Analysis

  • max time kernel
    76s
  • max time network
    61s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 06:28

General

  • Target

    86d5b273-995c-4e95-1a7c-08dc952df017/bf015775-7686-2cb9-82cc-65daf459f562.eml

  • Size

    50KB

  • MD5

    ea85b816fb524aba859e509d58fcbefc

  • SHA1

    f447d8b61bcd7e4665010a0b5d754600bec523a3

  • SHA256

    fa380ac405aed9612e69a51ebac2017732df9f38121b3bee4334f1ea6a3e2ae7

  • SHA512

    7dfb466703afb8842f433e782723015653991b2cb3ed64e8f4a5fda8a761a94367e992cb0b646e449b9666c8ac849f6e4825ac4b18416ea74890d43e555d4dc5

  • SSDEEP

    768:ki43bx2F/LuBiLy2vUg5XsWdUVppyuAGc:n4CjjyFO

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\86d5b273-995c-4e95-1a7c-08dc952df017\bf015775-7686-2cb9-82cc-65daf459f562.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://link.mail.beehiiv.com/ls/click?upn=u001.zV-2FAVEm-2FntcfbYMbzjaqbHvRntm2Ch-2FIT3iAZTh1wdhmle-2BfM-2B56GWeitj2iKgrv-2BRh6LFg-2B7XJNdfGDzLI-2F6G-2BCgCV-2F1hbnBY-2Bs68xhxIsPze8eMoFFw95WGw-2Bls1FbsMcp2q-2BMyOHWUbhhJ3dyUUQbbHo5Bc5jcddntgOAcg83c9Y-2BHpozMO4kEhTRKyaYf4GE_04d4ywoI7MJdsiYCN-2BN3DcUV-2B5xfwat-2BOgMDujJ1c-2F1Yv6NlNivSyla3VBW2cjbreICkBkgXHixi0ACskwkJCH3u9gp4-2FrQwpJAd45eoGZH6F9WKWScUnPRG7L0MdjmYsdh2mG-2F5ooERp7mUge9TkseH5lpZE5BGlLqV3EmNmwmoUZ78h4QNUURGqNihs3lIqvV-2FGidB6aT4mahun-2FfEggokQWQaXc7KtFn1sHr8CCQ-2BT8QY47igdRtqftAfOJpIdzEAbZTe2vS2tRZC-2FbO8W6tMa4nObUaCEP85Wk9yMriYba9-2FVsq3CRg-2Fw0kakSMVqAQ5BxpYgJaaClffLM1xgtjaWczDxxcE9iX3LB-2FPIiliNsBLR3RToxMiDhTT15u30rGal0pBE-2Bhdx1OOgNrUnfUnJsLmuX-2BgusHp8evjOBUcs1FTfWfcIIMjaupO5kds
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    464768ec964200aa5d4e9d285fa129e6

    SHA1

    341beaa2c73462f5f73b7221d3a39d7731177d78

    SHA256

    6934174b0416f3da71f41ab30b00cf617e3bd0e31faa4fdb05461865286689c8

    SHA512

    7d83f21433d33b4ac474e2fe31bf1440dd0daff20d0da146b5871d18135126967bc8b1ab10b44678e1ef668cf39ccf659f602e99d65817d99dfe0d1e17d3413e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38993fd3ca72a08ae46ee2077ff12a4b

    SHA1

    7bdea4cb5f7127ee6af41549a692875329015432

    SHA256

    e18c54d66143bab165aed724a310e46afdd024d3bfc483552e8a8a1212c1ec23

    SHA512

    79ddf1109956544d887dca9706ec3f0d83151538354a2a5916c2314f1ee62b8608d42ab8340be9c46974613e931af7bf7ee15f97a8027422c6a06c7c7850393c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9335a866ad6af2c2656f09e7e62400d

    SHA1

    133303bb581386c372afa914bd7bda62bf348a9f

    SHA256

    e64f705df9b5469f9c896a70450aecd703d4eca0edf2f0175cd8589e62b82b34

    SHA512

    ce5fccdb34d8d517f7bbb4e2015e17d2690cb1062b7fe0da5861705e320ee495ac67cc6c39de97740ffb33f9172d0fbc5303a868b4b574308daee3b6a28ab560

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f6aaa10fa7c688bf7c490ca01e54c9f

    SHA1

    4dd693269babef8e1076b484e3083d44f5eea279

    SHA256

    403dee7179c8d6e78b83c9db86faedf3c68d58a2f3b604c2cc21df0a323ceea1

    SHA512

    48b2c1b396d24a8408ed06c37afbdc165a47f635e049abb538c53bd639f2e9d9079a7bdc089a3b03b2dc5db9809004ce8061e6cf7dbd75d12014b223cd98c450

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a22737c7798208d262f9c6ea050fc60

    SHA1

    ae3e60c3c8d483245b0336c6529c05b2526ff79b

    SHA256

    94b0a86568db6268e1134e2e3825fc3f0553e2dbeb7925805104e5a33f7ad789

    SHA512

    d0cb4da6a6fae4728ce522226b010af130966c489b57be2c97e5e322905875d14d21d58c93eb200807879e8b7ae384df72a6b7679ab66dd79ee5cee09d7ba1f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5096fbf3260abab3a88d580b80d32699

    SHA1

    92fe1b79939e744cec1147f53635b0c060a092e4

    SHA256

    1e30c49a043bb076691b90f064998747f5fe25cbcd295c3b8bb49b3b1c2d0878

    SHA512

    c1b753ca938011cbd4c53f3f657361cebc1f4f2c6a3bc51e743d9353d1b5153274becda31cc8c4bb983859b7dbe2a78dca86aeef6c4fcde12bb414054100ff4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e38f36c46d09054f52a1558b9e03c95

    SHA1

    c22deee57e978f048ffbcb5ef067f36d8683d040

    SHA256

    1cc45c6fabcb69dc9ffff36eeade4138e37c2d5d6d9dfe2eb57b140ce1fb24b0

    SHA512

    5fb44b0be733d02102120c1056cf09130e5b25b21b917a1470edac1e48416ca55343110d3c6d6ec12f0b962b3bd10090297fe24e71d07571ec8da4798a649c96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c597879f7871d5eb3450337e93252b26

    SHA1

    232184440a54de5d11f21371ea9f13855d4fd64f

    SHA256

    d74f95543db998a4c3d614e6b9af4d0973417660b68161ee2197ae11b77a0e83

    SHA512

    cbede6a02871af187e4f576701ef43cdb23d7982ea24534d834c75f46ffa604a7a23dbc8e8ea34c396c66d2e08d2025cd6fd34cc91f5bbe0876cf323c3688ef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4620484cea714c7dd5a4d94e26b8469

    SHA1

    7026f6f173b90b6d00b17f80b9eb0ad86f0dd193

    SHA256

    8a5d2366c60d8908a6f556886129c9872b238546bbd6b3527ce5736b04cdb6f7

    SHA512

    072df216d5cf29855d83497a7f12686433fefa98bb1276bccd04d8f6923664919167ca59648555a1a104e1bd083d948878ee726a831fd089e451aa3153a0344a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c24b15f5016b893a2d89e995c173e1bd

    SHA1

    c7a68ca4b36aa8e88b9df634ac2cf345cf672671

    SHA256

    6e7c161145f18816b899aaed3dfd2af8ebc2bb350f9be16051e29ae503cf5f1c

    SHA512

    d61e42c40897c7eab63dba0b95b5ee3d39dd1a76c51a2fcd3eed712e55cd6dbe4126863561ca61ca2719d2325a99ace093d6b11c4d3f24b6c0ac77ba38144c07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dad771de7d955da674f7ad564088016f

    SHA1

    bcfe99db0cb776c7066d48dfe993cd7d4d31f7a2

    SHA256

    f8e438a35d34c1884d521bbd621a15b7340747b81d8e9be1b303060a21cd3a7b

    SHA512

    cc9559c5bbe005999b1b4300a0edf6c6c2706115657a4a6369722b31569fc2ed8d6a4360b19d46d853cca276df8f71916d7e53886b293f0a57e181e58e89e90c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb3a2976666c65669881e7367ca83b71

    SHA1

    a3cc79d212b9f11767f2fe403fd08434bf52232f

    SHA256

    eaf9351668ce6bafdec6f7c0360f2bd6b482ad30cb0963e91ffe235f8d2d0b31

    SHA512

    95429ce2e0efc0b7ae464c7e5a08261961613ee1fc70b4848a2806027f91140e8593d6d7f51ab601279ceedfeea569f5845f0207a669f3b6c76844c1bc4b68a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccace39bc9ab662d7764d33e11eded92

    SHA1

    d15f631cb27c6850d95c2079b4fd4ed6f4649e62

    SHA256

    e22838f56c733f0a8a5e677d90e44cd2448f0b136d3d78afea0d77f7355ae48d

    SHA512

    3653b93227dc83f8a5746d8ec46b4a907297ef1f295c2d5deca849ba8d070dbfb19ccd00d7c052e23e0e03b7996b1a9e217047848d875267c853f18fe7e287ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e3ee4815f6be960862a59aed5a858b4

    SHA1

    459b8120eee74c0127d1ed4c54e4ba9b66b25c2d

    SHA256

    d4ac20be54e553aa87f5565698549bd655ffe8a035c5544fe3dbaf45682f550e

    SHA512

    ba1d46882463f1dd35204b5b2917eb9639fe445d3e28b89eec93f19a7c59ec61055a049a4631c0df977bfae9b8adc72719fc7f672e8258e56a5b5df8de2fdac3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    d8ed39aa8085f6b439323b89c63972d0

    SHA1

    1426a23585cd9fbf30871ed036a76308e170df26

    SHA256

    03741a8d3bb0b9f4e29a393606b9b37cfb1c68129dcb2f6e582af6931f34702c

    SHA512

    7b0e45a7eab00d273ec31fc11b1975eff335fabf28558e1d0613f93575a2b2331be803a4dd7f597d803abc8830e35fb8d2bc0fde1c76d66153421af50f96af11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    226KB

    MD5

    181db0300628cd5217fa9b2565235f04

    SHA1

    90a65b3b4a00b37dfc21e1fec3cda379b9443568

    SHA256

    7e09297c3f5ea0110290c15c46ef270086b3f73b7c508d75d54acc63c723ac07

    SHA512

    a1fef234bda481f6d151a0f469dcea89432e5020707d7c38fb35a300345c94463d4ff291941e8b694b9b6b70d0bbda84e74e36f647a8844025bcc683389cd7e5

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    7263c43e42a32f6df25da6a24a429fb6

    SHA1

    15cfdd42e63e8afee6334ee44e2e6222ff3a15b9

    SHA256

    0d5426f9ae06214e113f4572f8dc872d82ad62338e1fe558fa111b66a865f436

    SHA512

    d7540370cc958427a3e77b9388e80ab275929602dc8e39d693db39910ec627fab62015e3fd6bb8da9967f455240e7a7139b4142947b5f8db418533eee58d7802

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Temp\Cab4FF4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5150.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\{C971DC80-2C71-48B2-ADA1-EB8468B25CBC}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1988-374-0x00000000730ED000-0x00000000730F8000-memory.dmp

    Filesize

    44KB

  • memory/1988-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1988-1-0x00000000730ED000-0x00000000730F8000-memory.dmp

    Filesize

    44KB