Analysis

  • max time kernel
    278s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 09:31

General

  • Target

    a9c8eb44-1108-44fe-bfab-08dca74d5036/e9026e8a-8abf-db16-19d7-e825219d1447.eml

  • Size

    2.6MB

  • MD5

    2f34b779d57ef7d2b34eb4c1811144d5

  • SHA1

    3f9e620dc73c836d75b4965d9e76541144d42123

  • SHA256

    f6611c62940b3deec831054e857d1ce51aac0a87c297339c703b9b33093b4dc1

  • SHA512

    c3f29f0484c00f600669a940eb089a5b0b7542154ccee61c2d923a6b578f659917828e8f38bb2c7261cee804fe1ba4a3c30fae1a45fd94276190d9d90a6ce366

  • SSDEEP

    24576:Gp9gdVyWIrbwJUNBTrsDozxk7N7NBTrsDozxk73L1lWPdV0eXUYKVnfvhZ7sxpQP:GSI9WDozxq7WDozxq71lWflkj+JHAio

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\a9c8eb44-1108-44fe-bfab-08dca74d5036\e9026e8a-8abf-db16-19d7-e825219d1447.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2728
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
      PID:856
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap5480:74:7zEvent5775
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1776
    • C:\Windows\system32\notepad.exe
      "C:\Windows\system32\notepad.exe"
      1⤵
        PID:2936

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

        Filesize

        240KB

        MD5

        d0b2e9edf3662543e1562eeb40628380

        SHA1

        91181062599002a4cf776551590818c59eed131f

        SHA256

        a9c7b04504aa25875e6283d5c100fc782fbc60acad897fe4f0af7a620308397f

        SHA512

        924c2146f3b6e2b7f16555dc958f0d9a4a0a1ddd5af7206ce020566214d5b1f987cf143d17773b49c56ff6079387e0568aaad132930bbaceeab9d6e1f053ac5c

      • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

        Filesize

        884B

        MD5

        3b9456132c9ccbf8d0670d5d9bf6b38d

        SHA1

        4f47f1b2e938f3fc5906418f2df69e589a78cb90

        SHA256

        d0677a3139c57325b3559841fe27933786923c1b66a05b19022c4ce9283f205d

        SHA512

        9325360ca0ee6f8de88ac217984be5c7bad38748e32f25d58ac70e9dfc088034ff862c272e464a32ec27b54340dbe15207f46fe194a46ba84b0012de3b7ab7e9

      • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

        Filesize

        1KB

        MD5

        48dd6cae43ce26b992c35799fcd76898

        SHA1

        8e600544df0250da7d634599ce6ee50da11c0355

        SHA256

        7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

        SHA512

        c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LX9HEBTF\acciones.zip

        Filesize

        38KB

        MD5

        9d48610509ff54c0bff2cb308d93ae52

        SHA1

        2fc1c407b571f262e54ac44e8c3e8f65a4117cf7

        SHA256

        2ec78d83d6d15da24d7b919af5d1fdcea9475ea2cc353cdc05664c78aafe370f

        SHA512

        0acce5143f6a718c51355c06b57e7a5e7b4b115f695eec84e95a89137f15f006cfb583f2911ea69f58d98d43e135200071efb2fc0bc054283ec543d62544efbf

      • C:\Users\Admin\Desktop\acciones.zip:Zone.Identifier

        Filesize

        26B

        MD5

        fbccf14d504b7b2dbcb5a5bda75bd93b

        SHA1

        d59fc84cdd5217c6cf74785703655f78da6b582b

        SHA256

        eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

        SHA512

        aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

      • C:\Users\Admin\Desktop\acciones\compra amper 52316 - Acceso directo.lnk

        Filesize

        1KB

        MD5

        cb2fd686ebdadd07b4748ccdccf5cb7b

        SHA1

        9bded59741bc9bef3bda2ccecf82719cc3466c49

        SHA256

        c4370acb2f529e39c5cb146280137f01b205936cc6d2601cc9e5502c0354ae84

        SHA512

        b6e2775e61561c533e7a983108202e1b1686638578f595902964d3b4967246a98714a6cdc2d66ceb415dee5e7a86d79367c62e2d41e774a8766fc37372fa1a31

      • memory/2728-1-0x000000007362D000-0x0000000073638000-memory.dmp

        Filesize

        44KB

      • memory/2728-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2728-193-0x0000000005100000-0x0000000005102000-memory.dmp

        Filesize

        8KB

      • memory/2728-200-0x000000007362D000-0x0000000073638000-memory.dmp

        Filesize

        44KB