Analysis

  • max time kernel
    137s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 22:16

General

  • Target

    9d12b6e43b876a44527607a4dfdeb5f125020bbb3b674cae1886fea0812d1c5d.eml

  • Size

    1.3MB

  • MD5

    2eabda3041044b80921976fe95c90f50

  • SHA1

    e687c9bcfc6fe36b370d3fb3116a6ce0ec0d09bb

  • SHA256

    7f3e850479ef2043f217e976f5cded7a84b71de4b170f21d01473f26f9741a2e

  • SHA512

    29268f4fcf513eff55510d3f8f589da1ae021c9edc0c47c1db4a38f6acbbf15a5e5399d5581ed931c6dad8e492b5fa233c9a45c37a9d7fc6facad1e319a31b7d

  • SSDEEP

    24576:WlgjkYJ7MlQTpCr+cSf881rRDFdhDpEfpBZyRB9XHH2n3Pc0mDxih/:WSCaTaEfFBoYGfRR

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\9d12b6e43b876a44527607a4dfdeb5f125020bbb3b674cae1886fea0812d1c5d.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\FW8UWV2N\Nueva Orden de Compra 5424.gz
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    f25b75b6adf698b2ee98737c41e88554

    SHA1

    4818f7a47213cbaea95e960da00b2c6fa3f87fcf

    SHA256

    f3f27599b7bc6c753c7911dc90f5f332d8c0345e77f75758f78172d9f005da92

    SHA512

    ab691d675292a015099f2616ad0ff148fdd04def0e8ceee7ee5e79d899db940fd9f46e5aa8637c9741d965418808c50befcf39bd1e1aa4a1f26d163dc0aa53d2

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\FW8UWV2N\Nueva Orden de Compra 5424.gz

    Filesize

    876KB

    MD5

    beb2e5db810f2a6f3f4c0954bb204c33

    SHA1

    7d3b4915fbb95add8080a547438e91c2ed47adda

    SHA256

    eebf4e02ac5a900a8549a8b8c230a0445706ab295e49439f670bf2e3316d39bb

    SHA512

    2eb574baec2bd03053d061af8f4df28896a419c5ed072b4227f4a234ef943d01c25fb2a63cb998d00453116362803eda030bb73a4ddea1f5accd03e7e4b0c700

  • memory/2368-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2368-1-0x0000000073A6D000-0x0000000073A78000-memory.dmp

    Filesize

    44KB