Analysis

  • max time kernel
    183s
  • max time network
    317s
  • platform
    windows7_x64
  • resource
    win7-20240221-es
  • resource tags

    arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    22-05-2024 18:58

General

  • Target

    EXTERNAL SPAM RES COTAÇÃO TBX.msg

  • Size

    412KB

  • MD5

    8d43c6b4d391a491c3e924f7226fc24c

  • SHA1

    d492060d01c6bf0dbb67891dbff9423074f356e9

  • SHA256

    5d7bfd37a114feaddc99f9ef506a667427eb5f1c73b6055b7446f42fd3acbc36

  • SHA512

    cfd46a479268c0be1f809b3e47b43fe51d79e11a8b74ed8cd762c2665016793d7901d37a5ed4b6f47a786d14c0391b4f2408dfd02bea9a8f660068b85f877cef

  • SSDEEP

    6144:70wwnOENjPW154fSYQxS3sAb8oV3JFhR228icZbvIyn+tVmboNZRJS:gw0OEtWHYR3sq8oJFhtcBgynCVmUv

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\EXTERNAL SPAM RES COTAÇÃO TBX.msg"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\HOFYHJGK\PEDIDO_VENDA_1890.pdf"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:412
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c09758,0x7fef6c09768,0x7fef6c09778
      2⤵
        PID:1748
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:2
        2⤵
          PID:2996
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:8
          2⤵
            PID:2580
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:8
            2⤵
              PID:2644
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1716 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:1
              2⤵
                PID:2400
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1712 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:1
                2⤵
                  PID:2444
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1552 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:2
                  2⤵
                    PID:1972
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1464 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:1
                    2⤵
                      PID:2100
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3452 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:8
                      2⤵
                        PID:2692
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3568 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:8
                        2⤵
                          PID:1044
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level
                          2⤵
                            PID:1704
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f427688,0x13f427698,0x13f4276a8
                              3⤵
                                PID:2208
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:8
                              2⤵
                                PID:2052
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3576 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:1
                                2⤵
                                  PID:936
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2548 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:8
                                  2⤵
                                    PID:2332
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=756 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:8
                                    2⤵
                                      PID:1456
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 --field-trial-handle=1352,i,15773056949034241795,15056224475427735494,131072 /prefetch:8
                                      2⤵
                                        PID:1620
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:1512

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                        Filesize

                                        16B

                                        MD5

                                        aefd77f47fb84fae5ea194496b44c67a

                                        SHA1

                                        dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                        SHA256

                                        4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                        SHA512

                                        b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        2KB

                                        MD5

                                        4225d06b8ff965256be8b1f1e19629f6

                                        SHA1

                                        cc2f7919075406e87fd8719622988ce1967f5953

                                        SHA256

                                        d9df4abebb9d42bf78147535d12f7281c7483e524240efc9a87a73a355347d20

                                        SHA512

                                        cbb4bee5134fcc0014071093543d2453c1991ce0bd5d6b29e985be05af2a42bad556b4426fca6ff966914797a8d4cc9638847b4c4156c8968ed76ca5bfd1fffc

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        361B

                                        MD5

                                        9cb332d90ecea1d13bd8bbce9bf0acdc

                                        SHA1

                                        0ce308ce860a3ee61f91096357f03f1a13eff1b2

                                        SHA256

                                        8a71524ee873a80229356b4aba49ffaa340106a765cfb7b2b90d1b9d990976f1

                                        SHA512

                                        dd129e61b4e693a26782b242fe96a112e60becd6dcc16fe81478b8b903736bf77fd38565f120de98dde1f1d446a2a3b76c1a78650b2f1b4ae13244842fee901b

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        aadd66494b750de0fd44fe410a1e3bf8

                                        SHA1

                                        561463f24b5e25bb1e17bf70d5621cf80c8bba68

                                        SHA256

                                        47fd6ecda111cae3bcf6e991586792349d2b1d77bcfa4a94e0eeb875e623390b

                                        SHA512

                                        2298144ba31b71a7431f7b345d3d1b741ff7d36ab6e5e61383ed7d7de96bb819dd5b5f734e6b6f9bc4f97ba476b4d13ea9d5c5abd8a468dc08813d5852e69f01

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        e077ad302d95838a41b028ca68bb1314

                                        SHA1

                                        d783f6b1234f102985e5f77e67a87f662f169b38

                                        SHA256

                                        cdcf528f8c005cd28f2fe1a40e6a29288ed747874acf400b491da57084794276

                                        SHA512

                                        2d75f5108f295fc8eb2cbf644fead3ab5c057b23c54325f0aa2711401f49f1842d215a39d18286d326cbf110c4cd1d64e9c3e949499c897170108ae44deca04e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                        Filesize

                                        16B

                                        MD5

                                        18e723571b00fb1694a3bad6c78e4054

                                        SHA1

                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                        SHA256

                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                        SHA512

                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bdb4d6db-ec1e-4b4e-9aee-063b6d0fef4b.tmp

                                        Filesize

                                        6KB

                                        MD5

                                        9a520569cb82d3ac3a9c2fdb7030ecf9

                                        SHA1

                                        a2a41bbb91c3245b8c362ceccaee1f663eae6c6c

                                        SHA256

                                        090ca5814d2774df2484c6a22a015256b88e73dd445b317acab15d55d7877cc6

                                        SHA512

                                        01353a448aee302221d7329f5f2ab4a8ca88e1b3d473e902db03112f3aec382bf719be33d217f2a43bdb4a7bb894c436dad7f73579db232443a1ee0364720efd

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

                                        Filesize

                                        240KB

                                        MD5

                                        eae014b1b3e1395c3dd4fb110056499c

                                        SHA1

                                        bea7b8e7cda76a609448fd994a99a0bbfaa4aee3

                                        SHA256

                                        b390e479c1c3764c4074573acb8ece79c5825c8d0d5793c0e00b0299cdf30085

                                        SHA512

                                        bffab6e379e115fa458224fb31216e014f3aed0541f6870adf69fba1eb99466644b17ed764815a124ed9f870ef71e19edc18ba95944ad9f57f543bd68979ca8d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

                                        Filesize

                                        1KB

                                        MD5

                                        48dd6cae43ce26b992c35799fcd76898

                                        SHA1

                                        8e600544df0250da7d634599ce6ee50da11c0355

                                        SHA256

                                        7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

                                        SHA512

                                        c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\HOFYHJGK\PEDIDO_VENDA_1890.pdf

                                        Filesize

                                        103KB

                                        MD5

                                        390c945ee10400944a0840f87d9335bf

                                        SHA1

                                        09489aa11c0524ebf69582796ead79fb3033339f

                                        SHA256

                                        1c0e0936e2697dd2e48710f30e11ae104f0f051661239eb0046e953fe0b37276

                                        SHA512

                                        b61dda58efdc31668b65d2872dd8c385d9fcdc4483fc44c2089cd15d2826ebb6a8b179de2e39ca0cb68884fdac59a484ddd3e34ff6e177533690ed7631b225c1

                                      • C:\Users\Admin\AppData\Local\Temp\{5BD8359B-B105-4C5A-BB79-FCD3602C893E}.html

                                        Filesize

                                        6KB

                                        MD5

                                        adf3db405fe75820ba7ddc92dc3c54fb

                                        SHA1

                                        af664360e136fd5af829fd7f297eb493a2928d60

                                        SHA256

                                        4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

                                        SHA512

                                        69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

                                      • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

                                        Filesize

                                        3KB

                                        MD5

                                        df32af66de0449fefc5b17a014755440

                                        SHA1

                                        8b34e6f63ea3d3096bd5354f4ec237af4d0ea02b

                                        SHA256

                                        1da1e96e3520d53f5c0f6507508f9e15d58123c5210f791aa30de7e9084f9263

                                        SHA512

                                        375d4688232da8199fcba504f07c6821a4264ed6fffa29e7a35f5c56280628ee3fca8aa3755167edac3482b17a00bd23a8cdceda40b9466bfef2542d1f8b1bce

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                        Filesize

                                        2B

                                        MD5

                                        f3b25701fe362ec84616a93a45ce9998

                                        SHA1

                                        d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                        SHA256

                                        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                        SHA512

                                        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                      • \??\pipe\crashpad_2060_VZDGLGXLELQIQZLF

                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/2264-198-0x00000000732CD000-0x00000000732D8000-memory.dmp

                                        Filesize

                                        44KB

                                      • memory/2264-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2264-1-0x00000000732CD000-0x00000000732D8000-memory.dmp

                                        Filesize

                                        44KB