Analysis

  • max time kernel
    147s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 10:28

General

  • Target

    AAMkAGVlYjNiNzA2LTQzMTEtNDlmZi05OWE5LWIwODdlNmRhZGQzMgBGAAAAAACB6YGTmo7ZQqxWBA_VRAiPBwDCO0JJFRtyS4QW.eml

  • Size

    53KB

  • MD5

    f36b1a4ea2cd3d6c20860f08dc9eaf23

  • SHA1

    affc1ceb0920e49e7c6a9f1b12729baa8ef2a2ce

  • SHA256

    dd2ef61403f57fd1897b2d7ea66f0b69e01fd4eab49605c5b98da3795278ce08

  • SHA512

    4783ed982c110e4dfb311d77dded555ea19e918ca46aae61bd5fbeda80ccb61bcc78e053ffce5f9c6826741a7242ca62c99aaf150d65db1231832846f55227ed

  • SSDEEP

    768:HOUceiOpGPIivqKCFWrBMu54Y8nR7Y3GnRQ0WN5ouxhOKT4MHThvdMyLJe:HOf2GPIivqKOgBca0WN5hk+lFd0

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\AAMkAGVlYjNiNzA2LTQzMTEtNDlmZi05OWE5LWIwODdlNmRhZGQzMgBGAAAAAACB6YGTmo7ZQqxWBA_VRAiPBwDCO0JJFRtyS4QW.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2728
  • C:\Windows\system32\prevhost.exe
    C:\Windows\system32\prevhost.exe {F8B8412B-DEA3-4130-B36C-5E8BE73106AC} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:2160
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\Outlook.sharing.xml.obi

    Filesize

    185B

    MD5

    97faa5aabe57becd3baea071a83e7603

    SHA1

    ef9cb264819cf834bb0f9c3753b967a4cd98d606

    SHA256

    6b171e0598a631a4dc3dbcffc508c9d2cd17eac5826d152d737cb6a9b3cf2f40

    SHA512

    c90ad029f945b691daef0bb914a483833b2d884d141da3170c1c8c22864eba0aa7be4666b9eb6298616afc945d0a217cfa714a7fd31b635a248723d70ad09d74

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\26477260.wmf

    Filesize

    16KB

    MD5

    bb958f301371a81ff5fd441e725fc4d8

    SHA1

    42dec2a3de000568b9224c425c9396457661d1cb

    SHA256

    4da28e0e1fd0c6cdbec97b8fce46b920196d26a05deafc838ddc4447d69b5ecb

    SHA512

    007901892af1b13660fe2fbeb54a4b46614668470344811f94198683562e76ca0e49ab2742138dd2fbb3ad2ba38cafd55bdac0e21898b863616ac99a596c1bb7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\596BAB1B.tmp

    Filesize

    4KB

    MD5

    93aacceded7a3ecc5efe7e3bbd3afbda

    SHA1

    f82e7e1de9c310a11441f10827f3378601f30f80

    SHA256

    86b8766f9209f4b4cc38428b4f487e3da26acf9c708db352618b73ce879a9b61

    SHA512

    a133a5bdfad01ccf44812715e0703461ac660bc848ded8bd9e78d5aacac3ff427ee4a8f62daf126b2d997a82ab96463c087587b011221ccd3c95e88ab2a73caa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QZ77KQEJ\VM_Transcriptac2a35aa5e3b341776ca4cef4eee55eb85797c6f (3).html:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QZ77KQEJ\VM_Transcriptac2a35aa5e3b341776ca4cef4eee55eb85797c6f.html

    Filesize

    25KB

    MD5

    cd70881e47457944cc85bb60d249f040

    SHA1

    855b31a5733e8fe0e726bbb882c6c89e7116a8f8

    SHA256

    d10bff808f8669aaedfda5265f63bad8eea73b247689680a15c0e057ad15af1c

    SHA512

    78a0c474114515e04d46d0369b1b072d53cde060167e9d36e43931817eddf1709dc1b607c5139bb5ec01c4e1fe2ef97c46e7cb9a0b79442782079e2c6f661b72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2728-1-0x0000000073CDD000-0x0000000073CE8000-memory.dmp

    Filesize

    44KB

  • memory/2728-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2728-124-0x0000000073CDD000-0x0000000073CE8000-memory.dmp

    Filesize

    44KB