Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 17:43

General

  • Target

    attachment-2.eml

  • Size

    197KB

  • MD5

    93870eb1a1177a71430d7082f4d4d6c0

  • SHA1

    cfd94a06b44403d118bb027418fc5a9de55e7113

  • SHA256

    c77ca665b0b44df3121639bccb8cc1d3f3d412cd4fda23c2153fd889e68b0274

  • SHA512

    4bd3d931f67509a2758c14989b40142a6c8d8464aaf6081287020eb4e96f241bf225715f594d34e94bac3e045edbea6fa3a2410e149dd152dfaec33d233aa0a4

  • SSDEEP

    3072:DFcGImhLOh5zyxLZ35dNP8Wjpot4LKTEIkMSIFLJQeihFURDeHq:DqtWyrY35v88pq4LKTEILLeNcF

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\attachment-2.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2876-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2876-1-0x0000000073E3D000-0x0000000073E48000-memory.dmp

    Filesize

    44KB

  • memory/2876-124-0x0000000073E3D000-0x0000000073E48000-memory.dmp

    Filesize

    44KB