d47120218d4c9537ed8b9998dd13aa458d50

    SHA512

    979e30655c757480704682a78fe8660a7d6ec32806492dc4d4219c89ebded1187cf6f3790e2bea666936851ff88e32bb2e3aaba622b13253cd8d42f1320094ab

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Temp\{D7018281-B2CF-4435-BB64-1707A1F62E2B}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\NormalEmail.dotm

    Filesize

    19KB

    MD5

    83ca44ad63cb70770b270a6bc70875ca

    SHA1

    a699586b83663bbd574394c949abba66ed48b0c3

    SHA256

    0405e974794d72d180650a266c364ee23ab09305c40c146596759a6384cb1d69

    SHA512

    7b30691c6dccf30b155e8b0ebe0ea3f7ce645334f5612f02a70d20de612d96ec320e7f8d429c14eb9b2d27f0503e7617dd635bb9a70b21d035a0e0b96564595f

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2340-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2340-1-0x000000007386D000-0x0000000073878000-memory.dmp

    Filesize

    44KB

  • memory/2340-130-0x000000007386D000-0x0000000073878000-memory.dmp

    Filesize

    44KB

  • memory/2340-171-0x00000000697D1000-0x00000000697D2000-memory.dmp

    Filesize

    4KB

  • memory/2340-224-0x000000007386D000-0x0000000073878000-memory.dmp

    Filesize

    44KB