Analysis
-
max time kernel
200s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
Quarantined Messages (1).zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Quarantined Messages (1).zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
5fa7343c-36a8-470a-2947-08dcc30a54c6/9ba6821f-d356-9830-f5ca-18c7e73b83d2.eml
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
5fa7343c-36a8-470a-2947-08dcc30a54c6/9ba6821f-d356-9830-f5ca-18c7e73b83d2.eml
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
email-html-1.html
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
email-html-1.html
Resource
win10v2004-20240802-en
General
-
Target
5fa7343c-36a8-470a-2947-08dcc30a54c6/9ba6821f-d356-9830-f5ca-18c7e73b83d2.eml
-
Size
39KB
-
MD5
bca8ffe715c2cd5f7e702f64f4c6d8e3
-
SHA1
54111b6f90ab29a0a23bedfd8a028ca5b81b3514
-
SHA256
2572dc91c7c8c684fdc76220e070b2dc42447689ba7e57ccb2c182ad066112d7
-
SHA512
01a91b5171745ee825e18d849e005dfca2893134055d5b47850081e47096eb048bff08182ec389e480af422ab3c7b03ce89c3708a8f3b29a0507beeec2ea777d
-
SSDEEP
384:NzN1Ee8uWn8bknJJyfnqmu3ZBmVT/J8vw8oH1KunDgOcx8r8n5gEsoji8E4JBkb9:l8WxfxuyffgAJgiqW
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTLOOK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7070c08340f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" OUTLOOK.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430567902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE357ED1-6133-11EF-AEC5-4605CC5911A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005041a99bb7c16f696e73a69c24c65747acf22625ac8cee36f2de1a98a39f8513000000000e8000000002000020000000ba9b819464b51dc7467d7b96b1a01c31b5ae2ebd633483db0caefa26eec08cdb20000000a3f8dd7e8823ede6213476dc8e9d5a2a79190a57f78ef914b7cf800d5cbfb1fd4000000080bcbe5defc6a21fdb6c8e8e4e77ee1787023cde2335075e07a4877c236a973af52f70ee39b64cd4209c636e23e93f92f009377588ae5827e3e9a038408f62f7 iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063087-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D0-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D1-0000-0000-C000-000000000046}\ = "_SendRuleAction" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C6-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063076-0000-0000-C000-000000000046}\ = "FoldersEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F0-0000-0000-C000-000000000046}\ = "_NavigationGroup" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F4-0000-0000-C000-000000000046}\ = "_OlkCategory" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300A-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FE-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F9-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DC-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E8-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063094-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EB-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063022-0000-0000-C000-000000000046}\ = "_JournalItem" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D87E7E17-6897-11CE-A6C0-00AA00608FAA}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DE-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063070-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063046-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FD-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CC-0000-0000-C000-000000000046}\ = "_Rules" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D8-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067367-0000-0000-C000-000000000046}\ = "_OlkTimeZoneControl" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063073-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DC-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F5-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C9-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CA-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EA-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F8-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067367-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304D-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300D-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063020-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063081-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DD-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F9-0000-0000-C000-000000000046}\ = "_AttachmentSelection" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063006-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CC-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C2-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307C-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303F-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F0-0000-0000-C000-000000000046}\ = "OlkTimeControlEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D1-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063008-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063075-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309A-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063026-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F9-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F026-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DB-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302B-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F8-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300B-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063044-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F025-0000-0000-C000-000000000046}\ = "_DRecipientControl" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F8-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303C-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DF-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063008-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309D-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F1-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2252 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2252 OUTLOOK.EXE 1440 iexplore.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 2252 OUTLOOK.EXE 1440 iexplore.exe 1440 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 2252 OUTLOOK.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1440 2252 OUTLOOK.EXE 32 PID 2252 wrote to memory of 1440 2252 OUTLOOK.EXE 32 PID 2252 wrote to memory of 1440 2252 OUTLOOK.EXE 32 PID 2252 wrote to memory of 1440 2252 OUTLOOK.EXE 32 PID 1440 wrote to memory of 3004 1440 iexplore.exe 33 PID 1440 wrote to memory of 3004 1440 iexplore.exe 33 PID 1440 wrote to memory of 3004 1440 iexplore.exe 33 PID 1440 wrote to memory of 3004 1440 iexplore.exe 33
Processes
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXEC:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\5fa7343c-36a8-470a-2947-08dcc30a54c6\9ba6821f-d356-9830-f5ca-18c7e73b83d2.eml"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://email.apollo-privacy.com/u/eJwcycHKwyAMAOCnqbe_xDQxesjhf5RMWybolLIV-vaDnb-iCQqn5J7qQaIEZA5ZmLKxFyloZaMS-UB2VRGQIOIGgOL9moHhCJ7tscUUCBcCm6O18TfPelm-1zy6O3Xap9lqbe_2uheCvrdqP3vrgv_uUvwGAAD__6GFJr82⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1440 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ac6f07a3f9506aec55cc0074ca9221ea
SHA134bb09e7f0e2a2356a9658e78a71158cfbc77fd4
SHA256aadf06a17534a6e93a2da20af70e96fce8434045c1709fde3c0dc63e5d770817
SHA512362c7b31140ae93c5703839cb9fa52a9070ae21b6aaf741beb1da140e57e8e0ed76f085019e24bb024ed41fff8b8b1178f55a8aa44f5555eda831efc87feecaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e2b6e25d6183338c172f4923511471
SHA1398fc3e3586407b91eb417c327fc863a50412500
SHA2568a88d6b05dedb48002474ce85d47500614348e4c9b584d1cb82accf77025208d
SHA512ea4e3699b46a79708c2ffb5d7f81da21f85f72755517e45468dc24efc567580647098f1f0a8b0377ed2146e10e4557b7565b223e5af8236c4882852e066b149e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50503cb64456ff1ae43cc0886f5314c02
SHA1f02d2ee63e86adcbf33d39d58d27cb98794a045a
SHA2564234e87409f8b61c0ce146d41171256d865cdff5a4633d752437ef3eaa791b74
SHA512794e0bed1d1630f8446db8ee2502e49cea0b19b6973588e60e0d908b4144f0f910849313624e1932045b7d06b14e27520b76a40a09cf6ceacc50b3e322454596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519856780ce760cdfb3bbff30033f00d1
SHA1b81fe8d5a4a690eff748c341f9da35ad4dca5b2a
SHA25662c104c915a1a1f5209802ca46ac1160458e395a57d7ec58312a28f045e3ee4a
SHA512bad60dd964bfad6f403e9cd697979fd878dd90a9b74ccd9a4c7d860e1d7edd82eb29096b30d291b9121854588bbece99b79547f746fecedc663559cfcbde04bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7019445369c12c24551564ceb03630
SHA1ea515b02062ad645cc3322137e2ebf551c1176c1
SHA256658c451605e839022ce2cbb5c72f9e36eec3e56879de1862d9f48d3053fedf23
SHA512c229debef2eaf85a16e994174b63a3768a5f52f9c244f1cb2943cc9252d3677e47790706255797a8da178505c91714106e2e25f17db321538d48b3e01d7cf051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572361c660b4c6e425379aab4dbf6091a
SHA1021f4bfe5a64e3d958fc35661a92c9e68b19c25f
SHA2562a7487afe613aeb913755242d4d14ec3b9962de5e7ea0719a69908709c2c0479
SHA51247cae0f78fb0500c3ca3a2601dc54d158a3f19db7669c4faa3917a016a660f4a7e7c3235e6c133e5aefb80e6331ba7f39213092a15a68b3d088099133e9cadd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117fe3521540dc98459d9b6dcc560d9e
SHA1ff280256f68a2e0b6265deb51ca2c2f78f695cf7
SHA256e41d678e6b0a41d8917e020ca068114c80ff856e40c6a7978a95f022ac3e34ce
SHA512b0030719aa1de896b38c60a3786892f761490c4e2815a018324d4ea247bfc9afb7113500a460a0f22b8d41e226214a803eddbc2b8b25009a6c7b0b270fc8a26d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd98eb1c5b531ebf5afd0d746ddcc97
SHA1787ae35a345843aa7c6b10a8f87caa4131ce1212
SHA2560312effb7bbbda9e78d32df5646cb363ad9b8f3184f25d132a1fb025f237cc0a
SHA5124b31b12813a15c042fbbee12fb4b7cd5988608bdc8c67b34b9954f082e02b8fa9a7fe68b64f8fcd52c1e25b5aad5248c7b6869f7ea893e751f72f4d25f64b35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c924ddaf400a8d47f38d0f556e1e7516
SHA180f563a36a812ae9fc5ba8a6724f3c8379fbc88e
SHA25636fec987d3c1ea3584b230ae40173ea8557d1f360f8d80656e40be6bd9184f11
SHA5129dd3ba52465d762b2e16eb4b931bccd134c64c2f59f888d0292055eac42cb7c30f4378755b1c9a073415bb7937639c65dd597eced4f5ac5e8c080ab137962028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d2ef7bad8a3353f4726b52b514bdf0
SHA1b809ec567e7d8c291ce9257b53fc1ddaeb65ecd7
SHA2564e86d29e849afad7a05667c4d2c5eda16751b99a14289411f37f6e6706d0111d
SHA512d536abbee854bd01ab8ae3e8d3a19815f6478d2364817d985d466d5f5a57a9b65afdfa67739004f19263c6b91cca9253cc4685483fc16cc3a4f348f747c8393a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01a61296e2b1d26f10d6107954bda9b
SHA13040539cad0c8c265f8ab123abe7a4af241b7c2f
SHA256fe5cd049313ea64c5ddf9ce959981b7f465c7c29a0be6e79654e23a8803d128b
SHA51275215ffbbfed103928aba3bc0d04f756076bb21c828689f59881e2858d6efde33e4f4e420e75d21230bea9899fe935549fed23b9f6dffe6c51b648895d9fd48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528031c7365f7038de67eb7d355fc76f5
SHA17423784c538f67a3e02c650963b3ba926e51c511
SHA25652285389b4568bdd1b857c2a2fb7d511083b7c7a4795c6762c36611778ebb81a
SHA5120bcd50f76b256299829ced3fdac838bcce1f8818f3b07fbaf256f64c0e5fbfd5511c785c2efc0013488528c2bb0fe8e7f860d47f34d395a75dc22cd0a1a1f619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23e17bb6627c737f6d63874692270d2
SHA1148f5fc2e2def310fed8d872f05c84c22c9d93b4
SHA2563beda8038faf269d684ed592802b9a47233b7056c710127062795c6c47120525
SHA512b2d396f98444b34ec3db1f05904dd519d853fb49c20ee1c5583e33eabff567281de76d4353b0f5c6c356046736364d06104eb1c5e7237b14352c80e0f14aa976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30a89818475ea997fd2f9daea5fb72d
SHA186e970f811d81d5fef0bea6636413c8696c50916
SHA2566f0cd4367da679566edbfea5fdbeb107493514e478e5f45be161e5d3c6df1f08
SHA512d554e22418f90b4700d4d35940c986a059c090c67005d530321363ca8ad15662c82746da993df4f843e3aebc7796a980a78d9c3a20a347145a37fda237c4a484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59012c66216c0e9b3526dbc2cf1e96953
SHA181240ac88a4b71edb4dd576566cd837c971c4aff
SHA256b50961730c7bd40b4533c2da457eae7c55e606c1fcb72caff064d89b852a01cd
SHA5125ffc16a4ac0989744a3e0be2ef9577d1ee7824ba008953c6c982885b9af7bda3008bcc9b2094751ff357f3f432d7c6ae7636be9c5488c0b94c7b535df9731633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ff9d1a5feb4f3803b94ee2e67197eb
SHA1477c65ef046c94f5412fd6168c599049b7b4f03c
SHA256358431cab285ccea83317f4cefbc2e0800c4b696bba1a3f03f0c8382735f1ce6
SHA512e2c68dfca83485bd01ec236053ab029541fa926d1e6f54a941a1cdc89548afb958dba1bc4c2f6324cf5696d239c391d2c474eda808e6397a8c91a1e2f06ad2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b5a212f55a98e26e0a11357f4ae848
SHA1a1bfdedbe7949dd2f58a562853d5bf8fbb50baa4
SHA2569197b9027ff10731eeb9e7790c75c6f21514bd97256de0dc84a6fbe04f61124b
SHA5125863e60087158ac3cb2bc05f2fa28eda4569e14785ac391819c9512b0f0c3b4bcf9ae1ea9ddbd31e4837030d0c9b9461cf0649207171da20d0aa42db43937be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972a69eefea4394f4d3f3f0c0c55d966
SHA16df0495bfab662784eec521728c071d5ae817362
SHA2566d1d7e339a8c85f33fd6c8f1a44fcf9282c649b58ea23ea1752b6c587d94d83d
SHA512f740d1401bf0f988709e356def78d94cbd5ed9bd0579a2337f9d8d6b79582374b4664835e7da4943d0624fc69e5f96438870c69b1b5763034a00ce51cc55e55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7085e097be336333045544cbf8e2011
SHA1a948243131ab6233e7baf94e96d6580e02e48377
SHA256b5f6963ffd29a889de7ca4daeb3875e0a5c91a64d9708b336610bcc7528a254f
SHA5129ab9969289f4e8bb47e3eb35d5e53073c29d9177e00534cb9a6e32a10256d18c56f3410b8203f127efcfa45a2528e4f6719b89e17262b741cef2bd49600a4e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b510feb5d5bcfe391d0ae455e6e219b
SHA11e05783544e68b867549a245b1b600546c1a25f9
SHA256f9c904c9511f8646834ce8d9e78bfbfa96ae1b7464d23a82560a0e23478c3b7b
SHA5127508c71b79be8ff0f8682374c5a321e798b1bea327579a3a0324ee880f692af177d01462a5d68089de4f3bf564ac0edc257443e00bb2f7c423a52cdaeb2b7fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1d40d558c657e2cf4f91da38ed411e
SHA1d233528bbf6fc1e5bc0dfe3bccbafdd9035c0005
SHA25659cc9b9a5dcf1fdebc30f4e7ce7234be2c472d549e27f827487453274b930a88
SHA51206ac4e172c3efc901ac8429053765064c41d2e459d99cebd0137f0dcec7efb5395478976d219c5dada38b9bc6970a6cac065961211e9efd28f2c700736b45ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e057e4391fb7d1be0e02dac365bcaca0
SHA157be4d3762d78c85dcf61b1455affa41d712aaab
SHA2568c9a78522fceb51568221613b95a00d7877bcc215682d964de21de4d2347599e
SHA512a9b54b29a2f06d4e78cb769d3354ed8a8caf524d848992f2f6af6b9e7d9b5dcfeb29ea9742358235f91f09ea07792d2f4ca4b800ac28abd99fdbb92d550964de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e3b521aa7fe3f294a8679415d8699e
SHA142adc35397154000c53dc2264dbffda3d9b8217a
SHA2562ccc733ccdebef70cb04b51ea49af2acbb7cedd3b8420c18308ef37a29126ed0
SHA51215837983e0eabea1b34bc21984c6e4d3315075a9584649d0d63f04de39e63d66a44dfaf06a0e0af026363ade416604f873bd21c0026d329263aad468e83f1034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c55c21129e5ce2e3f12e5f4ce90381d4
SHA10f8121a9802329bd0ef071ae7ba94c90ce81424d
SHA2562af71a79fc23401b2c9081f159d16832e510c2640ee8e6fa3114a7cb2bd2cb77
SHA512eb135e2ce5b32025d3ba61a15475a04dd7f02fb3c73bda42fa0c00bbe80eacbc7c30358e1773076d95879d51374b3831c1c538eac73813489dafec7d6fb4386a
-
Filesize
185B
MD57fe1e8ceb8ea6327e1a753e6fe8eed46
SHA11d950ccbbf5cd9d58e56263f938e97394ebb0705
SHA25611d252196762cbeb292f89a935d6653eb674f275fe7e6718a8aea538fabb7697
SHA51236c92574fa0000bb6f788903c8903a717a886d86b19e90a9ea18d1293eb33566176f19199c9295487feb97e2816f93195634727218906748c22aa9f47c3b34b4
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\Blank[1].jpg
Filesize631B
MD5d68e763c825dc0e388929ae1b375ce18
SHA17951a43bbfb08fd742224ada280913d1897b89ab
SHA25625cf0f0ce42f8acd9ea6facc223f54105c7fd0cce63fb7bb5d83e6600100acbd
SHA5121e146e2631a4f3bd091905ccc10ed1054700349648cd52aad24eaeeedff0fac4b44b6212284a6d0855942ff16308c66402ecb895e68ef1c66dcd496973043cdb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
6KB
MD5adf3db405fe75820ba7ddc92dc3c54fb
SHA1af664360e136fd5af829fd7f297eb493a2928d60
SHA2564c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476
SHA51269de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72