Resubmissions

02-08-2024 06:28

240802-g8lvasvhpd 1

02-08-2024 05:51

240802-gkc79ayhnp 5

Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 05:51

General

  • Target

    Quotation Request for Outdoor Electrical Panels.eml

  • Size

    62KB

  • MD5

    449340800d63f9645712144fbfeebdb5

  • SHA1

    aec5f44613c95a31e65cd4d33485106658d02cfd

  • SHA256

    87c74962ab990edc5ad94c3a83ca2a450ee25aa491edf5bbfd250af7c3e4cfcb

  • SHA512

    460c7840391451f32b10776ac3f4ef7d5e3d8ff719b5a5e82475c5ddf4cffd65834f790a9083f1ff45cabb13c5bda6aac29354fe6a7cfc6f50d1146da17b0671

  • SSDEEP

    1536:rFR3A+Nx5shIPlVvs90RueSp4i5AoP+bq:rX3t5CIPlVE085RP++

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Quotation Request for Outdoor Electrical Panels.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    884B

    MD5

    3b9456132c9ccbf8d0670d5d9bf6b38d

    SHA1

    4f47f1b2e938f3fc5906418f2df69e589a78cb90

    SHA256

    d0677a3139c57325b3559841fe27933786923c1b66a05b19022c4ce9283f205d

    SHA512

    9325360ca0ee6f8de88ac217984be5c7bad38748e32f25d58ac70e9dfc088034ff862c272e464a32ec27b54340dbe15207f46fe194a46ba84b0012de3b7ab7e9

  • memory/2624-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2624-1-0x000000007316D000-0x0000000073178000-memory.dmp

    Filesize

    44KB

  • memory/2624-124-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2624-125-0x000000007316D000-0x0000000073178000-memory.dmp

    Filesize

    44KB