Analysis
-
max time kernel
87s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
[BULK] Hurry, Almost Gone! Claim Your Camping Set Reward Today.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
[BULK] Hurry, Almost Gone! Claim Your Camping Set Reward Today.eml
Resource
win10v2004-20241007-en
General
-
Target
[BULK] Hurry, Almost Gone! Claim Your Camping Set Reward Today.eml
-
Size
100KB
-
MD5
cfd2514b9d478c7f51ae54cb3e534c38
-
SHA1
7ca70a3771be360ae180bcb42742d7f6d37e521b
-
SHA256
5bad4a12d8bda4f3ae3f509c896d18c07322f734e860a7b2cc9a44f346e7fed1
-
SHA512
b2248dbd718855d8f2b994ee65cdb4535a12d1d4a0f59749a5a1ff81c7facf7131791d9c0a4970e71ecc903673d719a73cc337c178e853e884b897494173b492
-
SSDEEP
1536:IkSGiuhESzdziU+0Wkg6upjULG4Fdq8JLsu3Z1Q5/v5gmJPGLAjrL:IkxJE0iGWk1uiLxFJLGX+mNjX
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTLOOK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2112 OUTLOOK.EXE -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b3fd2ee23adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000d201044382ecadb99f3d81e7b081212e1cc65099b2706cddd3b34c02c1c2ce8d000000000e8000000002000020000000f77cf84610b3572c48ceea5caefcd963835bbb84bfae0386eada38cba04b6ec2200000002e09c962338e8b9c97138ac0ab3b1ba9a5549ed647ba0793460dfc1295156543400000008f7aee3cc9756b3dd2ad7a3b05d6f295f0a43191e619d0c625dc0ca3b046c59e588b15ef355ea1b77e944a14906cf20c700625b3d1e9ba4cc17a1f2890e439a3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main OUTLOOK.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5957F461-A6D5-11EF-9C5B-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308D-0000-0000-C000-000000000046}\ = "_Views" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308D-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307F-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300E-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F2-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630ED-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F3-0000-0000-C000-000000000046}\ = "NavigationPaneEvents_12" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E5-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EB-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E1-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303A-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C8-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E5-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F0-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DB-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308A-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FC-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063076-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308C-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067366-0000-0000-C000-000000000046}\ = "OlkControl" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672FB-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FD-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E7-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D1-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D1-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E5-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E5-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B1-0000-0000-C000-000000000046}\ = "_Reminders" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304D-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F026-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063043-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CC-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D3-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672D9-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F8-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D7-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063077-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DF-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304D-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F1-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063099-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E8-0000-0000-C000-000000000046}\ = "_NavigationModule" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302F-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304F-0000-0000-C000-000000000046}\ = "ExplorerEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063076-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309A-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A2-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063035-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50BB9B50-811D-11CE-B565-00AA00608FAA} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DC-0000-0000-C000-000000000046}\ = "_OlkOptionButton" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EC-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E4-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063034-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302F-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063026-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063107-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DE-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E3-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672FA-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DF-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F1-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630ED-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2112 OUTLOOK.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2112 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2112 OUTLOOK.EXE 1816 iexplore.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 2112 OUTLOOK.EXE 1816 iexplore.exe 1816 iexplore.exe 1444 IEXPLORE.EXE 1444 IEXPLORE.EXE 2112 OUTLOOK.EXE 1816 iexplore.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1816 2112 OUTLOOK.EXE 31 PID 2112 wrote to memory of 1816 2112 OUTLOOK.EXE 31 PID 2112 wrote to memory of 1816 2112 OUTLOOK.EXE 31 PID 2112 wrote to memory of 1816 2112 OUTLOOK.EXE 31 PID 1816 wrote to memory of 1444 1816 iexplore.exe 32 PID 1816 wrote to memory of 1444 1816 iexplore.exe 32 PID 1816 wrote to memory of 1444 1816 iexplore.exe 32 PID 1816 wrote to memory of 1444 1816 iexplore.exe 32
Processes
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXEC:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\[BULK] Hurry, Almost Gone! Claim Your Camping Set Reward Today.eml"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://h87k.mjt.lu/img2/h87k/b88b61ee-3549-4b63-9ab9-4=%20d6b8b6fd4e4/content2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD592d35ca2c05fde94a5c356eab827fa28
SHA125a1b6bdb7ea1a18b4babffd876a7774db83d09b
SHA2567fb83a907987f61fc9ec68070aac59e10f824c3a953449f1c8fbd6b7e78411d8
SHA51261e97ec2871b883eef19a87c650de4c89a4fe9a6c40053eb3abe6186ada96a644b36f5db26119723de169e96b815f085eeed7f1cc3a0451494d3ff40011c0820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c52b0f1108d2792b0b5e15cbd8b343
SHA105ad1c20dbb58c4dc918cd940df15e943d32488f
SHA256bbeb67f871a112d938f880d4ba100b03394bc8e90dd40a8fc27bef4ae1f9e478
SHA512ca28a3fcd07f65020949dcedfd960e5f5614b7c034c11b64c72a3ba835fd3851d86914eea7d3f309771c926e22a641c5d749bdd7dbb68377aaaefe04c5317994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636fb63e66d06a8a6171e0cc6017b5e1
SHA11b141d8f40c0b13f1868d792d3e23d8171456368
SHA256e2855951af074360ac09af146b036e3f7f13ce99a01994a7c9ca0adf30f9a371
SHA5120cc1d37afc7266a36d32d2c537685cddfb0a11b57785793c0fff773bbd79404a98f6298e2eb326c63ccef857bca6ea4baf05f78935f1dca32c29d65a02f67c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd4f9acc699ea3045fc024965ba996c7
SHA1a30d5fd8912f1a579b8d677128f92801b7b3fcb1
SHA256fd4df9f4b08dd9bd1211eb7d78b7cb5fa80e52d5f0f8f0c253d909d2578bfde2
SHA512a4574178bf51be431142969d92c1c7bc9d5b5147a4db06affc561df79bd1debb3e583de3165b943b40b4e92c7fc622cc82c290f664c3b08043c5797aeb2fb5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58648dbd94d772bfc1e8b28a72376b4e1
SHA166f29bc7b47207f52632bf41e24672bb634a29d1
SHA25676a0b1763b4d7e5113d8dcf2343cb5df356a1317f4cbcdccc058ba212f285305
SHA51276649f1a50ad697da57b663be5e08930fb1f63e32b4e33a14a980d40136dd935abfcffc4993107f72c19a1b8457b299a043aa79bc99aaaac16df053642a40d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6a11fa6a8c23b836e75f5584ee3584
SHA1c473b05f0c478ed7bb71f6f685936624bb2da538
SHA2566aa5621de48aafb523c60029362d4b210a93a81982d0bb9f195160a38f92053c
SHA5128afa536af756fbd66710315c6f0652b9849ab99cd25627083f899cd2ae68ed6f6be87c13f534e44d59d1f70f1dc003f36c3842120d140a666ab26540fcfd07e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0d72d860b0934e7aa1bcc4ee156b69
SHA1fdfef58964de04f2ff6469ce394ed267b4761b17
SHA256b4cdf10bcb67e0a89c4e23475e9e36967afdb3e309eac066a166301fb3af9510
SHA5122e67de2ab7f70dde5c41c16493bce4da56bedc2476cb716840895b687530ed4b2a567bd7bcef3a5a3acebdbf5a4b02bab443ab16607a791cbdfb4c49b4fe56f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e336e840593513a4777990fd582d3583
SHA103c2c1f042816bc7516b81c069f0da2779de16f5
SHA256f79e3a8f6fda9c0ca537ab602280701c941a6bf2162282f9e8de6023fe0d57bc
SHA5120e8d7568018f3819e1636ae4761ecf928baf140df62accc4fbf994c906250915138d77ce8ff9ccc55da21ba6eb01b37fae9c45b9c276c079ea5a0ec6bad1f0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1082dc752b20e2b5626ed2805b2858c
SHA16cd57c7888a8cf74d087b87c1fe52dd44a049f29
SHA256ac0a40ee1490fb0f084c41c211ee86612acee6eba8403f6a65a651bb1c8141f3
SHA512a420f9c9e77fe0d14247d7eacd4c03e3ff36cac55d062ae9211e2544f167411b47d97013822486123fa16c760dec84f0652e52ee253f54bb5b1b8bab2cd1918a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea5cb032048fdc904a7fae96a6f4404
SHA10ff1e5f1eb23488623281b84c58120e74fba75ad
SHA256d19101a6abd331a472f21ccbf7321d14f14e8fb94cb84e94220951b4c5cd8a7a
SHA5124daa131cd0c7fca98387d662f7c0c0dd07b792dddb858d361e6f1d89caa71cffd32dfc935ab707d5531de8cae33d9607b3f6edcbc594a7755684cafbb71b02a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d02cce5f5464214181dc3ba180c5ed8
SHA12579d3016789a32ec3cac16e0029d2c522e27cab
SHA256a442a687149be2f52387767fad629eb3a5a82496b22f8f014959812ec7e73e71
SHA5128dddc13f42e72a403bc125b6b13db5c9972f7b6a644b561ed4bdb4ef4404aac1561db7d57ea7481ef22eb8567c09a1f0adf3a224518f4892ccba5b6eda1d8602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd7ec922938101772d3c60194b151c7c
SHA1f0ef1acc60dcbd9e516524191d05a0fa6c0f1834
SHA256b102d5da8a706a994ed4f5ebd10db8be529983c131628db5281e265283393a06
SHA512ac834e952185478a81dcbed00200a14446844737da3c36d2b126fe966f2a3331633b9feb58768e6579f30b5dfd0d8dc187d1f4c5b5caa40c8c3b97c7955af1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b94557917ef07d68177a26933ed5abb
SHA170510683758757bec731dbf490c8678e453edde3
SHA2562e83357112eb93c88009ff6761cac6a275b25b1b88deacd0970dbbbd5ba362ff
SHA512ff526e14d277f72fb0c85d18256511b3d7797751ba5362858a89cfab6213457268cfd4143140ec6f6515e2c7124c09249821486d88a77fabb02453bed99aa1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55efeec0ed1939de13e7e6137c2ee3383
SHA1913979f2f3c01aa11e78152d5b50d43687d06f23
SHA2563cefb18d43b535813d2b44ff9f5f5e75bd8d90a7f0c08ab35a463e091e99078b
SHA512f0c9dbe2d6ddcff0ca2cd9c0af976220663ec1f876f16e9bdbc830930d6e57785449f92b74458f03ce59613c1232c9b6cb768209fb27fd7798392a088fc9be61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56570d319845eaec52d1d589a1dc9ab2e
SHA15371f75d2d9310f818a2f44d233c101bf6ca8c23
SHA2560fc10728ce7e05b1210b232282ae98cff1a0a7becc307cfd65a5feac241c3481
SHA512b9df0194b6cee672304d226130666ec999c3be544e265d42c60428cd29d18bed67a7e9fec8b46a3ba878afc9a4fce934416bca87790c312dfc59aca3d29e8858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a76fb4aab229b926a0cf8f5d039167f
SHA1823b11081d68500c170a6c29acee83eb6fadd9a6
SHA2569fb9123e66a7a34ee074bdc83bedab4405530920bde44c025efefd89c517b76d
SHA51223299a1e715392952c379cda3d71687f46f4ea8521a2aef1f69821ebbc5fc7f51efaa0aed2b000a847c2b65459554e7d80c163a43ee566233eda65b4427f981c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bdc2f547018a0322e5d520965c0676a
SHA1d42e4809df60194cf69723fdd9be6aa85c46db22
SHA256f909cdff894e914f0cc1bd360872baead5a390c3bdea64f8e026d96b64d9a0b4
SHA5128cc25fa63d9cf8434a8a0ca82f43409eeb3fd0ceda97f98c842934e3ec22ea619fdac7a24d5ab67ab90e61ac0f25688681378373c2e1f57589de7f99ddf779d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e52bb6251297d8b399008a9de9f48b25
SHA13d700e37432749383907d3adffe3780267eeb5ef
SHA2562d591418a29a25d96a9f3fbb32bd898264057334956421376bd12761cf108955
SHA512978786269fb3e856ced568feb2e9c59a2b3bb939f0215f30b449bd1447fe6452bf87967cd5fb8b715fa28f7c4dd3a67806d3036e758a83bf75fe5a9e8c616e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce9558e716c1d8889fd5e30870a6535
SHA1416902bfb7052446d3ab04b8bd23dbe558b50c93
SHA2563b2fdf9b65105036d01af62e45f1ec7f6ca9a18a9eb0d85b37d31c2501bac7f4
SHA512f25d37d3e10b25fafa8742e29eb3b56240ea953a15c69a543d73a37b289c003c4f80551d49e3adf2b5f2a4d60e9db065a425782a2b4e5715a90b16833f584cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547158c79c890caee357919027212adae
SHA1542180dfdc19fee0c8c3b7c3854725b72d9594af
SHA256d72ec104b17d5e50b612a56c9824a99eead7d3e463c8a8c7b32bbd8d898b76d8
SHA5125f90a36aaa8d8a21f1b4bfce7ecfb13d187c5cf840daa11754f5b4012fb5cf356a9dec84306d55de2848dfe6bc164208877cb0b027f65dad05c0ea574b8b1353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50affafe1689a5c1961cdd63197cea5c3
SHA104c8d3ba449fccf307d39d35fb2897d5e43f8595
SHA256ec71511daf3f4f4b1ea8dfd8bc742f341b645754d1c724465070034e191b81d0
SHA5128172576ac0ade4f3b0cfda59badf1efcb38d8eea6a23b9da058695339f6eb8f182a53a2680a4e402940deaf2fb067bc715f5cb6b629adee6ff5e47319aa83dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ea2e118d4e70194769b008e783e0a6
SHA10112a37d153ed20943da5bf22f42194f009d066d
SHA2561ef123d620115016d20d177b38335e6f493aa3dd97bd969be62a77aa1086346e
SHA512f081919f5f7e8aa4de53b9f9397f449b250416559cfde755f6c2e7f88a7e452915db8f07e4cf9f14b2de9f0c70ec62db1b44ad912256d78e865138d85432c546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ff54a005e2ddccacb913965e75b7de3f
SHA1293ad33eb6f9b4df52eace1e8eeef4909286b3e9
SHA256594db4cd689f6a6ad0c79d5754952f4471093987bfe98ea57aaad79d41971751
SHA5126f635a3c7b385160a2a5dd36d571a083d5dae43792f91bbc27f38d62e0b147578db15154d531697f714e5eb92918c0b3f864ca85bd50416ab21c256f21a93702
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
6KB
MD5adf3db405fe75820ba7ddc92dc3c54fb
SHA1af664360e136fd5af829fd7f297eb493a2928d60
SHA2564c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476
SHA51269de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72
-
Filesize
19KB
MD5d4aa89d4349c12e6ef4c29314e487378
SHA1a0b339a5d7c9dbc17a5af31493d06ca4cb365c4b
SHA256b087ff9e173f9e3d89c8237511ad0f6c9d9d1353592e8ff22b82423208c0f1e2
SHA5120e8dc86d653566d3ece3d000dae425bf7aad0d79d1f2193f47879c398ab7f2f3a1b543e13a79f631a8b3c525bc96c5911fe88bf89188fed56a3562bf98524269