Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 10:12

General

  • Target

    _[EXTERNAL] Bid Order.eml

  • Size

    47KB

  • MD5

    b98ead400732dcef1434c4e93d179d31

  • SHA1

    c9ec1425b060e577ae318bcd1fbf30cb9ba19e97

  • SHA256

    95cbd23cb39dbb739c5b1bcca8bd9b1a619394f1d01dd8292ac7b421c33ceb52

  • SHA512

    d55455ec93a3dddbaabbcb0fcdd5a66002ebe69138ff34656757a2a88bdd58d8d0135272109c7923e73062787c5ebb1861933902bcb0995dfb1c0c9c28d1bebe

  • SSDEEP

    768:LAKDSENBB8orL+/xNijiqGz3JODM7MJw4lueU0+I4D8LczUTqGIq:LAgXNBB8orL+/xNiIzF7MJw4lueU0+Ir

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\_[EXTERNAL] Bid Order.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    af285103f5bd99abb1946ea45299cb2e

    SHA1

    746bdc854ecb7957abfe3e179f30baba71a47c87

    SHA256

    c15ac31b3b26be7102783069a1ce39dbf3069d26618d21f0cde9587407b20824

    SHA512

    b99ff1592b06818ae8f6dd7da6c5dec92100d60d8f73c64d9b3961b5e91fccb948e363d138b915a84b36089d8d750da94061fc62c719d95ba682c4a5e0054ca3

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    ec9a253c60a7a662ca7b35de427e1d03

    SHA1

    0e9070f47efdeaa07bc1243ff73a3f5e39640055

    SHA256

    141f3d8e0e807ba142c0137ff8bb78d6a817e4f676e612afa107ed9cc39596f7

    SHA512

    1c914a31001546740dfbf8529ab78a27144d3377ef3147c3cb36c74f4cdf793d936ea07e788f73d4df2ff1aa1f15b408893b951764b163eb7015c91842bc59ec

  • memory/2172-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2172-1-0x000000007325D000-0x0000000073268000-memory.dmp

    Filesize

    44KB

  • memory/2172-124-0x000000007325D000-0x0000000073268000-memory.dmp

    Filesize

    44KB