Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 17:45

General

  • Target

    91dc7a555214f1cb76befd696cbb3454c8dfb66c1fd6cbcce8bcb0cc2a8a924b.eml

  • Size

    746KB

  • MD5

    535f378cafeb83638768fe29b7ee0fb3

  • SHA1

    d232b8c1d0af9b0d17b00e6c80c736bd9eb1b9d8

  • SHA256

    b521442f384b5aa79ed5b5ca49d9ee7d80ee86c5533cd2dd7160fdf8593d358b

  • SHA512

    0b305e6980e294437c7c81b2b94ee583b3efb4a5cb0dd601c32569a5d21ff2c43c9905799d3fe20113b8f1cd62f7f3746cda5a1b66bdc098b33ce9f65731ca05

  • SSDEEP

    12288:vkX3EreQhTlWhtU1obHFN2EXHthC/P4FGnG4IZuDvVs7dvoPS7uZwH/:vP5ozFnHtoHtnGJO3Puf

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\91dc7a555214f1cb76befd696cbb3454c8dfb66c1fd6cbcce8bcb0cc2a8a924b.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2064
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1296
    • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /pst "C:\Users\Admin\Documents\Outlook Files\Outlook.pst"
      1⤵
      • System Location Discovery: System Language Discovery
      PID:1920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      acf0050ac6eec9446ce439e38bac7359

      SHA1

      65b3bb436d9b78ca8a7d0a76daa32df62094e530

      SHA256

      e4710770697868dc8ef89677f15c567dec4bd9ba79ffd6be623c7bc2260da431

      SHA512

      9a5eec2e00f816b841fa19379226d1b93347d021689491994536f291ed7b69638b8b273ffc6c399fff1415855d819aace9a031f186d81fc9dd3516ef5bf10c2d

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      f4054994cf6318159b765875b15f0688

      SHA1

      f348a2f88da3eceeab8caeb14b76dd457d0155ec

      SHA256

      bfe1576333a500b22c7d654c7af35e61749c78b6c0103c332f534be32e57e9f6

      SHA512

      d098fa5d0f71767e9decf0e6f01acf2e45db8c2ca4c41c66225430ae13d60613c0c0d93e9555e9c9abc131b6e88a6d1dd83fc6b88146b19d95d0f2609e525898

    • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

      Filesize

      1KB

      MD5

      48dd6cae43ce26b992c35799fcd76898

      SHA1

      8e600544df0250da7d634599ce6ee50da11c0355

      SHA256

      7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

      SHA512

      c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

    • C:\Users\Admin\Documents\Transferencias Pendientes de facturacion - Maxines SRL - Dic24.lzh

      Filesize

      542KB

      MD5

      9565deef5d3ec3decd7fcaab522e3630

      SHA1

      cdd658b005bbb183f9d85bdecf9de8eb224383e8

      SHA256

      f8664fec1486bceb5eb77dd7fce08bf86140e6fc7426fd9a42c06070997d26cd

      SHA512

      79e3a5c5da4e1cfdd6601a6e8bcaead7f4b8d75e1d8920417a92c8a33c5af5f1f410e8eee78bf6bad1064d7bf6d70fc56f54dd7a5dd02949312e9cd7f52d8f99

    • memory/2064-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2064-1-0x0000000073A2D000-0x0000000073A38000-memory.dmp

      Filesize

      44KB

    • memory/2064-124-0x0000000073A2D000-0x0000000073A38000-memory.dmp

      Filesize

      44KB

    • memory/2064-177-0x000000000BFD0000-0x000000000BFD2000-memory.dmp

      Filesize

      8KB