Analysis

  • max time kernel
    72s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 17:53

General

  • Target

    The Global EPC Project Management Forum Amsterdam 27-28-29 November 2024 The venue will be Leonardo.eml

  • Size

    2.0MB

  • MD5

    8c61b46399e0a64063fef0d9ff867afc

  • SHA1

    0fd8fb8746c5b403fff82d956698ce9ac420c311

  • SHA256

    fbc46c3bb85a5be47437ee605bd24066f0065de0fa6389c6e78ba6036e7836a4

  • SHA512

    1194f7c05eba44613e44ddeac415e33f2f2894a6fb2ae427d8ac9eb586c41949f7bbd21317cd4bb3db96981cacd6856f1056f2fed540d87bebf4d43c96019d6d

  • SSDEEP

    24576:wwyJg5ri8G2TQ7joUtwqMWkZ63QG4oJvX4ev1rWUSxBxbSGKcDO2Y2xCUFMWO5FZ:fyGL2LHj4oukWUQKc60xCdWk

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\The Global EPC Project Management Forum Amsterdam 27-28-29 November 2024 The venue will be Leonardo.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\Upcoming events 2024 (1).pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2088
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1424

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          235KB

          MD5

          d367e8951838053b5ce00aa1626987b0

          SHA1

          1f4ebb3bc7eba27a2b582082a30f48edade6ea5a

          SHA256

          91a43d6eb4c819f497a439dc6092315fdfa42155ffc2083546f1d7b70b3e63b2

          SHA512

          04a52b6fab5696689b11a08584fc44baea9593e0700ce006cfb679724a8dd19868b565ed8d6d76871a09d235dfe27b09a2fdfa1dea444ddd40916a529837ed04

        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

          Filesize

          240KB

          MD5

          d1ddc10a51100c9c9deeffb1f68326ee

          SHA1

          acd101b5c781f6782e4254fa338e82aedb96cf51

          SHA256

          e65666854a6d562a3207f44dfa94f8fa8d8e4ea64d0fdbec2419c881a2a781bc

          SHA512

          231c24c92e463d9e7fda91fb675f9f529786f2c69818f001496f69e2f71465ca7fec4032795e56cdfed245186075c22da973ab7686e4e8fca080f181f85a773f

        • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

          Filesize

          504B

          MD5

          f4f21844be5c015b78e72f5bf52b9153

          SHA1

          65a80c4a8fca8dd741d16313b19ce756b7136206

          SHA256

          3fe7410ba317fab63ef20e2fb2a5a09523453355964c029dd9f90acbfb6be11d

          SHA512

          58fbe01e182fdf705f3c50366ea7e20649c7a2b886fa0f674b274aaa122baa8458148df3ca2577198d9c5088e55c96bbad858fd66deddaa1fa6fb886ccac8615

        • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

          Filesize

          1KB

          MD5

          48dd6cae43ce26b992c35799fcd76898

          SHA1

          8e600544df0250da7d634599ce6ee50da11c0355

          SHA256

          7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

          SHA512

          c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\EPC.jpg

          Filesize

          273KB

          MD5

          8655559fa825c441ec81b81664f7b990

          SHA1

          29d28dbc56e3449f003e990e9308299ef48279cb

          SHA256

          69fff7fd0a7072a8e699d5b2eec95a4237284f2e1a374e3a362608af2e0cb421

          SHA512

          5449ecf4e6b75b34c794c399351c6aa065a876a8069829695eb2c7cd7b45fd27bbf3de309fcefcf78d526194dac1ec0c2ceb246554aa69ae7d08a64b993eb9aa

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\EPC.jpg:Zone.Identifier

          Filesize

          26B

          MD5

          fbccf14d504b7b2dbcb5a5bda75bd93b

          SHA1

          d59fc84cdd5217c6cf74785703655f78da6b582b

          SHA256

          eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

          SHA512

          aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\Leonardo-Royal-Hotel-Amsterdam-8-v3__FillMaxWzgwMCw2MDBd (1) (2).jpg

          Filesize

          104KB

          MD5

          b7bb31fcebdefd26f06c4e0c16d5d24c

          SHA1

          4f7872e7d7895c5a45bdb102b9e21788381bb1c5

          SHA256

          49eb8a8806730faf9f793a2ade69a05783710395bd735d529fd44fbc4cf76ef5

          SHA512

          18404ef36081b3c1308f2e1edec7f3d9260b8eaea9da65b0d2cf0a7d30f1b8a1ab075dccdbc9ec9083b5852950fd7598f74826c0be859826b6ff44f870692273

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\Upcoming events 2024 (1).pdf

          Filesize

          1.0MB

          MD5

          bd76f299952a129525c03b09d555c2a8

          SHA1

          c95add186b11465a6d28a426846a14520b8e2c1c

          SHA256

          e4ae341a338356b27fd750a56df33a8ad599a82959115c9ad4d7978b04071538

          SHA512

          2ee0c6e0c5f413ac9875535da9d261e4e14a52846acbdf5e350acef725427b2e60d050f7039963ccfc76dcfd29b9b9aa28a256899774519efdfd3b4ddb8eb2ed

        • C:\Users\Admin\AppData\Local\Temp\{0A2908D1-45D7-4211-90CD-B42D78244A19}.html

          Filesize

          6KB

          MD5

          adf3db405fe75820ba7ddc92dc3c54fb

          SHA1

          af664360e136fd5af829fd7f297eb493a2928d60

          SHA256

          4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

          SHA512

          69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          c67480c43a903cbe7a3bf9b1ad58dae5

          SHA1

          430c2d4ba8d28015297fca22bf5a9c7472a7fa7e

          SHA256

          dd6940ae279e551907cea97acb191b198a2a74bd13ef7d1f80ac63c03089e07e

          SHA512

          c1281605291551c308a3f003f0306b6ffe107d3490ed94b7593121948833f40392cb2d4419050391e38acc719ba9057190a73883b9aa4ccd0c445b663e91f83f

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/1424-250-0x00000000001B0000-0x00000000001B2000-memory.dmp

          Filesize

          8KB

        • memory/1824-1-0x000000007334D000-0x0000000073358000-memory.dmp

          Filesize

          44KB

        • memory/1824-225-0x000000007334D000-0x0000000073358000-memory.dmp

          Filesize

          44KB

        • memory/1824-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1824-249-0x0000000003480000-0x0000000003482000-memory.dmp

          Filesize

          8KB