Analysis

  • max time kernel
    130s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 17:27

General

  • Target

    Potential Phish.eml

  • Size

    40KB

  • MD5

    1ab62dae3905fe77ca03d0d927e1f5d2

  • SHA1

    4c558683555ca06676292d43199e44113554adf3

  • SHA256

    c27a4f7982d792a6aa4899cc327a64e8d53edbc91316b712046a3c3ae9624b28

  • SHA512

    e832dcae9747191041920014c3edc6349c59f4526e3ab5453d774891d7d39af5ca7876ba6e6c984ed9117e84d812f6a558c62e9c35f8a8a42c455568dbc8874a

  • SSDEEP

    768:+em6lTrYt0QomfcQk3nJk6zORB+J/1XUF+krYimd6wfJkA97GnK1vQO6v0H6VA:+em6lvYWQzfc57s+Ji6wOJ79kK1cpA

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Potential Phish.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    c14709a7937c89aa6a8728ad630c4ab2

    SHA1

    4eab71249e1f8268620f899a21a432ca962f1eeb

    SHA256

    cbc145c4b551ba31fde4ddc7f898077860be0c74d99f72bb301b571956b83aa3

    SHA512

    10a357691a7337ea20d1637e1d89325db920f1518154e1200d9cedceb8a104a18353d5dcbdf9fc2fd4a9d9a1548c1ee3a9e288618889cb2251c7616d63e04714

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    2cff21aab4aa9fa106b3f988d19b9073

    SHA1

    a9876699aa6ee8d50dcd2bec8765067c2673172e

    SHA256

    dbc379c812abe3db5ce9d93209a9f706e52b443765317f2255c928cc66dad455

    SHA512

    3f2dd35dc68f6569c075b90c3a5eb3da26c66c1b59d60c727018850a6425d090792a8f545303c040e14e7e54b72b74e7aa2a23cf0b87ed0024f4e7bda7c99a01

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • memory/276-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/276-1-0x0000000073D6D000-0x0000000073D78000-memory.dmp

    Filesize

    44KB

  • memory/276-162-0x000000006B601000-0x000000006B602000-memory.dmp

    Filesize

    4KB

  • memory/276-161-0x0000000073D6D000-0x0000000073D78000-memory.dmp

    Filesize

    44KB