Resubmissions

10-06-2024 09:33

240610-ljkm6afh44 5

10-06-2024 09:20

240610-la1b9afg29 3

10-06-2024 09:00

240610-kyrjksfe42 5

Analysis

  • max time kernel
    100s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 09:33

General

  • Target

    Quarantined Messages (10-06).zip

  • Size

    1.1MB

  • MD5

    0539b4a3d9cb57839fbd33af6987de07

  • SHA1

    2be6772ce6c4fa73b7eac69e1084b196512bbcc6

  • SHA256

    9f8ad2686d13789545b87f1287d005561fba53d2cf15abd40dade3b5c8d61987

  • SHA512

    d206567050cd82b6fa38818c5a19ac2e61eab528e7b3b82f5d3349d39896700baf3bc49d332410364e8a1be87fdac1b4fe0bfb000e56908e3bbb13248a27d545

  • SSDEEP

    24576:fm/2zfI9Ss3fcX7y8TzGZWEylmfWmVfGrofxA+KA9ah:fpbQNvd8TzGAEylcVe+xTKLh

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Quarantined Messages (10-06).zip"
    1⤵
      PID:3068
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2456
      • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"
        1⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2536

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

        Filesize

        240KB

        MD5

        2e36e8b06caa556f5b75e3fc94905aa6

        SHA1

        f56ff91c7e73f8ca52ce78d6e97ddc6b86b6e251

        SHA256

        5f2da59d73b3de4740653545d38a3b96ee7f60d5819a7400ade5c6471964d404

        SHA512

        f2f8fc28c0e868a7486105b7d096fd3448e8cc8c89721f8795a9161df978b11d7185bc0e069f771c760acd3d8fd717faca780dd8f83fe395ec1573a686e0eeba

      • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

        Filesize

        1KB

        MD5

        48dd6cae43ce26b992c35799fcd76898

        SHA1

        8e600544df0250da7d634599ce6ee50da11c0355

        SHA256

        7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

        SHA512

        c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\be71009ff8bb02a2.customDestinations-ms

        Filesize

        9KB

        MD5

        2b902246ce46607eb80a7af12efae5b4

        SHA1

        c2ce568b3343a99522bb901bbb8d8c941bfd050a

        SHA256

        e688ee86d075d33e8a3c904824c4d98e485461bdb5b2e1f6f481e9d3f2243682

        SHA512

        8b94fad0bf19f7ac082353d21d5a008b2592546309aae15e7df2e0cb45da2db0b9ffcd1cf7ac1962c5fa4453fa73c1ca41aab5f385c3ee4d96b8068a2be98def

      • memory/2536-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2536-1-0x000000007360D000-0x0000000073618000-memory.dmp

        Filesize

        44KB

      • memory/2536-189-0x000000007360D000-0x0000000073618000-memory.dmp

        Filesize

        44KB