Analysis

  • max time kernel
    100s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 10:46

General

  • Target

    fc340970-75f2-4259-0146-08dd3a4dffef/03d68b26-576a-3aba-d431-f4688cef97e5.eml

  • Size

    3.9MB

  • MD5

    6176d0684fc2b7b7775a5d5f4e59e48c

  • SHA1

    135a36c86c7506dbfca36c5edc43cb9e609b18a5

  • SHA256

    eda46103cdde2bfc183b182e1ed3ceb2e353599decad5738276f75db5e6fb63e

  • SHA512

    2e152fd3187ffbe17a79219ea69b48f9d2858baf50d859c3ed1415b9b943c9ced538110b566771da307d35f9d113f0ac10d7caba0e56d49c25b16abc22830a85

  • SSDEEP

    49152:30wmg/AIlxH8GThdlGprSsxpuuiuQuU2cdXQ/Fo+YkFS0kr7Wwr:X

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\fc340970-75f2-4259-0146-08dd3a4dffef\03d68b26-576a-3aba-d431-f4688cef97e5.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2504
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:696
  • C:\Program Files\7-Zip\7zG.exe
    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap13291:158:7zEvent1129
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2268
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\AWB GUÍA AÉREA 5526456806 OBSERVACIÓN MODELO DE ITEMS.bz2
    1⤵
      PID:1868
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap8939:168:7zEvent23911
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      235KB

      MD5

      12d163e30b3c9a9fd71ca0468d7d67b4

      SHA1

      78c2bda790893ae88e4e3d33aadba60397d4ed1e

      SHA256

      35eb2053817f01e62174ccac0cdbb7a1d299a4bcf491c1a9b0f69e6deb9b9d45

      SHA512

      4320c04283d56b838c544cbecdfbacabdc4eddda4d5956f0908afccfdf26ad4aeb2ac008262611811f89d80d9a40b88f74fbfe60f8f984578fd5f086334160a1

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      d985b30fe2aa98ca0737dc7019f6f059

      SHA1

      bcb5d913803276cb35dfd8aaa264dc8cd55df546

      SHA256

      21c33c3dc9d2837c6f3712fa7ef70f22b5840b8ee0e4a776d83dab3041007b2b

      SHA512

      4242770634910836b46cc3fee6b5a83a2ea0303699f0f1fc1e41f1b9319fd41d546d49e2bc729a5b696180b0a4b24f53f2f4c886d1536bbf79456d861d87069a

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      ab6b646790da5a14ff36dadd248e93fe

      SHA1

      8af20c4321cfc7d8f160bbc757cb230b281ec8c1

      SHA256

      845d8af7634fe6755460297e39fa4ff954fc103a904c7bb3b010336468dd9493

      SHA512

      d4a99644c011c68936bb986497a44d9981f28dc276db69023acc416ef579027ac7ea958dddc7ec0e3ae31d4b4c70d95adedf8bb2a2693687e5cf7c3611a84e25

    • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

      Filesize

      1KB

      MD5

      48dd6cae43ce26b992c35799fcd76898

      SHA1

      8e600544df0250da7d634599ce6ee50da11c0355

      SHA256

      7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

      SHA512

      c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\O2KB1X2K\GUÍA AÉREA 5526456806 OBSERVACIÓN MODELO DE ITEMS.gz:Zone.Identifier

      Filesize

      26B

      MD5

      fbccf14d504b7b2dbcb5a5bda75bd93b

      SHA1

      d59fc84cdd5217c6cf74785703655f78da6b582b

      SHA256

      eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

      SHA512

      aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

    • C:\Users\Admin\Desktop\AWB GUÍA AÉREA 5526456806 OBSERVACIÓN MODELO DE ITEMS.bz2

      Filesize

      876KB

      MD5

      4804a12af74083a1f41533f023abc6a4

      SHA1

      f52a2827a4da027a2748a8bd195007242404730b

      SHA256

      57ddd31bbcbbfbb3a86dcf65bb211adb8939347683d50f5718a165e5f6b1f0a2

      SHA512

      6acdb90e281073f44ed7d02840af239338b03d973f80309ef2956123b69e5875484f0e523c99c584a0224488aa1d0be18537d9f3e5c1aa2cfc66de9716194aa6

    • C:\Users\Admin\Desktop\GUÍA AÉREA 5526456806 OBSERVACIÓN MODELO DE ITEMS.gz

      Filesize

      876KB

      MD5

      ed0579e095025d927780e0084f9ba894

      SHA1

      86468dccedddd10f9fba76a3042a9b4f452034aa

      SHA256

      35946d3fae3628492303c8cff6cfd95cda9a6d32cb4f3726a30dc378b4a07a31

      SHA512

      cedae68199ae0c9f524f373a9f1a0af2534616cd133834e051afe67be36d6944a7d800f8167d9cac3628fad6f462dc243a853867c80ddeb3552f5e8c8c88ae79

    • memory/2504-1-0x00000000737BD000-0x00000000737C8000-memory.dmp

      Filesize

      44KB

    • memory/2504-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2504-189-0x000000000BBF0000-0x000000000BBF2000-memory.dmp

      Filesize

      8KB