Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
RE INVOICE Paid Notification - Service check status INV#AULBATP.msg
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RE INVOICE Paid Notification - Service check status INV#AULBATP.msg
Resource
win10v2004-20240802-en
General
-
Target
RE INVOICE Paid Notification - Service check status INV#AULBATP.msg
-
Size
25KB
-
MD5
1683163f746ba3c83d88ef3267f14cb6
-
SHA1
5176dba651083d16affaebf658590161d92d7d9c
-
SHA256
3ddec32f0fe86a99e22a5079c77d3355848aae96ce52f43184edbae7904399d1
-
SHA512
2f54a2ae371332cad517e2315652a182199ff0bbc2b2f1c05108de1f07fe68a725bc0618b7d57571304b3ab2cd7c393aa992036cfbaa1c42e1e3592a3c9673af
-
SSDEEP
192:4zcJFrUQK+tZo9F0RZ33rRgAOYw//icgeYzLSHTewuBYzIinPxpXWz:NFrUQKHmz33rWASOFmTewuikinHXWz
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTLOOK.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2028 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE 2028 OUTLOOK.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\RE INVOICE Paid Notification - Service check status INV#AULBATP.msg"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5f4cba3d52240bffe1bd1c848721d184b
SHA1215b2562d81b643aae8acd20bd85e5d4f22b7960
SHA256b44d6baaf49965f5fafbae9840e8e1c0ac813a3e502cb03122a877b4e5dd49cb
SHA512bc78ea7be75e0bd6dd7e20cf001b369b97426f9fc9ee10e0fe731a19933da7bbd1a1a9ca57cad72bc443fb6680ad40026e429727160dba7b129566002b62b70b
-
Filesize
240KB
MD50b2aa1fc245d3f4e8c1ce651b7c935db
SHA16066977213723a0c83f1ec2d51f15124672156c5
SHA2565b2a769a9c41dc3142a1599ea154d3181b5c1365865cd44c2b7a15b79223a4f4
SHA5123a34d5e34ef3a15fd55138db75918a1f220218decb8f5a36e6f938434ee6e48a2b93365123dfdf3acedcbbd7a5f8add2358a4bf573ddc263e10837558bee0862
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84