Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 13:53
Static task
static1
Behavioral task
behavioral1
Sample
esigned-document_eml.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
esigned-document_eml.bat
Resource
win10v2004-20241007-en
General
-
Target
esigned-document_eml.bat
-
Size
2KB
-
MD5
a0d37228b4ad0ebea6537b99cbcb7ff0
-
SHA1
cec0438ed7acde6a177bc220df2d4fa94352e539
-
SHA256
e85d8640a62e0d223fe9892384eecb8bb9e67d4bf2fc020881058506b33bec30
-
SHA512
a4fda2b2adbe591bbfb44fb0949becf75349f5255f197008727486f15e0cc18fcdbce6c1d3ba16e65a5e32a5d8ffc857cfa75402975eafedf4c11524d4f1f9ea
Malware Config
Signatures
-
pid Process 2872 powershell.exe 1644 powershell.exe 2756 powershell.exe 2644 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Delays execution with timeout.exe 1 IoCs
pid Process 680 timeout.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F23C71D1-C910-11EF-8CD3-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001ba104439f58224e8b8c9f1b751e6c3d00000000020000000000106600000001000020000000865ef92f895575a299a52bd01a943c6f3d7671372e7db7bbbdea3a7ddc37f90f000000000e800000000200002000000079fb7b08bf21bfd5f985b279e62077d03eec959e53461821c4c014d928d4cad020000000ecd5c0945c2ff7cc661918582a045e80eb6ca036565fde98569abf826665494740000000ba7cb450322dc866a6b6042bf97a23a26fd2049284aaf758ae26a271223a30af76bf216aec91d446ad9b7b7ca0b1df4b3cd097392bdf7ba1aca973aa961c8057 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4037bdc81d5ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1644 powershell.exe 2872 powershell.exe 2756 powershell.exe 2644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1644 powershell.exe 2872 powershell.exe 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1644 2108 cmd.exe 31 PID 2108 wrote to memory of 1644 2108 cmd.exe 31 PID 2108 wrote to memory of 1644 2108 cmd.exe 31 PID 2108 wrote to memory of 2820 2108 cmd.exe 32 PID 2108 wrote to memory of 2820 2108 cmd.exe 32 PID 2108 wrote to memory of 2820 2108 cmd.exe 32 PID 2108 wrote to memory of 2872 2108 cmd.exe 33 PID 2108 wrote to memory of 2872 2108 cmd.exe 33 PID 2108 wrote to memory of 2872 2108 cmd.exe 33 PID 2108 wrote to memory of 2756 2108 cmd.exe 34 PID 2108 wrote to memory of 2756 2108 cmd.exe 34 PID 2108 wrote to memory of 2756 2108 cmd.exe 34 PID 2756 wrote to memory of 2636 2756 powershell.exe 35 PID 2756 wrote to memory of 2636 2756 powershell.exe 35 PID 2756 wrote to memory of 2636 2756 powershell.exe 35 PID 2108 wrote to memory of 2644 2108 cmd.exe 36 PID 2108 wrote to memory of 2644 2108 cmd.exe 36 PID 2108 wrote to memory of 2644 2108 cmd.exe 36 PID 2636 wrote to memory of 2204 2636 iexplore.exe 37 PID 2636 wrote to memory of 2204 2636 iexplore.exe 37 PID 2636 wrote to memory of 2204 2636 iexplore.exe 37 PID 2636 wrote to memory of 2204 2636 iexplore.exe 37 PID 2108 wrote to memory of 680 2108 cmd.exe 38 PID 2108 wrote to memory of 680 2108 cmd.exe 38 PID 2108 wrote to memory of 680 2108 cmd.exe 38 PID 2636 wrote to memory of 1584 2636 iexplore.exe 41 PID 2636 wrote to memory of 1584 2636 iexplore.exe 41 PID 2636 wrote to memory of 1584 2636 iexplore.exe 41 PID 2636 wrote to memory of 1584 2636 iexplore.exe 41
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\esigned-document_eml.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$shell = New-Object -ComObject Shell.Application; $shell.MinimizeAll()"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1644
-
-
C:\Windows\system32\fsutil.exefsutil dirty query C:2⤵PID:2820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$shell = New-Object -ComObject Shell.Application; $shell.MinimizeAll()"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process 'https://outlook.office365.com/Encryption/ErrorPage.aspx?src=3&code=11&be=SN6PR04MB4014&fe=JNAP275CA0040.ZAFP275.PROD.OUTLOOgK.COM&loc=en-US&itemID=E4E_M_e9df154a-e4b8-4486-8aec-7acceeb93fee'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://outlook.office365.com/Encryption/ErrorPage.aspx?src=3&code=11&be=SN6PR04MB4014&fe=JNAP275CA0040.ZAFP275.PROD.OUTLOOgK.COM&loc=en-US&itemID=E4E_M_e9df154a-e4b8-4486-8aec-7acceeb93fee3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:930824 /prefetch:24⤵PID:1584
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://javadl.oracle.com/webapps/download/AutoDL?BundleId=250111_d8aa705069af427f9b83e66b34f5e380' -OutFile 'C:\Temp\JavaSetup8u421.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\system32\timeout.exetimeout /t 45 /nobreak2⤵
- Delays execution with timeout.exe
PID:680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549495c9da8554f22c7359c678e5789ce
SHA12450df59ef3dfc04f2a936f3fb79815415050869
SHA2562eade2476ddb8391c18cb7ef92f48d2835b3ac61bd2e6bc786134e1153c0b117
SHA5127a9708e9503944cbcb568e877ef051a8cb279d8139add5063383df405afc0af3c45c2db4bdb3ec86b9bf9d3ef05b14c9987ef31eed3bd4cb4360aaf3545dccd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62f04634cc2ee2a9b85d3cb3d9a12eb
SHA1c3054b9f4bb285b6c6446ae304d1ce9b53b0fbe0
SHA256aefeacc76c31b0a4d36828cfa8ad1a6aaef44f2ca74ff65ded2854a1f8616a95
SHA51258e201501610032e2512adfa5884980b6112d379193f9c182447a1e9147186db4b3569c47158f500edebe664e16edb63d5e7983988b4e6187c1634658b4b9df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d59899b4a875e6e6666f6b7f1f5a721
SHA1264850ed95c750c5ad1e927045d82c33e6ef0c5a
SHA2562c8ab1a96ce6cf6aa59719c02671c974f414515d2dbc613a0cee2f6231a7b21e
SHA51242d1da2daa781e3ddac511bedc3b5f2140337572bc9f595043ec0c9aa8d5b9f8835ce50012d511336527d036483ddc7cd66868fb0e29b7e738bdeb6685474ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9feb56e062bbb018b83e65a4f660a39
SHA187048af278c818ceca6c41a56e2ccd3a112f1777
SHA256032828081bf9b148c2e16eeb22bf3755a2bc95c632c4005715f421dd03a66255
SHA512a626359bee36ef28fabfd78b5cbafc1c767ec17f18f4c9175532b4bd0638990af66fbde2110302278b566a210b56664617cd2d57befdf1210c12620690ceaa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580805c68fe733231c1dbe769a52e485f
SHA1a7cd01150f5a95be822de608c67bbbddad862af0
SHA256d57446e9eed21ee7f246b78b3d9d420270338b05ab1808b85d95f019dfaeaf7d
SHA5127d3b06ad01c86aeaeb8e58e7b8405fb6ba081c1456fa1da480c2a7db78d41c1202dca80d4880e27ab85c71ddd1dd99d51776b7bb85a263687741595cca5d8520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50619c7ad0109450305434cf8731f04f5
SHA1a33f9d9b0b928d21a020ec3256a3855ca1f19c38
SHA256536b55233f1e989f713c4768af61d6f99a5679629727137148145a79a026a59e
SHA512c91b73dd71055dd5c1fe9d3d4c8edb442ed9ff8163e4b600bac7e150ca575087374bbb6ac3e2f1ed95275ae5b100ba1454946af3a7f21d6a9b7cf4b2aede8835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2edf331835693e187007dc38683c2f
SHA10b762d4cae27f47aa7b5a145d47f9d7faa0834d9
SHA2568c9eaca6a8a60022e1ee77c01fe3a25287c29daa23b06bcd238aed5e59516686
SHA5126d6c1bf670db69095580afc6ac7581817d65aafb20b625232a57f73c987832505288f32745122daa97c4372c603cecc9668ee3e80792aaa70e345ac1e8b06972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2797f5b3e587986ec35eb209bce58a
SHA1becb9dd6e312d491a83491d93416096d35bfc651
SHA256393ac059d94c771ffeedc92f0531c02f78d7166cd47f91ab208f7c43e654a3ec
SHA5129c320784a521011e6f4605112f5871350fa62907f3c2d253695625e9ff136260778909d75911bf2c9d4245e3493a518a5a839cac750e502b81717076e3db2786
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD54246afa7fabaacae805a7f2fd61b6874
SHA103336e9209cee78ab3140393c98ed96c4459bd36
SHA256557448d6a01243244657745741a30455ec458f7b2ee195b46365c03c418a8029
SHA512c630c57581abc0bdfebe32694061b581e179815ca17c5323ea4a14ea36f2d3cff7b5cf43ed67252a51628966663020d270b00af627c31b419f82e1fe1bf66c52
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ef70a17fc07ca9020dc0e104974c7178
SHA13c0320b07dd6736f69ed5a15c04063fbdabb7ba8
SHA25699212314d302a7a0f2c8c0ac17a9605311900bd2b0bae7bb9fc6a79ac2270da1
SHA51206950ba25b813bd24e054ccec0d9462e68900a8b9cb0b774149f7eaee4df663838130e64f6fe0b389ec723553f427fba8a7314c587963f3f19c0d954dee69a46