Analysis
-
max time kernel
30s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
EXTERNALAli I recorded a quick video for you!.msg
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
EXTERNALAli I recorded a quick video for you!.msg
Resource
win10v2004-20240704-en
General
-
Target
EXTERNALAli I recorded a quick video for you!.msg
-
Size
58KB
-
MD5
2b39483e4a50677748cfd82c416f14fc
-
SHA1
a1b89be7762ad62bee7b2dc299d7d55d1d35f044
-
SHA256
26c8aecb94f5f55343002fe5aa1a47250789f50d150a11b897554969dce611aa
-
SHA512
89c24c862e6e4bd9f5b9af58c73c8b0de4b890f83f4cebb2f8775f7c7af2ecbb1256fd12851feae33e4faf831be0ae2d3bba0bab66c4a190f242c408f21fa268
-
SSDEEP
768:BtLf9aT1Hg44v5AJnh4HtNBI5sKIv9GzLETXfYofcKqnwv+OsKisKhfME4eM:LVaTdGv5gw1GzLEDf2Kqwa
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2312 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE 2312 OUTLOOK.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\EXTERNALAli I recorded a quick video for you!.msg"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2312
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84