Analysis

  • max time kernel
    357s
  • max time network
    358s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 13:33

General

  • Target

    DOCUMENTO_ REQUERIMIENTO INCUMPLIMIENTO OBLIGACIONES_ DIAN.eml

  • Size

    35KB

  • MD5

    bd1b904ba3302e3c6c9e450679ca8421

  • SHA1

    9680465e138f9f58545e9ff252a69fec4bb94741

  • SHA256

    db7e8c88075d07d5439c4ce6a37a386130d0c81ca3c7ef3813c75b097f38009e

  • SHA512

    570540fbb65cbe8add986e97563e1e6289938377a176dcb5165dc490eb497ede8564db2c0b10567d7e0b52e9f1b3e197c658439f465ff4d0be887a02d2a9bdd3

  • SSDEEP

    768:RhwEKaEKOoE+KmPKkZ4/EcEfoFbQEjKGF8bhgE8nf1bPX:bGC5WNMbhgDf17

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\DOCUMENTO_ REQUERIMIENTO INCUMPLIMIENTO OBLIGACIONES_ DIAN.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1044

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          44bf04846eaea36687e3a5122e94e6f7

          SHA1

          eb6e51d6bda5a64fe82e52ea734f3a3db4a0f0a6

          SHA256

          b2dc2808e20a67baaf1a210b9ac25f48709cf5890b955fb94708801cd7108c32

          SHA512

          4e31182258b534bddd3dc4885d836a1b08042383e63e26c2c9d87450c18a4199baa278ee91731e0e1ee1db5fd25e9ff6472569d27c1008e4fede53eadb185d1d

        • memory/1044-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1044-1-0x000000007340D000-0x0000000073418000-memory.dmp

          Filesize

          44KB

        • memory/1044-124-0x000000007340D000-0x0000000073418000-memory.dmp

          Filesize

          44KB